Exploiting a vulnerability in Microsoft Office, a group of hackers believed to be Russians breached computers operated by the Ukrainian government during September's NATO summit, according to iSight Partners.
Part 1 - Fraud Ecosystem
In June this year, the "Ronald Reagan" batch of credit cards (potentially those stolen from P.F. Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. These cards were featured on the popular Rescator card shop (stolen card data marketplace), which...
Emerging reports now suggest other financial institutions may have been targeted by the same hackers who breached Chase. But how can we be sure? Mark Clancy of the Depository Trust & Clearing Corp. explains why the analysis is challenging.
Even as Indian organizations shake off red tape and lethargy in an effort to consolidate and streamline their security infrastructure, the Internet of Things promises to make the waters even murkier.
Malware known as "Mayhem" that targets Unix and Linux systems has been updated to exploit Shellshock flaws, security experts warn. But with few Unix-flavor systems running anti-virus software, how can it be stopped?
Information security vendor Symantec announced Oct. 9 that it will spin off its information management business into a separate publicly traded company. Find out the details.
Malware-wielding attackers have compromised 800,000 online banking credentials, mainly for customers of the five largest U.S. financial services firms, a new study warns. But they may also be preparing for APT attacks against financial institutions.
Citigroup, E*Trade, Regions Financial, Fidelity Investments, HSBC, Bank of the West and ADP are now believed to have been probed by the same hackers that targeted Chase, according to news reports. But so far, none of those firms believes data was compromised.
How do fraudsters go about stealing identities, and how can you stop them? ID verification company Jumio spoke to convicted ex-fraudsters, professional criminologists, law enforcement practitioners and fraud managers to uncover some of the most commonly used exploits. This white paper presents what they heard...
Nearly two weeks since news of Shellshock broke, attacks that are taking advantage of the Bash vulnerabilities are grabbing headlines. But Michael Smith of Akamai warns that the battle against hackers capitalizing on Shellshock could go on for years.
Organizations trying to combat advanced threats with existing security infrastructure may pay a price, says Blue Coat's Venkat Raghavan. A shift to a data and intelligence-driven architecture is an imperative.
This "State of Infections" report discusses the state of the enterprise under attack and trends in threats seen in the second quarter of 2014.
Key findings in this report include:
The rise of ransomware;
The relationship between the size of an enterprise and its infection rate.
Bond insurer MBIA says it's investigating a potential data leak at its asset management subsidiary, Cutwater Asset Management, which may have led to certain client information being illegally accessed.
Hacking a car remotely might have seemed like science fiction a few years ago. But as cars are added to the "Internet of Things," the industry is ramping up its efforts to address ever-evolving, and realistic, security issues.
Yahoo confirms Shellshock-targeting attackers hacked into three of its servers, but claims they didn't exploit Bash flaws. Meanwhile, Lycos denies it's been breached and WinZip isn't responding directly to a report that it was hacked.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.