Things to do before the next big thing: How the financial industry reacts to cyberthreats
How the financial industry reacts to cyberthreats
176 articles
How the financial industry reacts to cyberthreats
Shamoon is back with a new version, and this time it is accompanied by another piece of similar malware with far more advanced evasive technologies
True cybersecurity experts must be skilled at reverse engineering. Prior to SAS, Nico Brulez will hold a corresponding training session.
New NSS Labs test utilized new methodology, however it’s results raised some serious questions
Sometimes ATM operators make criminals’ jobs easier by leaving banking machines’ network equipment accessible.
Analysis shows that the attackers are particularly active during the holiday period.
Who is responsible when connected devices go on a crime spree?
Yet another example of an attack against an ATM: This time the cash machine itself is emulated.
For many SMBs SaaS can provide a cost effective way to take advantage of technology through a cloud-based, subscription model.
To protect critical infrastructure, industrial facilities need a way to share information.
With accessible network cables and a lack of authentication between the ATM and the bank’s infrastructure, ATMs are far too easy to attack.
Our experts made a short video showcasing a proof-of-concept attack by a criminal who has physical access to the ATM’s internals.
We asked more than 3,000 representatives of small and medium-sized companies how they manage to cope with cryptomalware in the constantly changing landscape of cyberthreats.
Mobile banking is easy and convenient, but its adoption rate is still far from ideal.
Kaspersky Lab, the Dutch National Police, Europol, and Intel Security are joining forces to launch a new initiative to battle ransomware worldwide. The initiative is called “No More Ransom.”
Spanish magazine Red Seguridad recently granted an award to the Kaspersky CyberSafety Management Games training program.
It now appears the number of servers bought and sold via xDedic might have been underestimated; it’s likely many more IPs have been compromised by xDedic players.
Theoretically, every business should have already learned how to protect itself against ransomware. Actually it’s not the case.
This year is the 120th since the invention of a tin foil hat – simple to produce and very efficient information security tool, preventing those warping and state-altering attacks targeted at our minds.
Kaspersky Security Analyst Summit has begun! In this post we’re running a liveblog from the event – thoughts and impressions of the participants, updated in real time. So everybody’s welcome!