CrowdStrike is out with its 2019 Global Threat Report, which includes a ranking of the most dangerous nation-state adversaries. The company's CTO, Dmitri Alperovitch, discusses the report's key findings about threats and threat actors.
Reviewing 2018 attacks, Jon Clay of Trend Micro, says social engineering persists, including phishing attacks, while criminals also continue to steal credentials, lob ransomware at targets and push cryptomining malware.
As CEO of Terranova Security, an awareness training provider, Lise Lapointe sees an evolution of education programs that used to be merely phishing simulation tests. What are the most effective forms of training?
Email fraud and phishing continue to be an effective attack vendor as they are relatively inexpensive and take advantage of the weakest link in your security program: your users. Combatting these attacks is slow and labor intensive as security analysts typically spend hours trying to determine if an email and its...
Organizations lose an estimated 5% of their annual revenue to fraud. Clearly, an organization that focuses on assessing fraud risks is better prepared to deter and prevent fraud incidents. How confident are you that your organization has an effective and comprehensive fraud risk assessment?
Our panel of anti-fraud...
A variant of the long-running Ursnif banking Trojan is able to better evade security protection and has the ability to steal not only financial information but also email user accounts, the content of inboxes and digital wallets, researchers report.
The 10th annual IRISSCERT Cyber Crime Conference, to be held Thursday in Dublin, promises to round up crime trends and also offer updates on incident response lessons learned, spam fighting and even cybersecurity essentials for children.
"Know your customer" is a familiar refrain in business circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation-states, cybercrime gangs or lone...
Those of you who are CISOs and have been conducting awareness programs for years realize that ''the devil is in the details" when building a successful program. Initial attempts to get an awareness program started are usually done by trial and error- but this hit-and-miss approach is often ineffective or frustrating....
In the wake of digital transformation and several large, high-profile data breaches - and at a time where all the personal information is shared in the social network - traditional forms of digital identity verification are no longer valid.
Ninety-six percent of polled security leaders say that a frictionless...
Better, stronger fraud-detection intelligence - that's the promise of the new 3-D Secure 2.0 protocol for digital merchants, networks and financial institutions. But what should organizations do to prepare? James Jenkins of CA Technologies weighs in.
Mexico's central bank says attackers attempted to hack its interbank electronic transfer system, but says no client money was lost. It's activated "contingency measures" at the targeted banks and says payment transfers could slow as a result.
A handful of popular music videos published on YouTube were defaced on Tuesday, with two hackers claiming credit. But Google, which owns YouTube, says that tampering didn't occur directly on its platform.
E-commerce is growing at an unprecedented pace, which leads to e-commerce fraud rising just as fast. Actual fraud costs you revenue, but unnecessarily denying transactions and adding too much security can cost you just as much - if not more in some cases.
Download this whitepaper and learn how to:
Malaysia's central bank, Bank Negara Malaysia, says it detected and successfully blocked an attack that attempted to steal funds via fraudulent SWIFT interbank money-moving messages. The attack against BNM led the central bank of the Philippines to issue an alert to banks in that country.