RSA says 30 U.S. banks are potential targets of a massive Trojan attack, and alleged hacktivists say three more institutions will be hit by DDoS attacks this week. How must banks respond to the latest threats?
The hacktivist group known as Izz ad-Din al-Qassam apparently made good on its promise to take down Capital One's online presence. So what does this latest in a series of DDoS attacks mean for other banks?
Infosec pros take note: As the overall number of "true exploits" have decreased, targeted ones - especially those initiated by criminals or nation states - are becoming harder to detect, say IBM's Rick Miller.
In the wake of DDoS attacks aimed at five banks, and a fraud alert from FS-ISAC, U.S. banking institutions are taking several steps, including upping technology investments. What other actions are they taking?
DDoS attacks have existed for years. But the latest wave brings new threats to organizations. How should they defend against these attacks? Ashley Stephenson of Corero Network Security offers insights.
DDoS attacks have existed for years. But the latest wave brings new threats to organizations. How should they...
A wave of distributed denial of service attacks on banks raises the question: Should the owners of the nation's critical information infrastructure, when assessing risk, be held to a higher standard because society relies on them to function?
Visa's Eduardo Perez says a new end-to-end encryption service expected to launch in early 2013 will improve card security at the merchant level. What makes this new service superior? Perez offers details.
Some of the biggest threats to mobile banking and payments are the ones over which institutions have no direct control. How can they mitigate these risks? Mobile banking expert Tom Wills offers advice.
Malware and cyberespionage tools like Gauss are hitting U.S. banking institutions and businesses from all corners of the globe. But why are these sometimes not-so-sophisticated attacks causing so much damage?
Online attacks aimed at major U.S. banks have helped to heighten industry cooperation and information sharing. But experts say not all attacks are equal, and understanding the motivation behind the attack is key.