In Georgia, a man has pleaded guilty for his role in a $1.3 million phishing scheme. How did Bank of America and Chase help law enforcement agencies crack this alleged international fraud ring?
Which Internet security threats pose the greatest risks to organizations in 2012 and beyond? Symantec has just released its Internet Security Threat Report, which reveals some surprising trends.
How effective will the Domain-based Message Authentication, Reporting & Conformance initiative be at curbing phishing attacks? Security experts at RSA Conference 2012 weigh in.
"The misfortune here for the banks is that they can have the best fraud-detection systems out there ... but it all breaks down when they call the 'hacker' to verify the transaction," says Gartner's Avivah Litan.
Recently discovered viruses, consisting of Trojans and other malware, at City College of San Francisco have stolen personal banking information and other data from perhaps tens of thousands of students, faculty and administrators, says John Rizzo, president of the board of trustees.
Improved collaboration and communication between small businesses and financial institutions is the first step toward improving online security, says Mark Patterson, an ACH fraud victim. What else would help?
Data breaches are all about reputational risk, says attorney Lisa Sotto. And as legal requirements grow, attorneys must play increasingly integral roles in helping clients respond to incidents.
We all know the online shopping risks consumers face on CyberMonday. But how does the BYOD mobile computing trend impact risks to organizations from their own employees shopping on the job?
U.S. and Estonian authorities have broken up one of the largest Internet crime schemes that allegedly netted $14 million in fraudulent advertising fees and infected 4 million computers in 100 countries.
Occupy supporters plan today to protest at several banks' headquarters in NYC. Coming on the heels of cyberattacks that targeted police in Boston, how worried should banks be about growing physical threats and cyberattacks waged by Occupy sympathizers?
Many disaster-related attacks are personal and direct, perpetrated through a phone call. But some take traditional routes, such as e-mail, while more are taking emerging routes, like text messages to mobile devices.
IT systems operated by governments, hospitals, financial institutions and other businesses averted catastrophe, for the most part, as Hurricane and then Tropical Storm Irene stormed through the Eastern seaboard over the weekend.
Phishing e-mails, feigning to be from the Internal Revenue Service, are reportedly targeting consumers with claims that tax accounts have been locked and require immediate action to reopen.
International collaboration, steeper convictions for those who are caught and government support for the cyberfight are fueling positive progress in the fight against cybercrime.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.