Just one click: That's all it takes for a victim to inadvertently grant attackers access to their email account via a third-party application. Here's how to spot signs of OAuth-related hacking and how to defend against it.
Recent failures of IT systems at some major airports and banks are a reminder that as an organization launches a digital transformation project, or seeks to move more of its processes to the cloud, those efforts won't necessarily proceed smoothly or securely, says Skybox Security's Justin Coker.
Symantec says it has uncovered a cyber espionage campaign that targets telecommunications operators in Southeast Asia - as well as a defense contractor and satellite communications operator - and warns that the hacking group, dubbed Thrip, may be laying the groundwork for more destructive attacks.
The latest challenge to face CISOs: Finding the best way to keep their organization secure while at the same time navigating political edicts that may lack any technical detail or present solid facts or alternatives to suspect technology, says Jaya Baloo, CISO of KPN Telecom.
For attackers, "credential stuffing" - using stolen usernames and passwords to log into any site for which a user reused their credentials - is the gift that keeps on giving, says security researcher Troy Hunt. Here's how organizations can mitigate the threat.
The explosion in the growth and diversity of devices linked to networks as a result of the internet of things and BYOD makes it more challenging to manage network security, says Wallace Sann of ForeScout.
The anti-Kaspersky Lab rhetoric continues to heat up, with the European Parliament passing a motion that brands the Moscow-based firm's software as being "confirmed as malicious." In response, Kaspersky Lab has halted all work with European institutions, including Europol, pending clarification.
Leading the latest edition of the ISMG Security Report: An analysis of how distraction tactics were used during a $10 million SWIFT-related hack at Banco de Chile. Also, a wrapup of Infosecurity Europe.
Forrester recently surveyed 100 IT and IT security executives to understand the approaches and challenges your peers experience with user authentication and access management.
Curious to hear how you compare to your peers? Read the Forrester Report.
Banco de Chile has become the latest victim of a SWIFT-related malware incident. Attackers first corrupted thousands of PCs' master boot records as a distraction. Then they used fraudulent SWIFT messages to steal $10 million.
Existing security controls are outmatched - at best static and reactive. Current layers likely aren't protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low...
The apps financial services organizations depend on to fuel productivity, innovation and success are truly unique. But how is the industry evolving to adopt new technology that can offer the reliability, security and compliance it requires?
Download Okta's annual Businesses @ Work report which provides an in-depth...
Organizations in various industries are under increased pressure to identify subtle patterns that indicate fraud before customers are targeted by threats including account takeover, identity theft, and application fraud.
Companies have turned to Machine Learning (ML) to stay ahead of the next generation of...
99% of account takeover attacks begin with automation, and they pave the way for future ATO. Today's sophisticated scripts can bypass traditional measures that rely purely on device intelligence or static data. Learn how to block sophisticated attacks with behavioral biometrics before they create fraud losses.
A recent analyst report stated 80% of respondents confirmed the use of Web Application Firewalls (WAFs) to protect public-facing websites and applications, but most have remained frustrated, disappointed, and concerned that their WAFs may not be covering all of their security requirements. Your basic and/or outdated...