Canadian citizen Karim Baratov has pleaded guilty to targeting more than 11,000 webmail accountholders to steal their passwords, including targeting 80 Gmail accounts at the request of an alleged Russian intelligence agent tied to a 2014 hack attack against Yahoo that exposed 500 million accounts.
As data protection breaches have become daily headline news and everyone becomes increasingly sensitive about privacy, the regulatory regime is getting tougher. Data protection laws in Europe are more important than ever before - especially as the enforcement deadline of the EU GDPR looms.
Organizations' lack of understanding of IoT's specific security requirements hinders its growth potential. An organization can only reap the promise of IoT's benefits if it thinks of the security element as a vital component of implementation.
Download this whitepaper and learn why:
Experiences with security...
The promise of IoT is astronomical - enabling companies across every industry to become a connected service business. But to achieve meaningful results, enterprises need to follow a clear checklist to ensure that all the components in their IoT infrastructure are secure.
Download this whitepaper and learn how your...
Cybercriminals are continuously introducing new, sophisticated financial malware and social engineering tactics to impersonate banking customers. So how can your financial institution let customers in while keeping fraudsters out?
Download this whitepaper and learn how to:
Reduce security costs through simplified...
What security strategies do financial organizations need to consider in the new PSD2 landscape? PSD2 outlines security requirements in three key areas.
Download this whitepaper and learn how to:
Secure customer interactions with third-party providers and banks;
Secure API transactions and account...
How can a financial institution spot a true customer from an impostor in the digital world? Cybercriminals leave footprints for fraud experts that are markedly different than true customers.
Download this whitepaper and learn about fraud clues such as:
The use of a pre-paid SIM card;
Automated or industrial...
Ransomware infections can be devastating, and recovery efforts threaten to financially cripple your organization. Prevention is the most effective defense.
Download this whitepaper and learn 14 ransomware defense best practices including how to:
Implement an awareness and training program;
Enable strong spam...
With threat actors increasingly moving to circumvent anti-malware systems by compromising legitimate on-device tools, there is a growing need to address malware, file-less attacks, and in-memory attacks on endpoints.
Download this whitepaper and learn:
How to use risk-mitigation techniques in order to limit the...
There are several fraud vectors by which open banking can be exploited by fraudsters. Cybercriminals are now experts at exploiting these technologies and processes meant to benefit financial institutions and their clients.
Download this whitepaper and learn how banks are vulnerable to fraud when:
Assessing the...
Open banking has completely transformed banking and customers' expectations. However, just as the open banking era makes business easier for customers, it also enables new opportunities for fraudsters.
Download this whitepaper and learn:
What open banking means for institutions, customers and fraudsters;
The new...
The U.S. government has charged three employees of Chinese cybersecurity firm Boysec with stealing valuable intellectual property from Siemens, Moody's Analytics and Trimble. Security researchers say Boysec has been operating since 2007 and is also known as APT 3 and Gothic Panda.
Like its mythological namesake, the source code for Zeus malware appears to be immortal. New variants continue to surface, including the Terdot banking Trojan, which is also designed to steal email and social networking credentials while remaining hidden.
A presentation on new models to battle email phishing leads the latest edition of the ISMG Security Report. Also, did Uber mishandle ransomware response?
HyphBot botnet malware is forcing infected PCs to sneakily view high-priced video ads, allowing fraudsters to reap upwards of $1.3 million in daily ad spending, a Danish advertising technology firm warns. The scheme highlights the challenges facing online advertisers seeking legitimate viewers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.