NEW YORK (AP) - JPMorgan Chase, the nation's biggest bank by assets, is working with law enforcement officials to investigate a possible cyberattack, said a person familiar with the situation who spoke on condition of anonymity, though the bank isn't currently seeing any unusual fraud activity at the time.
The group, known as the Financial Services Information Sharing and Analysis Center, or FS-ISAC, includes all major U.S. "There are no credible threats posed to the financial services sector at this time," the group said in an email to its members. FS-ISAC told members in the email that it decided not to raise its barometer of threats facing banks during a regularly scheduled conference call on Thursday.
1 day ago Feds salute plucky human ROBOT-FIGHTERSThe Register View Synopsis+1
Winners of DEFCON robocall-crushing competition showered in cash, praise
The United States Federal Trade Commission (FTC) has announced over US$12,000 in prizes in its "Zapping Rachel" robocall contest, which was held at this year's DEFCON hacking conference in Las Vegas.
23 hours ago Is your day all work and no play?IT Toolbox Blogs View Synopsis+1
After writing the post Work Interruptions and Playing Games for Fun, a number of readers commented on the idea of playing games (ping pong) during business hours. Most of the comments expressed some variant of this point "I'm at work to work not play."
16 hours ago ISIS Threatens US with TerrorismSchneier blog View Synopsis+1
They're openly mocking our profiling.But in several telephone conversations with a Reuters reporter over the past few months, Islamic State fighters had indicated that their leader, Iraqi Abu Bakr al-Baghdadi, had several surprises in store for the West.
They hinted that attacks on American interests or even U.S. soil were possible through sleeper cells in Europe and the United States.
"The West are idiots and fools. They think we are waiting for them to give us visas to go and attack them or that we will attack with our beards or even Islamic outfits," said one.
"They think they can distinguish us these days Â they are fools and more than that they don't know we can play their game in intelligence. They infiltrated us with those who pretend to be Muslims and we have also penetrated them with those who look like them."
I am reminded of my debate on airport profiling with Sam Harris, particularly my initial response to his writings.
12 hours ago Differences between HTML5 or AJAX web applicationsSANS Reading Room View Synopsis+1
Today's web application content is loaded to the web browser by means of the HyperText Transfer Protocol (HTTP).
12 hours ago Why Are Security Pros Blase About Compliance?Dark Reading View Synopsis+1
A survey of 500 IT and security decision makers in the UK and US shows that a majority are in the dark about regulatory requirements for their business organization.
Hackers exploited a zero-day vulnerability and gained access to sensitive information from JPMorgan Chase and at least four other financial institutions, reports indicate.
The role of the chief information security officer (CISO) has not changed much over the last few years, yet the perceived importance of a CISO has increased exponentially.
Contestants set up honeypots and spoof existing robocall-screening technologies.
"He's alwaysÂ been optimistic about the future," says Hal Finney's wife, Fran. "Every new advance, he embraced it, every new technology.Â Hal relished life, and he made the most of everything."
13 million person pilot of national identity card combines both biometric verifiication for state services and a prepayment wallet aimed at bringing financial services to the poorest.
Federal authorities in the United States are investigating reports of cyberattacks launched against JPMorgan Chase and at least one other unnamed financial institution.
12 hours ago Root Cause Analysis: Stop Playing Whack-a-MoleSecurityWeek View Synopsis+1
What Can we do Once we Identify the Root Cause? We Can Work to Address it.
After analyzing hundreds of millions of hostnames, researchers have determined that many of them are live only for a 24-hour period, timeframe in which they can be used for malicious activities.
Government announces plans to boost its cybersecurity monitoring facility and set up an operations control center to respond to threats more swiftly. It will also appoint chief information security officers across various government agencies.
12 hours ago Verizon eyes QR codes as authentication optionZDNet View Synopsis+1
Can the QR code replace user names and passwords? Verizon Enterprise thinks so -- at least for some companies looking at two-factor authentication.
White hat hacker Ben Caudill is halfway through his sandwich when he casually reaches over to his iPhone, swipes the screen a few times, then holds it up to me. "Is that you?" he asks. It is, but nobody was supposed to know. He's showing me one of my posts to Secret, the popular anonymous […]
The female caller was frantic. Why, she asked 911 dispatchers, hadn't paramedics arrived to her home? She'd already called once to say her husband was writhing on the floor in pain. "Hurry up!," she'd pleaded, as she gave the operator her address. And then she hung up and waited for help to arrive, but it […]
Appropriately named HTTP Shaming IDs apps and Web services operating without encryption.
Germany has no intentions to record US phone conversations, agency spokeswoman says.
12 hours ago Pro tip: Manage privacy settings in iOSTechRepublic View Synopsis+1
iOS privacy settings give you fine-grain control over what applications can access certain system services. Cory Bohon shows you how to configure the settings to protect your privacy.
12 hours ago How to survive data breachesTechRepublic View Synopsis+1
Data breaches are fast becoming a fact of digital life. The WEF offers a way to recover if one happens to hit.
Personal information on more than 500 Cedars-Sinai Health System patients was compromised after a laptop was stolen from an employee's home.
About 900 customers at two OTTO pizzeria locations in Portland, Maine, had payment card data compromised after POS malware was discovered on terminals.
12 hours ago Healthcare Industry, Feds Talk Information SharingDark Reading View Synopsis+1
Representatives from the healthcare industry as well as government discuss importance of threat intelligence-sharing in light of the Community Health Systems breach.
12 hours ago JP Morgan Targeted In New Phishing CampaignDark Reading View Synopsis+1
Double-whammy 'Smash and Grab' hits targets with two ways to steal credentials.
12 hours ago Point of Sale (POS) Systems and SecuritySANS Reading Room View Synopsis+1
As Dr. Eric Cole (2014) mentioned in a recent SANS SEC401: Security Essentials Bootcamp Style course, "will be the year of the retailer".
12 hours ago Small devices needs a large FirewallSANS Reading Room View Synopsis+1
Palo Alto Networks (PAN) next-generation firewall encapsulates a full line of products.
12 hours ago PCMag 2014 Tablet Business Choice AwardsIT Toolbox Blogs View Synopsis+1
PCMag has released their 2014 Tablets Business Choice Awards! PCMag readers rated tablets for work, on their overall satisfaction and technical support. The goal was to understand how the tablets compare to one another. Don?t miss the results?
12 hours ago Sacrificing the product strategy for salesIT Toolbox Blogs View Synopsis+1
In this post I share a real product engineering dilemma. Should I abandon (temporarily) the product strategy to build features for a specific (large) sale? How often should I optimize the product roadmap and jerk everyone around?
Anatomy of the net's most destructive ransomware threat
Victims of the CryptoWall ransomware have been extorted out of at least $1m.