How have the COVID-19 pandemic, lockdown and job losses affected the character and composition of the internet? Rapid7's Tod Beardsley rounds up the latest research into the prevalence of outdated and unsecured internet protocols and internet-connected devices - and there's both good and bad news.
It's illegal in the U.S. to circumvent technological measures on software, either for security research or to install a fix. But Kyle Wiens of iFixit says the growing "right to repair" movement is seeking to put the power back into the hands of device owners.
Continuous authentication can play a key role in combating fraud, says John Buzzard, lead fraud and security analyst at Javelin Strategy & Research, who discusses the role of behavioral biometrics.
Criminals are continuing to capitalize on the new opportunities being created by the ongoing COVID-19 pandemic to hone their phishing, scams, ransomware and other schemes, says Craig Jones, who leads the global cybercrime program for INTERPOL.
What are the biggest leadership lessons from the COVID-19 pandemic? And what will CEOs and CISOs look back on and say, "Why did we ever do things that way?" Those questions were posed to a panel of cybersecurity leaders, and here are their candid answers.
An identity and access management strategy for a hybrid cloud environment should include single sign-on as well as multifactor authentication, says Andrew Koh, deputy general manager and regional lead-Risk at Habib Bank Ltd. in Singapore.
The latest edition of the ISMG Security Report analyzes the latest developments in banning Huawei technology from 5G networks. Also featured are discussions of how to respond better to cybercrime and whether we're on the cusp of a digital currency revolution.
The Institute of International Finance, a global association of financial institutions, is focusing on strategies for using digital identification and machine learning to combat financial crime, says Matthew Ekberg, a senior policy adviser at the institute.
A malicious app called Welcome Chat has been spotted targeting Android users in Middle Eastern countries - where chat apps are illegal, according to new report by security firm ESET.
Several prominent business executives and politicians, including Joe Biden, Elon Musk and Bill Gates, had their Twitter accounts hijacked in what appears to be a cryptocurrency scam, according to news reports. Some security experts believe that two-factor authentication protections failed.
Device biometrics technology has been enhanced to support detecting and fighting fraud at an early stage, says G. D. Balasubramaniam, a senior vice president at DBS Bank in Singapore.
Ramping up authentication as e-commerce continues to grow requires achieving a delicate balance of a frictionless, yet secure, consumer experience, says Robert Capps of NuData Security, a unit of Mastercard.
Britain's U-turn on Huawei, announcing that it will now ban the manufacturer's gear from its 5G networks, highlights this as yet unresolved problem: Years of underinvestment and policy failures have left Britain and its allies with no inexpensive, trusted alternative.
The British government has officially reversed course and will now ban Huawei's telecom gear from its 5G networks. The ban on use of the Chinese firm's equipment, based in part on U.S. sanctions against the manufacturer, goes into effect at year's end.
Auction website LiveAuctioneers has acknowledged that it sustained a data breach in June. The announcement came after threat intelligence firm CloudSEK reported that it discovered about 3.4 million LiveAutioneers customers' records had been posted for sale on a darknet forum.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.