Mozilla wants the U.S. government to provide it with information about a possible unpatched vulnerability in its Firefox browser, which was used by the FBI as part of a large child pornography investigation.
The theft of $81 million from Bangladesh Bank was "part of a wider and highly adaptive campaign targeting banks," SWIFT warns its 11,000 customers. Investigators say signs point to the same attackers having hacked Sony Pictures Entertainment in 2014.
Moving away from individual malware detection toward automating the known and investigating the unknown in search of malware campaigns requires a continuing, round-the-clock effort that presents many organizations with a significant challenge. At the heart of many organizations are Security Operation Centers that must...
The problem with breach defenses isn't the lack of security standards, commercial security products and services or even cybersecurity competence, but the fact that the existing collection of commercial hardware, firmware and software employed to provide IT services contain inherent design and implementation...
Every mature enterprise understands the necessity of a maintaining a tested breach-response plan. But it's critical that the scope of this plan covers all interested parties, not just technical operations, such as legal, finance and media relations that may have greatly different priorities at crunch time.
In this...
Amidst finger-pointing over responsibility for the $81 million online theft from Bangladesh Bank, SWIFT has issued its first-ever information security guidance to banks, telling them that they're responsible for securing their own systems.
The SWIFT messaging platform, which was hacked during the Bangladesh Bank heist, is used widely by most Indian banks for international financial transactions. Institutions that rely on the platform must be more vigilant, experts warn.
Anonymous, which launched a DDoS attack on Bank of Greece's website and those of several other banks, plans to attack top banks from Southeast Asia. Can Indian banks deflect such attacks with adequate DDoS defences?
Verizon's annual Data Breach Investigations Report has triggered an avalanche of criticism that researchers made critical errors when studying and reporting on the top 10 most frequently exploited software vulnerabilities.
The same Turkish hacking group that recently leaked data from Qatar National Bank and UAE's InvestBank apparently has leaked data that appears to belong to five banks in Nepal and Bangladesh. But are the leaks the result of new breaches?
It's one thing to talk or even plan about "What happens if we are breached?" It's quite another to undertake a true breach exercise. What are the critical elements of such a drill? Author Regina Phelps shares advice from her new book.
Ninety-nine percent of the enterprise workforce currently uses mobile devices smart phones and tablets to perform their jobs today. And nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. These are among...
Israel reportedly will extradite two suspects who were indicted in connection with cyberattacks that breached JPMorgan Chase and others. Cybersecurity experts say this is the latest example of how cross-border collaboration to bring cybercriminals to justice is improving.
The Defense Advanced Research Projects Agency has awarded Georgia Tech a $2.9 million grant to develop a process for quickly identifying and then defending against low-volume DDoS attacks, which are far more common than high-volume attacks but can be just as disruptive.
Australian entrepreneur Craig Wright boasted that he was the secret bitcoin creator known only as "Satoshi Nakamoto." But his claim has been dismantled by security experts, leading one to call Wright "the world's first cryptographically provable con artist."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.