Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Dutch chip equipment provider ASML has suffered a data breach, but the company says the attackers haven't gained access to any valuable information.
A hacker group called TeamHans has leaked hundreds of megabytes of data allegedly stolen from the systems of Canadian communications and media company Rogers.
Twitter is investigating unspecified threats, amid reports that the social network had been targeted for blocking accounts linked to the Islamic State.
Uber said on Friday a data breach may have allowed malicious hacker(s) to gain access to the driver’s license numbers of roughly 50,000 of its drivers.
UK-based TalkTalk, a telecommunications and broadband company, confirmed that it has suffered a data breach, which names, phone numbers, addressees and account numbers of its customers were exposed to malicious actors.
Cybercriminals use phishing emails and CSRF exploits to hijack routers in Brazil and redirect victims to fake banking websites.
The breach has cost Target $162 million so far, according to the firm's earnings report.
Bitdefender finds 10 apps hiding aggressive adware on Google Play. The applications redirect users to ads in all Web browser and even Facebook.
Canada's electronic eavesdropping agency has amassed a huge trove of emails sent to the government, as part of its cybersecurity mandate, according to a leaked secret document Wednesday.
Microsoft, Symantec and others teamed up with the law enforcement community to take down the Ramnit botnet.

FEATURES, INSIGHTS // Cybercrime

rss icon

Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.