Security teams safeguarding web applications deal with a lot: delivering security capabilities that integrate into a living, breathing software organization that can cope with determined attackers, and that can scale to meet the needs of the enterprise in the future.
This whitepaper will teach you everything you...
Security teams safeguarding web applications deal with a lot: delivering security capabilities that integrate into a living, breathing software organization that can cope with determined attackers, and that can scale to meet the needs of the enterprise in the future.
This whitepaper will teach you everything you...
If you're thinking, "Mobile threats and malware are still in their infancy and the risk isn't significant enough yet," it's time to think again. The rise of advanced, PC-grade mobile malware, innovative fraud schemes, such as SIM swap fraud, and fraudsters' increasing use of mobile devices in cross-channel attacks...
New details have emerged relating to the 2015 hack attack against French broadcaster TV5Monde, which resulted in multiple television channels going dark as well as social media channels run by the broadcaster being hijacked and used to spew purported jihadist propaganda.
The Faster Payments Initiative may help businesses shorten clearing times for financial transactions, and benefit personal banking consumers by ensuring that transactions and bill payments are completed in a timely fashion. However, fraudsters will look to exploit any system vulnerabilities to their advantage. Shorter...
PSD2 both presents opportunities and introduces new requirements for banks. Proactive, early-adopting organizations will be able to meet the new demands rapidly. By creating new alliances and providing innovative services, they will be able to provide value for both themselves and their customers.
Download this...
Since the major DDoS attacks of 2012, the threat landscape for financial institutions has dramatically evolved. Banks are now facing a whole host of problems including credential abuse, account takeover, and fraudulent money movements.
Download this interview transcript with Rich Bolstridge of Akamai Technologies...
Score another one for social engineering: A phishing campaign used a bogus "Google Docs" app to trick people into surrendering full access to their Google accounts and contacts. Before Google squashed the campaign, up to 1 million of its users may have fallen victim.
In the global panorama of financial cybercrime, one year might bring little change, with the same types of malware continuing to target the same geographies, while the next can be very active. That was certainly the case 2016, with some countries seeing a marked rise in the attention of cybercriminals.
Download...
Thousands of high-profile Twitter accounts have been spewing swastikas and spam following the hack of a popular third-party Twitter service called Counter. Sites tied to Amnesty International, the BBC and even tennis star Boris Becker were affected.
Security teams safeguarding web applications deal with a lot: delivering security capabilities that integrate into a living, breathing software organization that can cope with determined attackers, and that can scale to meet the needs of the enterprise in the future.
This whitepaper will teach you everything you...
Who are the top cybercrime groups, and what security lessons can we derive from their latest attacks and attack vectors?
Download this interview to explore:
The evolution of cybercrime groups;
The latest attacks, including ransomware and account takeover;
Fox-IT's latest threat intelligence on who the...
The proposed creation of a CERT dedicated to serving India's financial sector is good news. But working out a realistic framework for its activities and defining its role in ensuring stronger security for the sector will prove challenging.
FS-ISAC is collaborating with the Monetary Authority of Singapore to establish the Asia Pacific Regional Intelligence and Analysis Center to encourage regional sharing and analysis of cybersecurity information within the financial services sector. Security experts weigh in on the value of the initiative.
An overlooked security setting on Twitter may have allowed a hacker to guess the password-reset email addresses tied to accounts used by President Donald Trump, first lady Melania Trump, Vice President Mike Pence plus a top adviser. What's the risk?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.