Despite what's now been a two-month break from hacktivists' DDoS attacks on banks, we can expect more assaults from Izz ad-Din al-Qassam Cyber Fighters. And this next wave should concern us all. Here's why.
The OCC's DDoS risk warnings to community banks may indicate more regulatory scrutiny is on the way. Banks should prepare for more oversight of their cyber-attack reporting and threat mitigation practices.
As they develop mitigation strategies, organizations must keep in mind that all cyber-attacks, ranging from DDoS to phishing, ultimately aim to compromise data - and they virtually all are advanced and persistent.
What can U.S. and European organizations learn from Asia-Pac about advanced mobile tech and increasing cyberthreats? That's a question I hope to answer while in Singapore for RSA Conference Asia Pacific 2013.
On the record, security experts talk about the improvements banking institutions have made in DDoS defense, and there's no doubt they have made major improvements. Off the record, they are less optimistic.
Banks have improved DDoS defenses, but ensuring ongoing online reliability requires a more offensive measure - one that rids the Internet of vulnerable sites that can too easily be used for bot traffic.
In this newest banking fraud scheme, fraudsters use the customer service chat feature within the online banking platform to schedule fraudulent wires. How can institutions detect and prevent this scam?