science and technology Analysis: The Contact-Tracing Conundrum By www.bankinfosecurity.asia Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
science and technology Ensuring Secure Business Continuity Amid COVID-19 Chaos By www.bankinfosecurity.asia Published On :: Full Article
science and technology Your Phone and Your Face: Anchoring Users to Real Identities By www.bankinfosecurity.asia Published On :: Full Article
science and technology Live Webinar | How to avoid the security dangers with working from home (WFH) By www.bankinfosecurity.asia Published On :: Full Article
science and technology Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps By www.bankinfosecurity.asia Published On :: Full Article
science and technology ENISA: App-Store Security - The Five Lines of Defense By www.bankinfosecurity.asia Published On :: The European Network and Information Security Agency published a new report on app-store security where it advocates for a baseline set of "five lines of defense" against malware. Full Article
science and technology HKMA: Statements Issued by Financial Action Task Force on Money Laundering By www.bankinfosecurity.asia Published On :: The Hong Kong Monetary Authority has issued an announcement regarding two updated statements by the Financial Action Task Force on Money Laundering. Full Article
science and technology HKMA: Banking (Amendment) Ordinance 2012 By www.bankinfosecurity.asia Published On :: The Hong Kong Monetary Authority is informing authorized institutions that on Feb. 29, 2012, the Banking (Amendment) Ordinance 2012 bill was passed by the Legislative Council. Full Article
science and technology HKMA: United Nations Sanctions Ordinance By www.bankinfosecurity.asia Published On :: The Hong Kong Monetary Authority has issued a statement on the Chief Executive-in-Council approving United Nations sanctions on Libya and Afghanistan. Full Article
science and technology Ransomware Slams Healthcare, Logistics, Energy Firms By www.bankinfosecurity.asia Published On :: Attacks Traced to Gangs Wielding Nefilim, Snake StrainsRansomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic. Full Article
science and technology Zoom's NY Settlement Spells Out Security Moves By www.bankinfosecurity.asia Published On :: Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption CompanyZoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company. Full Article
science and technology APT Group Wages 5-Year Cyber-Espionage Campaign: Report By www.bankinfosecurity.asia Published On :: Naikon Hacking Group Targeted Asia-Pacific Countries With New RATOver the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research. Full Article
science and technology Hackers Try to Sell 26 Million Breached Records: Report By www.bankinfosecurity.asia Published On :: Data Apparently Obtained From Three Breaches, ZeroFox ReportsHackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox. Full Article
science and technology Digital Contact-Tracing Apps: Hype or Helpful? By www.careersinfosecurity.co.uk Published On :: Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn AgainstTechnology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective. Full Article
science and technology Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.careersinfosecurity.co.uk Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
science and technology Digital Contact-Tracing Apps Must Win Hearts and Minds By www.careersinfosecurity.co.uk Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
science and technology Why Are We So Stupid About RDP Passwords? By www.careersinfosecurity.co.uk Published On :: Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol EndpointsIn honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique. Full Article
science and technology What We've Learned About Business Resiliency By www.careersinfosecurity.co.uk Published On :: Business resiliency and the supply chain - they both were tested by the disruptions we've all experienced. But Patrick Potter of RSA says there are lessons to be learned from the response, and they will guide us as we prepare for the next evolution of our business climate. Full Article
science and technology Analysis: COVID-19 Contact-Tracing Privacy Issues By www.careersinfosecurity.co.uk Published On :: The latest edition of the ISMG Security Report analyzes the privacy issues raised by COVID-19 contact-tracing apps. Also featured: An update on efforts to fight fraud tied to economic stimulus payments; John Kindervag on the origins of "zero trust." Full Article
science and technology Analysis: Ransomware's Costly Impact By www.careersinfosecurity.co.uk Published On :: The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce. Full Article
science and technology Analysis: The Contact-Tracing Conundrum By www.careersinfosecurity.co.uk Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
science and technology Live Webinar | The Fast Lane to Smart Content Governance: How Data-Centric Security Can Help You Survive (and thrive) in a Remote Work World By www.careersinfosecurity.co.uk Published On :: Full Article
science and technology Continuity Amid COVID-19: Ensuring Secure Business Continuity By www.careersinfosecurity.co.uk Published On :: Full Article
science and technology Your Phone and Your Face: Anchoring Users to Real Identities By www.careersinfosecurity.co.uk Published On :: Full Article
science and technology Live Webinar | How to avoid the security dangers with working from home (WFH) By www.careersinfosecurity.co.uk Published On :: Full Article
