Apps for wearable devices that are designed to track a user's pulse rate, blood-oxygen level or location may be leaking that data during transmission, Symantec security researcher Candid Wüeest warns in a Black Hat Europe briefing.
Every company will have a different path to mobile adoption, and final implementations will vary, depending on the needs of various business functions and on regulations that impact mobile policies. A simple way to evaluate where a business is and where it wants to be is to look at devices in terms of who owns them,...
Disconnecting systems from the Internet via an "air gap" is supposed to make the data they store harder to steal. But at Black Hat Europe, cryptographer Adi Shamir demonstrated how a laser and drone can be used to bypass air gaps.
Heartbleed, Shellshock, targeted attacks - the security threats to banking institutions are legion. And there are new ways banks can get better at detecting these evolving threats, says Solutionary's Jeremy Nichols.
Amsterdam is again playing host to the annual Black Hat Europe information security gathering, and presenters have promised to cover everything from privacy flaws in wearable computers to two-factor authentication system failures.
Our opening keynote session will set the stage for the Summit's agenda. Our keynote speaker will provide a state of the industry update focused on the types of adversaries that are out there, how they are funded and organized, and what their intent is in attacking organizations. We will also examine the potential...
Session Preview:A complete defense cannot be deployed overnight. There are multiple people, process and technology components to consider and implement. In the closing session, we will help identify where and how resources can be focused to have the biggest immediate risk reduction, discuss lessons learned from real...
See the startling results of meticulous analysis of hundreds of real-life insider attacks and learn about new technologies that are able to detect the anomalous behavior patterns often before fraud occurs.
The analysis results clearly indicate that, contrary to the majority of headlines, stealthy insiders pose a...
Part 1 - Fraud Ecosystem
In June this year, the "Ronald Reagan" batch of credit cards (potentially those stolen from P.F. Chang's) joined the "Barbarossa" batch from Target in becoming publicly available for purchase. These cards were featured on the popular Rescator card shop (stolen card data marketplace), which...
The last five years have seen an explosion of technological innovation which brought many opportunities for business growth. Combined with the associated changes in socio-economic behaviours, the pace of change has also brought new risks and opportunities for criminals to become even more innovative.
Whilst providing...
This session provides a detailed review of BankInfoSecurity's "Faces of Fraud" survey focused on the European market. Receive insights and expert analysis on topics such as:
How are the areas of retail, payment card, in person, insider and mobile fraud evolving?
Which aspects of the new Canadian legislation are...
If JPMorgan Chase, which was considered one of the most secure organizations in the world, can be breached, then virtually all other banks likely are at risk, too. Experts explain why early detection and information sharing are key to mitigating threats.
Undoubtedly, your network is more complex than ever. Your employees are accessing applications, using personal or work devices, but corporate risk and security factors are often ignored. Your business is a target. Are you prepared in the best possible way? The complexity of your network and infrastructure security may...
Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated...
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.