Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The Board of Water and Light (BWL) in Lansing, Michigan, was struck by ransomware on Monday, April 25. [Read More]
Nikita Kuzmin, the creator of the Gozi malware, has been sentenced to time served and ordered to pay $7 million [Read More]
Jeffrey Wallis of Noble Markets said the news about the creator of Bitcoin doesn't matter. [Read More]
Researchers from Fox-IT have discovered that attackers are brute forcing their way into remote desktop servers to install and activate ransomware in corporate environments. [Read More]
Craig Wright identified himself as the creator of Bitcoin following years of speculation about who invented the pioneering digital currency. [Read More]
Researchers from Intel Security discovered a piece of malware dubbed "Dynamer" that is taking advantage of a Windows Easter Egg called “God Mode” to gain persistency on an infected machine. [Read More]
Researchers at F5 Networks are warning of a new campaign of the Dridex web fraud malware targeting U.S. financial institutions. [Read More]
The US military's secretive Cyber Command (CYBERCOM) is working to destroy the Islamic State group's Internet connections and leave the jihadists in a state of "virtual isolation," Pentagon chiefs said. [Read More]
High-Tech Bridge has launched a new free service to help web site owners and businesses understand and locate domain name threats that could be targeted at them and their customers. [Read More]
The cyber capabilities of the Islamic State and its supporters are still relatively weak and appear to be underfunded and poorly organized, according to a report from Flashpoint. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Bill Sweeney's picture
The concept of cyber Unicorns is that financial crime achieved via cyber means is no longer a pastime; rather it’s a full time job.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Tim Layton's picture
The value of identifying your organization’s information out on the Dark Web can serve as a first-line indicator of a new breach that otherwise may go undetected for long periods of time.
Alastair Paterson's picture
In 2015 we saw a surge in attacks against the financial services industry that involved extortion, social engineering, credential-stealing malware and sophisticated threats.
Wade Williamson's picture
Asking for security backdoors that only benefit the good guys is like asking for bullets that only hurt the bad guys. That’s simply not how encryption works.
Tim Layton's picture
By understanding your adversaries’ activity on the Dark Web , you can take more of a proactive approach that helps reduce uncertainty and improves overall cyber resiliency.
Alastair Paterson's picture
As security professionals, it’s our job to enable business while protecting it; embracing social media is an imperative, but we also need to mitigate the exploitation of what our organizations reveal online.