Good start, but we've still got a long way to go. This statement sums up industry experts' reactions to the two cyber fraud advisories issued this week to help organizations prevent ACH fraud and other crimes.
Two weeks after authorities on two continents arrested cyber criminals linked to the Zeus malware, Microsoft has added the infamous Trojan's signature to one of its best removal tools in an effort to hunt down infected machines.
The emergence of Bugat is an attempt by cyber criminals to diversify their attack tools, using a platform that is similar to Zeus, but harder to detect.
To help fight fraud, computer scientists from the National Institute of Standards and Technology offer some insight on how to protect commercial and consumer computers from keylogger infection.
Interview with Kim Peretti of Pricewaterhouse Coopers: Are the courts taking a more severe sentencing approach to cybercrimes related to identity theft?
There are two trends that information security leaders should watch closely: The growing sophistication of fraudsters, and the concurrent "consumerization" of the workplace.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.