Article archive

Financial Institutions Privacy and Security – 2013 Year in Review By Anne Foster and Gerald Ferguson

10/01/2014 13:48
Throughout 2013, financial institutions continued to face serious threats from cybercriminals targeting the personal information of banking customers and their financial assets through the use of malicious software and denial of service attacks (DDoS).  In fact, according to the Verizon 2013...

Comment: Cybersecurity Lessons from the Financial Sector by Matthew Cohen, NT OBJECTives

10/01/2014 13:11
Creating a cybersecurity policy is hard, largely because it’s so difficult to define success. A national cybersecurity initiative should define the goals we want to achieve and provide incentives for the private and public sector to cooperate. According to Matthew Cohen of NT OBJECTives, once that...

Lessons learned from a Password Attack by Robert Siciliano

08/01/2014 19:30
It’s easy for millions of passwords to be stolen via hacking into Facebook, Twitter and Gmail accounts: It recently happened because malware was unknowingly downloaded into computers worldwide that extracted log-in information. The data was then directed to the hackers’ server, which was tracked to...

Cyber attack on Northampton insurance firm ‘potentially affected 93,000 customers' by Ian Gallagher

07/01/2014 13:03
Northampton-based insurance firm Staysure has written to more than 90,000 customers warning them they could have been victims of fraud, after their card details were stolen in a cyber attack. The security breach at the firm, which is based in The Lakes, happened in October last year, and led to the...

Eight hundred data breaches in Scotland over five years

05/01/2014 21:03
There have been more than 800 incidents of data loss by health boards in the last five years, figures have revealed. They include patient notes being found in public places within NHS buildings, documents left in car parks and public transport, and personal information being sent to the wrong...

How to preserve forensic evidence in the golden hour after a breach - By Martin Roots

05/01/2014 10:04
Most IT managers focus on providing their users with a good level of service and support, for example keeping the network up and running and making sure the systems are free from malware. But what should their response be when the boss comes into the office and tells them that one of...

Companies More Vulnerable to Cyber Breaches Around New Year By Sarah Frier and Peter Burrows

05/01/2014 06:29
A string of cyber attacks over the holidays — involving Snapchat Inc., Microsoft Corp.’s Skype and Target Corp. — underscore how companies tend to be more vulnerable to hacking during the end-of-year season. Snapchat saw data for 4.6 million of its users exposed on the Internet on Dec. 31, just...

Cash machines raided with infected USB sticks By Chris Vallance

03/01/2014 22:22
Researchers have revealed how cyber-thieves sliced into cash machines in order to infect them with malware earlier this year. The criminals cut the holes in order to plug in USB drives that installed their code onto the ATMs. Details of the attacks on an unnamed European bank's cash dispensers were...

A Snapchat security breach affects 4.6 million users. Did Snapchat drag its feet on a fix? By Brian Fung

02/01/2014 18:32
Snapchat users are waking up to troubling news: Thanks to a gap in the service's security, the phone numbers and usernames for as many as 4.6 million accounts have been downloaded by a Web site calling itself SnapchatDB.info. The hack appears to be real, affecting at least one member of the...

Cyber Terrorism - Lloyds

02/01/2014 18:18
Industrial facilities from nuclear plants to dams are increasingly coming under attack from cyber terrorists bent on causing physical damage and disruption from behind their computer terminals. But with the insurance market yet to plug the gap between cyber and physical terrorism risk, the Lloyd’s...
Items: 861 - 870 of 888
<< 85 | 86 | 87 | 88 | 89 >>