New social engineering methods used by the AceKard Trojan

The AceKard Trojan has become one of the major worldwide threats against banks all over the world. First being detected in January 2014 it originally attacked banking users only in Russia, but currently users in Europe, USA and Australia are also being attacked. The modus operandi of AceKard was originally like other strands of malware: [...]

Systemic cyber security risks ahead on critical infrastructures

This month a report released by the U.S. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) revealed how vulnerable Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition Systems (SCADA) really are. Even though these systems were never built for running on computers connected to open networks, they are now more and more often being [...]

Did you know that there are striking similarities between old-school banking culture and the poor leadership that ultimately caused the Kodak moment?

We at Protectoria want every banking manager to read the attached analysis on how and why the poor Kodak leadership led to the company's bankruptcy. The Kodak moment is a lesson everybody should learn. Kodak went from being the fifth most valued brand worldwide in 1996 to bankruptcy in 2012. Reading the analysis, you will [...]

Protectoria is Gold Sponsor at the European Banking Forum, Vienna 12. – 13. October 2016

The agenda is Banking Technology & Strategy Security & Risk where Protectoria CEO Trond Lemberg presents 'Who's the winners and who's the losers in the race of mobile payments' http://www.arena-international.com/ebf-security-risk  

A new world record on Distributed Denial of Service (DDoS) attacks was set last week, reaching over one terabit per second (1 Tbps)

“Internet of Things (IoTs) -powered DDoS attacks have now reached an unprecedented size, as it is too easy for hackers to gain control of poorly configured, or vulnerable, IoT devices. Late last year, we reported that lazy manufacturers of the IoTs and home routers are reusing the same set of hard-coded SSH (Secure Shell) cryptographic [...]