Risk analysis is at the core of most card fraud prevention platforms used today, says Carol Alexander of CA Technologies. But what if the industry could take the lessons it's learned to other channels, enabling banking institutions to more readily identify potentially fraudulent transactions before they happen?
Because most malware is spread via phishing, experts at Webroot are focusing their attention on stopping phishing attacks before they have a chance to infect a system with malicious code, says David Dufour, the company's senior director of engineering and cybersecurity.
Megaupload Founder Kim Dotcom plans to appeal a New Zealand High Court ruling that found him and three colleagues eligible for extradition to the U.S. The four men are charged with profiting by allowing the trade of copyright-protected content on their file-sharing platform.
Fooling hackers into giving up traceable information about themselves through "reflective" social engineering is helping researchers curb fraud losses and protect would-be victims, say Dell Secureworks researchers Joe Stewart and James Bettke.
Federal regulators have signed a $5.5 million HIPAA settlement with a Florida-based healthcare system for breaches related to unauthorized employee access to more than 100,000 patients' information in a case that subsequently led to federal criminal charges.
Immediately after the 2016 U.S. presidential election, there was a phishing attack that impressed experts with its ingenuity. Markus Jakobsson of Agari discusses this and other recent attacks - and what we must learn from them.
In 2016, cyberattacks and cybersecurity (or a lack thereof) grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect, you could say that everyone, even those who have never logged on, was affected by cyberattacks and hacking in...
As RSA Conference 2017 winds down and Information Security Media Group's series of exclusive video interviews wrap up, editors Tracy Kitten and Tom Field share their key takeaways from perhaps the busiest day of the event.
We know why phishing works; we know how it works. And yet the schemes still work, and they're only getting more effective. How can we stop phishing? Jim Hansen of PhishMe has some ideas, and they just might surprise you.
Hansen, COO of anti-phishing vendor PhishMe, says it isn't about throwing more technology at...
Evil hackers with monomaniacal intentions have long dominated pop culture sensibilities. But when it comes to for-profit hacking, cybercrime predominantly remains a business-driven concern, says Trend Micro's Ed Cabrera.