Thai police say they have identified all of the suspects allegedly involved in recent "jackpotting" malware attacks against 21 ATMs, leading to the theft of 12 million baht ($350,000). The malware is a new strain called "Ripper," raising concerns for banks worldwide.
A report on an FBI warning to state election officials that their IT systems could be hacked leads the latest edition of the ISMG Security Report. Also, Australian officials mull bitcoin technology to secure elections.
To keep up with emerging threats, banks and other organizations in Saudi Arabia and throughout the region must develop much more mature incident response functions, says Mohammed Almozaiyn, who heads incident response for a leading Saudi bank.
Why is the Asia-Pacific region lagging far behind Europe and the United States in detecting data breaches? Rob van der Ende, vice president at FireEye's Mandiant, analyzes the results of the firm's new M-Trends Report 2016 for the Asia-Pacific Region and pinpoints breach detection shortcomings.
Many Asia-Pacific organizations are woefully unprepared to detect and respond to data breaches, according to Mandiant's M-Trends Report 2016. In fact, the report finds that the median amount of time it takes to discover an attack in the region is 520 days.
Two hotel chains - Millennium and Noble House - are warning that they've suffered point-of-sale malware infections that compromised customers' payment card data. Both say they were alerted to related card fraud by the U.S. Secret Service. Could the breaches be tied to the Oracle MICROS breach?
If leading intelligence agencies can seemingly hack a wide variety of IT gear, what hope is there for enterprise security? Experts describe how organizations should respond to the recent dump of attack tools from the Equation Group, which is widely believed to be tied to the NSA.
Ashley Madison, the extramarital online hookup service breached by attackers in 2015, has agreed to bolster its information security and data retention practices after regulators in Australia and Canada ruled that the site violated local privacy laws.
The surge in data breaches and the pervasiveness of malware, especially ransomware, has led to a surge in security technology startup firms, which makes it much tougher for CISOs to choose the right business partners in the overcrowded marketplace, argues Raimund Genes, CTO at Trend Micro.
Many organizations take months or years to discover they've been victimized by breaches because they lack experienced cybersecurity personnel, says employment researcher David Foote. The "maturing of the workforce" will take considerable time, he says in an interview.
In this video interview, Global Cyber Alliance CEO Phil Reitinger explains how the vastness and complexity of the internet creates cyber vulnerabilities, but one day those same characteristics, if used properly, could mitigate cyber threats.
Epic Games is warning of another data breach - its second in 13 months - involving several of its forums and affecting about 808,000 accounts. Attackers appear to have exploited a SQL vulnerability in Epic's vBulletin forum software.
Indian organisations are easy prey for Pakistani hackers who are defacing their websites and sometimes also blocking transactions. But law enforcement is finding it challenging to crack down on foreign hackers because of uncertainty over which Indian laws apply.