As the global threat landscape shifts, so does Kaspersky Lab. Whereas Kaspersky Lab traditionally has been known for its cutting-edge research on threat trends and malware evolution, now the focus is expanding to encompass the new types and vectors of fraud impacting enterprises, says Emma Mohan-Satta, a Fraud...
The fraudster who is selling Australian Medicare numbers has clocked one more sale over the past day as the government and federal police try to figure out how its systems were illegally accessed.
Phishing attacks are on the rise, due in large part to how easy to launch and lucrative they are for the attackers, says Brooke Satti Charles of IBM Trusteer.
"Phishing is a really easy way to perpetrate an attack," says Satti Charles, a financial crime prevention strategist. "Creating a sophisticated way to break...
A senior Russian government official warned that Moscow will retaliate if the Senate moves to ban the use of Kaspersky Lab software by government agencies. Meanwhile, CEO Eugene Kaspersky has repeated his offer to allow U.S. officials to review the company's source code.
Ransomware attacks are increasingly using multiple proven techniques to spread quickly and achieve the maximum impact before being thwarted. They are going to get bigger and target other platforms in the future, warns Justin Peters at Sophos APAC.
With the exception of one large theft incident involving an insider, hacker attacks - including some involving ransomware - continue to be the leading culprits in the biggest health data breaches reported so far this year. What's next?
Despite significant efforts by the payment industry to systematically address ATM security, vulnerabilities associated with these devices continue making them attractive targets of opportunity for criminals.
Download this whitepaper and learn how a balanced approach to ATM security can address incorrect...
Yes, it is an insecure world out there, and today's app portfolio is responsible for the numerous vulnerabilities businesses face. But RASP (runtime application self-protection) can be a solid defense and a way to isolate and neutralize a potential threat, so you can operate your business safely in these uncertain...
Usability doesn't have to come at the expense of a more secure app, and security doesn't require making an app more complex to use. The net result is that cyber-criminals and other attackers can be neutralized with the right choices that are both usable and secure.
To make your mobile banking app easier and safer...
Consumers want to use mobile for everything from banking to shopping to gaming. However, mobile is notoriously flawed when it comes to security measures. As you bring your services into the mobile ecosystem, there's great potential for expanding your business, but also great potential for threats - to your...
Ransomware has evolved from its early sneaker-net roots, leveraging the Internet and email to spread to different computers. However, it still follows a predictable script, not all that different from the original AIDS Trojan.
In this guide, we'll help you better understand the role that bitcoin plays in ransomware,...
Automation speeds up the delivery of applications by automating the delivery of the resources they require, including networking, security, and the infrastructure that supports application development.
Download this whitepaper and learn how automating IT can solve challenges such as the lack of standardization and...
When your IT organization embraces an approach that fully automates the delivery and management of infrastructure and applications, including network and security operations, you are positioned to accelerate service delivery and respond faster to the dynamic needs of a digital business. Automation helps you eliminate...
As digitalization drives the need for speed in IT resource delivery, organizations that still practice traditional provisioning of network and security services will keep falling behind their competitors. For IT to fully automate the delivery of secure, scalable, and high-performing multi-tier applications,...
Sixty-five percent of security leaders consider their organizations' security postures to be above average or superior, as compared to peers in their sectors.
Yet, only 29 percent say that they are very confident in the effectiveness of their security controls, and nearly half say that they have gaps in detecting...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.