Ransomware has grown, evolved, and come into widespread use among hackers - and as we head into 2017, it has fully come of age. Hundreds of new variations have sprung up this year alone.
Join three security experts, Sam Kumarsamy, Rod Rasmussen and Sean Tierney, as they cut through the headlines and horror stories...
Upgrading endpoint protection is an important step toward mitigating the risk of sophisticated ransomware and other malware attacks, says George Kaminski of Palo Alto Networks.
Synchronoss' Tracy Hulver on New Identity Strategies for Connected Healthcare Threats
Attackers have healthcare entities in their crosshairs, and their favorite targets are easily compromised credentials. Tracy Hulver of Synchronoss Technologies offers new ideas for how security leaders can reduce risk and protect...
Facebook says it hasn't seen ransomware spreading through its Messenger instant messaging platform despite recent reports from researchers saying that the file-encrypting Locky may have slipped through.
The latest ISMG Security Report leads with a look at the ransomware attack against San Francisco's light rail agency. Also featured is an analysis of the ongoing fallout from Australia's online census project.
Score one for preparation: In the wake of a ransomware attack that infected 900 workstations, the San Francisco Municipal Transportation Agency says it's restoring affected systems, vowing to not give the attackers a single bitcoin of their ransom demand.
Over the past three decades, there have been a great number of technological changes in the financial services world and regulators have struggled to keep up with them. The following white paper discusses the evolution and consequences of the Payments Service Directive and how regulation has gotten more complicated as...
When evaluating and implementing fraud prevention technologies, most security professionals focus on only the fraud avoidance capabilities. They often overlook the potentially significant adverse impact on customers' experience and operational costs. Good fraud prevention solutions must be effective at identifying and...
If you're a fraudster, the tools required to initiate fraudulent transactions have never been more accessible. From well-established banking malware, such as Dyre, ZeuS and Kronos, to more recently discovered malware, such as Shifu and CoreBot, fraudsters have a host of advanced capabilities at their disposal to help...
Local police are investigating ATM skimming attacks at four New York hospitals. Security experts warn that fraudsters will likely continue to target locations, including hospitals, where ATMs are not closely monitored and around-the-clock access to the terminals is available.
When a medical device malfunctions, many healthcare organizations don't realize the problem might be related to a cyberattack, says Rob Bathurst of Cylance.
As more organizations take advantage of cloud computing, it's essential that they set precise security expectations with their vendor partners, Carson Sweet of CloudPassage says in this video interview.
A ransomware attack against San Francisco's Muni public transportation network attack over the busy Thanksgiving holiday - and Black Friday shopping - weekend left more than 2,000 fare-handling systems locked, leading officials to let people ride for free.
IBM commissioned Forrester Consulting to conduct a Total Economic Impact study and examine the potential return on investment (ROI) enterprises may realize by deploying IBM Trusteer solutions. The purpose of this study is to provide readers with a framework to evaluate the potential financial benefit of IBM Trusteer...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.