Needing more than signature-based remedies, First Financial Bank found a way to close the gap between what exists and what's possible. Greg Masters reports.
A Consumer Financial Protection Bureau campaign to curb deceptive banking activities has resulted in U.S. Bank being ordered to refund $48 million.
In an interesting twist, financial malware Citadel was used to infect firms outside of the finance sector via APT attacks, Trusteer found.
The suspect, Godswill Oyegwa Uyoyou, conspired with others to hack bank systems and divert 6.28 billion Naira to mule accounts.
This summer's attack on the bank's network might have helped hackers detect subtle vulnerabilities they could exploit in the future.
The "Cybersecurity: Protecting the Payments Systems" summit will encourage coordination between all cybersecurity and industry entities.
Android devices in Korea have primarily been impacted by the malware.
Hackers exploited a zero-day vulnerability and gained access to sensitive information from JPMorgan Chase and at least four other financial institutions, reports indicate.
More than 12,000 messages have been sent to more than 400 companies as part of a phishing campaign targeting users of Bitcoin wallet Blockchain.info.
The National Bureau of Investigation (NBI) warned that the incident showcases the growing incidence of ATM skimming fraud.
The guidance is meant to help merchants and third parties better understand their roles and responsibilities in the payment security ecosystem.
Two hackers demonstrated how device vulnerabilities could allow attackers to access sensitive card data using multiple attack vectors.
Trusteer, an IBM company, said the new Citadel configuration was detected this month.
Symantec researchers found a new variant of the banking trojan.
On Tuesday, Trend Micro released a report detailing Operation Emmental, which targets victims in Austria, Switzerland, Sweden and Japan.
Bloomberg revealed that hackers used two zero-day flaws to breach NASDAQ's servers in 2010.
On Wednesday, Symantec released details on the malware's developed features.
Trusteer, an IBM company, revealed details on the bolware variants, which employ new tactics to manipulate web pages used for Boletos transactions.
Australia-based Bitcoins Reserve lost more than $62,000 after phishers began targeting bidders interested in the auction of 30,000 Bitcoins confiscated in the Silk Road takedown.
RSA has revealed the extent of bolware attacks in the country, which have remained a pervasive issue in the financial sector.
A point-of-sale and security systems vendor is notifying its customers, some of which are big restaurant chains, that its remote access service was breached.
The new Zeus variant employs AES-128 encryption as opposed to the older RC4 cipher used by other Zeus iterations.
Researchers with PhishLabs analyzed nearly 9,000 phishing kits and learned that financial groups and social networks are most targeted.
So far, the new variant has targeted 14 major banks in the country, Trusteer found.
After accessing operator mode on an ATM, two ninth graders in Canada promptly notified the machine's owner, the Bank of Montreal.
Chip technology can prevent criminals from producing counterfeit credit cards.
Researchers with IntelCrawler have uncovered "Nemanja," a point-of-sale malware that has infected nearly 1,500 devices and has compromised close to half a million payment cards.
Customers of Paytime Inc. may have had personal information compromised after hackers took advantage of a vulnerability in the Pennsylvania payroll company's systems.
Anyone needing cash in Poland soon will have access to ATMs that feature biometric security.
PhishLabs estimates that as many as 400 payment cards per day are compromised through the "vishing" attacks.