In its simplest form, online banking fraud is a relatively straightforward process. Like all fraud chains, it can be split to main two parts: obtaining compromised credentials and cashout.
Browsing: News & Analysis
We published latest Information security news with experts and Industry leaders insight and analysis
I’ve written before about the huge benefits you can reap if you plan for large sitewide outages by giving yourself access to all the troubleshooting tools you’ll need ahead of time.
Security researchers often walk a very thin line between what is legal and what is illegal, and knowing the difference is not all that easy, especially given the current state of the law.
Barely two months after rolling out two-factor authentication, Twitter has beefed up its login procedures yet again, both to improve security and to make two-factor available to more Twitter users worldwide.
Almost nine out of 10 senior staff members from Australian organisations have access to corporate data on their personal mobile phones.
The programme that replaced the disastrous FiReControl Project could run into trouble due to a lack of the right IT and procurement skills, according to the Public Accounts Committee (PAC).
Contract market vacancies grew by +16.65% month-on-month, double the rate of permanent vacancies, in May 2013 across the IT industry, according to the IT Monitor from Computer People.
Reported data loss due to security breaches is not slowing down in the least bit, as the graph below (courtesy of DataLossDB.org) vividly points out. What’s more, these statistics only include publicly reported breaches.
Wisegate, a private, practitioner-based IT research service for qualified senior technology professionals, released a new industry case study designed to help IT professionals who are considering moving applications and/or data to the cloud
Fraud has become an industry, with cybercriminals seeking profits through innovation, automation, commoditization and specialization. How do you respond to this criminal industry to ensure trust in IT?