The global information security community is mourning the death of Raimund Genes, CTO for Trend Micro, on March 24 at the age of 54. His insight, clarity and wit will be missed.
Impostor email threats, also known as business email compromise (BEC) and CEO fraud, have hit more than 7,000 companies since the FBI's Internet Crime Complaint Center (IC3) began tracking this type of scam in late 2013. Those that succeed can yield millions of dollars in fraudulent transfers.
Download this eBook...
The 2017 Magic Quadrant summarizes Gartner's yearly analysis of the Data Loss Prevention (DLP) market, examines the innovations driving that market and compares the positions of leading competitors.
Download the report to learn about:
DLP vendor evaluations, including strengths and cautions;
The Enterprise Data...
The FBI is warning healthcare sector entities to step up securing their file transfer protocol servers in the wake of cybercriminals stepping up their attacks. The alert is similar to an earlier FTC related warning from another government agency.
A scareware campaign has been locking iOS devices with faux ransomware, demanding a payoff via virtual iTunes gift cards, security researchers warn. A fix for the exploited iOS flaw is included in a massive batch of product patches and updates released by Apple.
Like many other inventions now common in modern life, distributed cybercrime may seem trivial today. But this concept emerged little more than a decade ago and has already dominated the threat landscape.
A ransomware attack on a Texas urology practice that potentially affects nearly 280,000 patients ranks as one of the largest health data breaches reported to federal regulators this year.
In 2010, a computer security firm in Belarus stumbled upon Stuxnet, a mysterious virus of unparalleled complexity that was attacking systems in Iran. Unlike any other virus or worm built before, this one didn't just simply hijack the targeted computers or steal information from them, it escaped the digital realm to...
Monetarily motivated attacks are by far the most prevalent cyberthreats to organizations worldwide, yet vulnerability management techniques have largely failed to adapt to a threat landscape dominated by distributed crimeware. By understanding the commercialization of attack tools and services - particularly the...
Most leaders in fraud or security work in isolation rather than partnership with customers. With facts revealing consumers and business customers to be highly motivated to protect their own PII and financial assets, why do they commonly use weak passwords or ignore fraud alerts and updates? There is a mismatch between...
Cyber-extortion has reached new proportions, with a wide variety of methods, such as distributed-denial-of-service attacks and ransomware variants, being used to extort individuals and organizations. Ransomware-DDoS hybrid attacks, like Cerber, have showcased how attackers have added DDoS capabilities to ransomware....
Deception is the most successful strategy in military history. Just as armies used deceit to conquer continents, cyber-deception is being used by more and more organizations to exploit a hacker's greatest weakness - being a human, after all, behind a keyboard. Deception techniques such as honeypots are not a new. But...
The U.S. Justice Department is reportedly preparing to charge multiple "Chinese middlemen" with helping to orchestrate the $81 million Bangladesh Bank heist on behalf of North Korea. Security experts have long been reporting that the attack code and tactics appear to trace to North Korea.
Secure sockets layer (SSL) and transport layer security (TLS) have become an integral part of the internet, and adoption rates have skyrocketed. More than 45% of websites are encrypted today (up from 30% in October 2015) and 40-50% of enterprise traffic is encrypted, compared to just 25%-35% in 2013. This growth...
Cloud services firm Coupa is one of the latest business email compromise victims, after a fraudster pretending to be its CEO faked out the HR department and stole all of its 2016 employees' W-2 forms. Security experts say rigorous training remains the only viable defense.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.