Keith Alexander is warning financial institutions of the threats their industry faces and offering to help them fight off attackers through his consulting firm.
Researchers have uncovered information about the origins of "Operation High Roller," a campaign targeting victims in the United States and the Netherlands with banking trojans to carry out ACH fraud.
Three men who used the SpyEye trojan to break into online bank accounts have been sentenced to prison in the U.K.
According to an amended complaint filed last week in U.S. District Court in Brooklyn, Microsoft has named two defendants in its Zeus civil lawsuit who previously were listed as "John Does." They currently are in prison.
Fourteen people from South Florida have been charged in connection to a bank fraud ring in which the accounts of unsuspecting customers were accessed to transfer money.
Traditional mafia groups are entering the cyber crime scene in Russia, which is leading to more centralization and professionalization -- and bigger profits.
Criminals are lessening their reliance on the PC. The latest proof is a rogue Android application that seeks to steal Spanish banking credentials through a man-in-the-middle-style attack.
A Romanian citizen, with an expired U.S. visa, has been arrested on charges of serving as the "installer" of skimming devices on some 40 ATMs in the New York City area.
The defendants were part of a coordinated operation that resulted in the theft of more than $2 million from JP Morgan Chase Bank, TD Bank, Citibank, Discover and American Express.
After more than two years of litigation, a U.S. District judge has dismissed nine of the 10 causes of action brought forth as part of a class-action lawsuit by nine banks.
Variants of the Zeus trojan are being used in new Facebook and banking heists, security researchers and law enforcement are warning.
A Georgia bank found a tool to protect financial transactions and payments...while meeting compliance demands, reports Greg Masters.
Attackers have been circulating a trojan via email messages with subjects such as "ACH payroll payment was not accepted by Central Trust and Savings Bank."
Small and midsize businesses have been hit hard by corporate bank account takeovers. But there are easy-to-implement techniques to ensure the criminal passes them over in favor of a lower-hanging fruit.
The organized structure of a huge identity theft operation, based in New York, allowed members to make millions in profits.
Despite fresh guidance and quicker fraud detection, the FBI actively is investigating more than 400 cases of corporate bank account takeovers, an official told federal lawmakers last week. Gordon Snow, the FBI's assistant director of the cyber division, told a House Financial Services subcommittee that these cases, in which criminals initiate unauthorized Automated Clearing House and wire transfers from seized accounts belonging to mostly small and midsize businesses, have resulted in the attempted theft of more than $225 million and actual losses of around $85 million. In his remarks, Snow also discussed risks related to ATM skimming, mobile banking and supply chain compromise.
Researchers at Trend Micro say they have been hot on the tracks of a corporate hacker, and now they are turning over their findings to U.S. law enforcement.
A new survey from FS-ISAC shows that corporate account takeover remains a persistent issue for banks, but they are getting better at detecting the fraud before any money changes hands.
Amazon's Simple Storage Service (S3) is being used to host malicious sites distributing the nefarious banking trojan.
The FBI is probing 20 new cases of U.S. businesses losing millions of dollars to cybercriminals, who then siphoned off the cash to accounts in China.
A new Zeus botnet is targeting the credit card accounts of several major U.S. retailers, including Macy's and Nordstrom, according to researchers at online banking security firm, Trusteer.
In a direct 10-year comparison, the Delaware banking industry's overuse of the FinCEN SAR category of 'Other' mirrors the growth pattern of the malware industry year after year. Are these related?
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context