Slamming a Ukrainian energy provider for recently falling victim to a spear-phishing email and Excel macro attack might be easy. But security experts recommend all organizations use the incident to ensure they won't fall victim to copycat attacks.
Four years after European criminals exploited EMV implementation vulnerabilities to steal an estimated $650,000, security experts say not all banks have adopted full fixes. But the payment card industry contends related mitigations are in place and working.
Adobe is warning Flash users to update their software immediately in the wake of zero-day attacks that can enable attackers to take full control of vulnerable systems. This year, Adobe has patched 316 bugs in Flash. Is it time for the plug-in to die?
Twitter has issued its first-ever alerts to some users that they may have been "targeted by state-sponsored actors." Some cryptographers, software developers and security experts say they have received the alerts.
A U.S. House committee recently passed legislation that's aimed at helping law enforcement bring to justice cybercriminals from other nations who buy and sell payment card data stolen from U.S. citizens. But would it really help the global fight against cybercrime?
Fraudsters are increasingly using global brands, including Apple, to fool consumers into providing personal and financial information that can be used to compromise financial accounts. Experts offer insights on the latest trends and how to respond.
The size of the information security analyst workforce in the United States rose by nearly 20 percent in the past year, according to an Information Security Media Group analysis of U.S. Bureau of Labor Statistics data.
The fraud shift as a result of the migration to EMV chip payments in the U.S. will extend beyond card-not-present payments, experts at Information Security Media Group's fraud and data breach summits in San Francisco last week warned.
The FDIC says cybersecurity is a business continuity issue. So it's offering banks a series of videos and exercises to help them address key threats, including account take-over, malware infections and other risks related to third parties.
The U.S. Department of Justice has announced charges against nine people suspected of running an international insider-trading and hacking scheme predicated on stealing confidential press releases before publication.
A $46.7 million fraud scheme that hit Ubiquiti Networks Inc. shows the new & improved face of wire fraud - and just how easy it is for cybercriminals to fool employees into helping to pilfer their own enterprises.
The takedown of Gameover Zeus taught law enforcement and banks many lessons, including that Trojans are being used to steal corporate secrets, not just money, says Eward Driehuis of Fox-IT, which investigated the threat actors behind the Trojan.
Julie Conroy of the Aite Group analyzes why a new report shows most top-tier North American banking institutions expect to increase their spending on online and mobile fraud mitigation in the next two years.
After jumping by 33 percent in 2014, the number of Americans who consider themselves IT security professionals has remained flat for the first half of 2015, according to an examination of federal government employment data. That's bad news for employers seeking IT security pros to hire.
Outrage has erupted in Britain after a London police helicopter crew tweeted a photograph of well-known comedian Michael McIntyre as he was about to cross the road. Has the British surveillance state run amok?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.