The emergence of Bugat is an attempt by cyber criminals to diversify their attack tools, using a platform that is similar to Zeus, but harder to detect.
To help fight fraud, computer scientists from the National Institute of Standards and Technology offer some insight on how to protect commercial and consumer computers from keylogger infection.
Interview with Kim Peretti of Pricewaterhouse Coopers: Are the courts taking a more severe sentencing approach to cybercrimes related to identity theft?
There are two trends that information security leaders should watch closely: The growing sophistication of fraudsters, and the concurrent "consumerization" of the workplace.
Interview with Allan Bachman of the Association of Certified Fraud Examiners
The magnitude of fraud schemes has grown - the scale and the losses. But the basics of fraud investigation remain sound. And if there's one thing people should know up front, says Allan Bachman of the Association of Certified Fraud...
How vulnerable are organizations to cyber attack? It depends on your definition of "vulnerable," says Robert Richardson, Director of the Computer Security Institute (CSI). "There's vulnerable," he says, "and then there's likely to be attacked."
In an interview about current threats, Richardson...
Interview with Robert Richardson, Director of CSI
How vulnerable are organizations to cyber attack? It depends on your definition of "vulnerable," says Robert Richardson, Director of the Computer Security Institute (CSI). "There's vulnerable," he says, "and then there's likely to be attacked."
In an interview...
When it comes to protecting your organization and your customers from a data breach, what is considered "reasonable security?"
This question is at the center of several ongoing lawsuits, and how the courts answer it may be one of the biggest stories of 2010.
Shedding light on this hot topic is David Navetta,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.