Europol Targets Ukrainian Botnet Gang

Alleged Zeus, SpyEye Banking Trojan Cybercriminals ArrestedEuropean authorities say they have disrupted a Ukraine-based cybercrime gang tied to $2.2 million in fraud in Europe, the United States and beyond, perpetrated via banking... Read more »

China, U.S. Plan Cyber ‘Code of Conduct’

Obama Presses Chinese Government to Lower Cyber TensionsChina and the U.S. have agreed to create a new cyber "code of conduct." The move comes in the wake of the U.S. Office of... Read more »

Apple, Samsung Devices: Bug Warnings

Over 600 Million Samsung Devices at Risk from Keyboard FlawSecurity researchers warn of "Xara" flaws in Apple iOS and OS X that could be used to intercept passwords and banking data, as... Read more »

Banks to Roll Out Real-Time Payments

Security Experts Highlight Fraud, Security RisksBank-owned digital payments network clearXchange is rolling out a real-time payments platform that will be available to 100 million online banking customers. Security experts weigh in on... Read more »

Wipro Develops Fraud Detection Model

Aims at Improved Risk Management by Using Big DataWipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process... Read more »

New BITS President on Cyber Threats

Chris Feeney, recently named president of BITS, the technology and policy division of the Financial Services Roundtable, describes his top cybersecurity priorities, including helping members deal with insider threats. Read more »

Securing Homegrown Mobile Apps

Enterprise developers are under pressure to produce quickly mobile apps, often leaving security as a second thought. Denim Group's John Dickson suggests ways to make security a priority. Read more »

Disrupting Attacks With Kill Chains

Threat intelligence is increasingly being brought to bear to help businesses apply kill-chain concepts, focusing on disrupting discrete parts of online attacks as early as possible, says Fortinet's Simon Bryden. Read more »

How Secure is Mobile App Development?

India's burgeoning mobile penetration has led to a massive uptake in app usage. Frenetic development to meet demand has found security ignored. Dhananjay Rokde discusses how this ecosystem functions today. Read more »

Post-Malware Outbreak: Rip and Replace?

Zombie Attack Lessons Learned from Germany's BundestagForget attributions of the German parliament malware outbreak to Russia, or Chancellor Angela Merkel's office being "ground zero." The real takeaway is the Bundestag's apparent lack... Read more »