It has been a tough few weeks for online payments giant PayPal. First came the confirmation that an authentication hack would enable an attacker to access an account once credentials had been phished, bypassing the financial firm’s authentication tools. And now another security report claims the entire authentication process can be bypassed, enabling an attacker to … Read morePayPal ‘Critical’ Login Hack: New Report Warns You Are Now At Risk From Thieves
The big headline-grabbing stories of IT security breaches tend to focus around shadowy hackers or nation state operatives pushing buttons and pulling strings in the background. But the truth is that many security incidents these days come as the result of human error inside the breached organisation. In fact, new research claims that 90% of breaches reported … Read moreInsider breaches on the rise: How to get a handle on human error
Since the $81 million Bangladesh Bank online heist in 2016, the nation’s banks have made some progress in cybersecurity, but they still have a long way to go, says Prabeer Sarkar, CEO of Dhaka Distributions, a local cybersecurity company. “Cybersecurity has only recently come out from the endpoint security stage,” he says in an interview with Information Security … Read moreThe Cybersecurity Challenges for Banks in Bangladesh
The message even seems to originate from your office email domain except for one letter… Beware the era of conversation hijacking! Researchers have seen a sharp rise in domain-impersonation attacks used to facilitate “conversation hijacking”, making it more effective and costly to enterprise. In 2019, the Singapore Police Force said there were 279 reports of … Read moreDid your CEO just email you to wire US$300k to an unknown account?
Researchers from Barracuda and UC Berkeley, conducting a large-scale analysis of email account takeover and the timeline of attacks, recently highlighted the behaviors hackers are using to try to avoid detection, ways to identify suspicious activity that could indicate an email account has been compromised, and precautions you can take to protect your business. Highlighted … Read moreHackers monitor, track activity to learn and then launch phishing attacks: Barracuda Report