2014 has seen an explosion of mobile banking demand and services. But as the channel grows, so do the threats against it. What are today's top threats, and how can institutions offer more secure mobile banking?
An investigation into a suspected breach at JPMorgan Chase suggests that attackers used highly customized malware, and exploited multiple zero-day vulnerabilities, to breach the bank's network, according to news reports. But were other banks hit?
Too many organizations fail to adequately manage and secure their SSH keys, even though the keys secure everything from file transfers and backups to patching and database management, NIST warns in new draft guidance.
A Twitter chat featuring Gartner's Avivah Litan offered a lively discussion of numerous fraud-related issues, including card breaches, weak authentication and the need for mobile scrutiny. We'll host more chats soon.
Initial reports suggested that Russian hackers could behind an attack against JPMorgan Chase, and perhaps other U.S. banks. While it's still far from clear who the culprits are, experts discuss the potential hacking motivations of a nation-state.
Information Security Media Group recently hosted a Twitter chat on the latest fraud trends featuring analyst Avivah Litan, director of research at Gartner, Read the entire transcript of the #ISMGprotalk Twitter chat.
Early reports suggested Russian hackers are behind complex attacks and network intrusions at multiple U.S. financial services firms, including JPMorgan Chase. But security experts warn against jumping to conclusions, based on scant evidence.
The PCI Security Standards Council has issued an alert offering insights for mitigating the threat of "Backoff" POS malware, which has hit 1,000 U.S. businesses. Plus, the council is providing updated guidance for maintaining PCI-DSS compliance.
Russian hackers stole data from JPMorgan Chase and at least one other bank in a mid-August attack against the U.S. financial system, according to a Bloomberg news report. The attack allegedly resulted in the loss of "gigabytes" of sensitive data.
In an in-depth interview, Adam Sedgewick, the point man for the NIST cybersecurity framework, addresses misconceptions about the guidance, the costs to implement it and its role as a marketplace catalyst.
Digital privacy isn't a privilege or a policy. It's a fundamental human right, says Rajesh Vellakkat, partner in the law firm of Fox Mandal & Associates. What are today's top legal challenges to privacy?
News that Community Health Systems suffered a massive data breach illustrated yet again the U.S. healthcare sector's vulnerability. This infographic takes a look at the top five health data breaches in recent years.
The IAPP has launched a new privacy certification designed for IT, security and engineering pros. What are the key elements of this new program? JC Cannon, a privacy author and educator, shares details.