Some may have already guessed what this blog post is about. The Boston Mercantile Bank is a fictional bank which was robbed by Steve McQueen's character in the original version of "The Thomas Crown Affair." Thomas Crown robbed the Mercantile not because he needed the money - he did it because he was generally bored....
As the cyber security landscape evolves and attacks become more sophisticated and malicious, the question of responsibility has grown increasingly important. Despite the fact that in the wake of high profile cyber attacks charges of blame abound, pinpointing blame for cyber attacks is actually harder than most people...
It is not always obvious to a network or system administrator that the company's infrastructure is under attack. The prime suspect of a network slowdown is technical problem or traffic congestion. An attack usually has a buildup stage, and only as the attack progresses further and sustains will someone get to the...
"We've made the investments in our shields, they must work" - this statement must have been decried by legions of ancient soldiers as this age-old defense decayed before their eyes and they were crushed on the battlefield. In fact, the graveyard is littered with 'proven' defense strategies which, given time, have...
During the RSA conference this past February in San Francisco, I gave a lecture titled "Stock Exchanges in the Line of Fire - Morphology of Cyber Attacks." Based predominantly on my experience as part of Radware's Emergency Response Team (ERT) that provides 24/7 DDoS attack mitigation support, I focused on...
If you can recall last October, undercover FBI agents foiled a plot to attack the Federal Reserve Bank in New York City in the same week that a ninth bank was hit in what has been an ongoing cyber-assault on financial institutions in the United States. While these two different types of attacks, one physical and one...
Distributed Denial of Service (DDoS) is unique in the sense that these attacks actually consist of many legitimate individual requests. It is only the large volume of simultaneous requests that turns those legitimate requests into an attack. Consequently, one of the biggest challenges in mitigating DDoS attacks is...
Imagine the following scenario: You're a hosting company and you receive a call from one of the largest banks in the United States informing you that they are currently experiencing a cyber attack. Why are they calling you? The attack is coming from your servers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.