Menu

Blogs

Showing Blog Posts: 1–10 of 161 tagged Hackers and Threats

  • How Cybersecurity Impacts Customer Loyalty

    by Alisdair Faulkner on June 21, 2016

    When it comes to banking, e-commerce and other online activities, fraud is one of consumers’ top concerns. In fact, insights from a recent First Annapolis and ThreatMetrix consumer study showed that more than half of consumers (55 percent) are extremely concerned about the risks of banking and payments-related fraud, with 46 percent indicating their fraud concerns have increased in the past two…

  • RSA Conference APJ Poll: Are You Prepared for a Cyberattack?

    by Jennifer Lawinski on June 20, 2016

    When it comes to cybersecurity, professionals working across the globe know that they’re fighting tough enemies who only need you to make one mistake to get into your network. As we gear up for RSA Conference Asia Pacific & Japan 2016 in Singapore this July, we took the time to ask you, the cybersecurity community in the region, a few questions to get a feel for what you’re dealing with every day. …

  • Banks Need to Rethink Cybersecurity After Recent Heists Through SWIFT

    by Caitlin Moriarity on June 17, 2016

    Cyberheists are on the rise. But how are hackers getting into financial institutions with some of the best security on the planet? Through a third party, it turns out. A number of major international cyberheists have been connected to the interbank SWIFT messaging system. Tien Phong Commercial Joint Stock Bank, based in Hanoi, Vietnam, said in a May 15 statement that it had recently foiled an…

  • Plan, Pray, or Pay: What to Do After a Ransomware Attack

    by Ryan Berg on June 14, 2016

    If you’re not planning, then you’re praying. And praying doesn’t lower your odds of having to pay when ransomware hits. In the immediate aftermath of a ransomware attack—once you get past the initial confusion and shock—you’re likely to find the limited options available to you were determined by choices you made (or didn’t make) weeks and months ago. Yes, there are things you can do to try to…

  • iOS Attacks: A Rapidly Evolving Threat Landscape

    by Yair Amit on June 9, 2016

    Early in the adoption of enterprise mobility, iOS was considered the “better” choice. A more stable and consistent operation system was preferable for developing custom apps, and Apple’s iOS operating system was believed to be inherently more secure than Google’s Android due to the controlled app store ecosystem and better app sandboxing mechanisms. Fast forward to today and we see that…

  • The Dangers of Skimmers and Safes in Hotel Rooms

    by Dale "Woody" Wooden on June 6, 2016

    This is part two of my series on hotel safety for protecting intellectual property and personal information. We will be starting where my past article “Executive Hotel Rooms Are A Hackers Treasure Chest” ended. You’re in your room and ready for bed. You put your wallet or purse on the nightstand and settle down for sleep. That is where the fun begins. You have heard about RF skimmers—the product…

  • Small Business: Wake Up to Growing Cyber Threats

    by Robert Ackerman Jr. on June 3, 2016

    A few months ago, Rokenbok Education, a Solana Beach, Calif., maker of educational toys, was facing perhaps the quintessential nightmare of the 21 st century. Cyber criminals had encrypted the company’s computer files, rendering them useless. The hackers were deploying ransomware. If Rokenbok wanted the data unlocked, it would have to pay a ransom. As the New York Times reported, the company…

  • What Do Hackers Want from Professional Sports Teams?

    by Rook Security on June 2, 2016

    By Mike Patterson, Vice President of Strategy, Rook Security Recently, the Milwaukee Bucks basketball organization went public with a successful W-2 phishing attack that targeted its players and employees. While this is probably not the first attack of its kind, it is a new known data point in attacks against sports teams. In 2015, incidents targeted baseball player scouting data (involving the St. …

  • The Most Overlooked Ways to Prevent Getting Hacked

    by Caitlin Moriarity on May 17, 2016

    In a world where cybersecurity threats are continually evolving, you'd be surprised how simple it is to prevent getting hacked. "The difference between a company that gets hacked and the company that doesn't get hacked, I've found," says Norman Guadagno, chief evangelist at Carbonite, "is the difference between who clicks a link in their email, and who doesn’t." Threats are everywhere All business…

  • RSA Conference Greatest Hits: April 2016

    by Jennifer Lawinski on May 6, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite posts and videos in the month of April this year? Top Blog Posts 1. Executive Hotel Rooms Are a Hacker’s…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 26 Jun 2016 07:45:03 -0400.
© 2016 EMC Corporation. All rights reserved.