ALL >> Computers >> View Article
Nasdaq Notifies People On Possible Security Breach
Financial institutions have long been target of attackers. The use of phishing attacks to lead unwary customers to a look-alike but fake website has been a common practice for many years. In the recent times, cybercriminals have launched targeted (spear phishing) attacks through cleverly crafted e-mails that appear to coming from a supervisor, subordinate or other peers. Last year, attackers used more sophisticated mechanisms such as the use of ZeuS and Bugat Trojans to trick professionals working in financial organizations.
The recent reports indicate that attackers have identified wider targets in the form of stock exchanges and financial markets. The recent revelations suggest that attackers intruded into the networks of Nasdaq several times during the course of last year. Information security professionals at Nasdaq OMX group have identified suspicious files on the computer servers of the premier U.S based stock exchange. Nasdaq OMX runs the Nasdaq stock exchange.
The stock exchange lists top global companies and influences the trading on other exchanges worldwide. Investigations carried out till now do ...
... not reveal compromise of trading platforms, nor suggest any information security breach. The Federal Bureau of Investigation (FBI) is examining the alleged intrusion. The intrusion allegedly affected the servers, which have information related to new services offered to business corporations for enhancing the exchange's income over the normal trading fees.
Ironically, the attacks are revealed at a time when equity mutual funds have indicated recovery after a very long slump. The attacks may dent the confidence of the investors, who were regaining faith after a long economic slowdown. Security breach of servers and trading platform of Nasdaq may result in leakage of large chunks of sensitive business information related to numerous companies.
Critical national and international institutions face threat of intrusions from cybercriminals. Regular in-depth tests with ethical hacking techniques are crucial to identify vulnerabilities at the earliest and strengthen the defenses against intrusions and unauthorized access.
Add Comment
Computers Articles
1. How To Build A Peer-to-peer Marketplace?Author: brainbell10
2. How To Build An Api? A Developer’s Guide To Api Platform
Author: brainbell10
3. Everything You Need To Know About Web Development In 2026
Author: chetna
4. Create A Strong Online Presence Today
Author: FutureGenApps
5. User Experience Design
Author: brainbell10
6. Dynamics 365 Hubspot Integration Guide
Author: brainbell10
7. The Thrilling World Of Geometry Dash Lite
Author: Hattie
8. Why Treating All Access, The Same Increases Security Risk
Author: Soham Biswas
9. The Audit Myth In Identity Governance: What Regulators Actually Expect
Author: Soham Biswas
10. Choosing The Right Web Design Company In Westlake For Long-term Success
Author: Compu 360 LLC
11. Unreal Game Development
Author: brainbell10
12. Market Forecast: Conversational Ai For Intelligent Contact Center
Author: Umangp
13. Complete Guide To Ipv4 Leasing, Lease Ipv4 Address & Ipv4 Address Rental By Elite Server Management
Author: Elite Server Management
14. B2b Marketer’s Guide To Onboarding A Lead Agency Without Losing Months
Author: demandify
15. Why Choose Sataware?
Author: brainbell10






