See how the detailed analysis of millions of voice-based transactions has produced a "signal in the noise." From large-scale analysis, clear patterns emerge of how stolen payment card information is actually qualified, updated and adapted for monetization. This process is most often carried out by social engineering...
Google says just 2 percent of the recent dump of nearly 5 million credentials to Russian cybercrime forums contained valid Gmail username and password combinations. But anyone who reused the same passwords on other sites remains at risk from hackers.
Contact centers increasingly are the key "soft" targets for fraudsters who impersonate legitimate customers to alter or obtain information. This information is then used to facilitate direct and cross-channel fraud, which can be very difficult to tie back to the call-center entry point. How do fraudsters conduct these...
Internet hygiene is not up to par, say cybersecurity experts Tom Kellermann and Rod Rasmussen, who explain why bad hygiene has led to increased botnet traffic and malware infections.
The U.S. Department of Veterans Affairs has launched a new security awareness campaign to help veterans prevent, detect and respond to identity theft. VA CISO Stan Lowe offers details about the program.
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals' continued success is...
An ongoing APT campaign employs decoy documents to lure potential victims into installing malicious remote-control tools. Targets include at least one bank, the BBC and many U.S. and EU government agencies.
On Christmas Eve, Target issued a warning about phishing scams linked to its breach recovery efforts. In response, the retailer says it is launching a dedicated resource page on its website for official communications.
This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the U.S. and UK. The findings highlight the significant costs that web threats pose to businesses - such as increased help desk support - and the risks especially for companies with no web...
Microsoft and the FBI say they have taken down more than 1,400 botnets responsible for spreading the Citadel malware that compromises online credentials and identities. How did Operation b54 unfold?
The latest phishing trend: the privatization of banking Trojans. Why should financial institutions be concerned? Daniel Cohen of RSA tells what to look for in the newest cross-channel schemes.
Attacks aimed at mobile devices are progressing much more rapidly than any attacks ever waged against PCs. Organizations are in danger if they don't pay attention, says anti-phishing expert Dave Jevans.
Today's spear-phishing attacks are highly targeted, technically sophisticated and represent a real threat to data security. Attackers can leverage information gleaned from social media to tailor messaging to individual targets, and can convincingly imitate legitimate senders.
A successful attack compromises the...
Kaspersky Lab has identified a new spear-phishing attack involving a Trojan designed to target Android devices. Researcher Kurt Baumgartner says organizations need to be prepared for more mobile malware attacks.
Despite ever-evolving cybersecurity threats, David Knight of Proofpoint says spear phishing attacks are really the greatest worries for most security and risk officers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.