science and technology JavaScript Skimmers Found Hidden in 'Favicon' Icons By www.careersinfosecurity.co.uk Published On :: Malwarebytes Researchers Say Attacks Appear Related to MagecartCybercriminals are hiding malicious JavaScript skimmers in the "favicon" icons of several ecommerce websites in an effort to steal payment card data from customers, researchers at Malwarebytes say. Full Article
science and technology Ransomware Slams Healthcare, Logistics, Energy Firms By www.careersinfosecurity.co.uk Published On :: Attacks Traced to Gangs Wielding Nefilim, Snake StrainsRansomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic. Full Article
science and technology Zoom's NY Settlement Spells Out Security Moves By www.careersinfosecurity.co.uk Published On :: Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption CompanyZoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company. Full Article
science and technology APT Group Wages 5-Year Cyber-Espionage Campaign: Report By www.careersinfosecurity.co.uk Published On :: Naikon Hacking Group Targeted Asia-Pacific Countries With New RATOver the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research. Full Article
science and technology Digital Contact-Tracing Apps: Hype or Helpful? By www.bankinfosecurity.in Published On :: Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn AgainstTechnology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective. Full Article
science and technology Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.bankinfosecurity.in Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
science and technology Digital Contact-Tracing Apps Must Win Hearts and Minds By www.bankinfosecurity.in Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
science and technology Why Are We So Stupid About RDP Passwords? By www.bankinfosecurity.in Published On :: Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol EndpointsIn honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique. Full Article
science and technology Analysis: Ransomware's Costly Impact By www.bankinfosecurity.in Published On :: The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce. Full Article
science and technology Bangladesh CIRT to Build Sensor Network for Banks By www.bankinfosecurity.in Published On :: The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy. Full Article
science and technology Telework Leads to Changes in India's 2020 Cybersecurity Policy By www.bankinfosecurity.in Published On :: India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator. Full Article
science and technology Analysis: The Contact-Tracing Conundrum By www.bankinfosecurity.in Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
science and technology Ensuring Secure Business Continuity Amid COVID-19 Chaos By www.bankinfosecurity.in Published On :: Full Article
science and technology Your Phone and Your Face: Anchoring Users to Real Identities By www.bankinfosecurity.in Published On :: Full Article
science and technology Live Webinar | How to avoid the security dangers with working from home (WFH) By www.bankinfosecurity.in Published On :: Full Article
science and technology Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps By www.bankinfosecurity.in Published On :: Full Article
science and technology RBI: Security Issues and Risk Mitigation Measures Related to Card-Present Transactions By www.bankinfosecurity.in Published On :: The Reserve Bank of India on Sept. 22, 2011 issued a notification on security issues and risk mitigation measures related to card-present transactions. Full Article
science and technology RBI: Transaction Limit Update to Mobile Banking Circular By www.bankinfosecurity.in Published On :: The Reserve Bank of India has updated its mobile banking circular, dated Dec. 24, 2009, removing the 50,000 Rupees per customer, per day limit. Full Article
science and technology RBI: Mobile Banking Security Lab Launches By www.bankinfosecurity.in Published On :: The Institute for Development and Research in Banking Technology has launched the Mobile Banking Security Lab to explore solutions to the evolving challenges in the area of mobile banking and security. Full Article
science and technology RBI: Information Security Framework Released By www.bankinfosecurity.in Published On :: The Institute for Development and Research in Banking Technology has prepared an information security framework to help banks in benchmarking their systems and enhancing information security. Full Article
science and technology Ransomware Slams Healthcare, Logistics, Energy Firms By www.bankinfosecurity.in Published On :: Attacks Traced to Gangs Wielding Nefilim, Snake StrainsRansomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic. Full Article
science and technology Zoom's NY Settlement Spells Out Security Moves By www.bankinfosecurity.in Published On :: Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption CompanyZoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company. Full Article
science and technology APT Group Wages 5-Year Cyber-Espionage Campaign: Report By www.bankinfosecurity.in Published On :: Naikon Hacking Group Targeted Asia-Pacific Countries With New RATOver the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research. Full Article
science and technology Hackers Try to Sell 26 Million Breached Records: Report By www.bankinfosecurity.in Published On :: Data Apparently Obtained From Three Breaches, ZeroFox ReportsHackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox. Full Article
science and technology Digital Contact-Tracing Apps: Hype or Helpful? By www.careersinfosecurity.eu Published On :: Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn AgainstTechnology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective. Full Article