Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Experts in fields such as intelligence, APT, sophisticated malware, cyber warfare, and politics will take the stage at Suits and Spooks London 2015.
The Hellsing APT group managed to stay under the radar until it decided to retaliate against an attack launched by a threat actor known as Naikon.
The US military is well equipped to defend the country against cyberattacks but is not yet ready to wage digital warfare, a senior defense official told lawmakers.
A new report from Trend Micro outlines some of the ways targeted attack campaigns changed their tactics during 2014.
Five individuals suspected of creating and using the Svpeng Android banking Trojan have been arrested by Russian authorities. They are said to have caused damage worth nearly $1 million.
Hackers launched a new attack Monday against the Belgian media group Rossel, targeting the websites of newspapers in Belgium and France, its managing director told AFP.
Researchers have analyzed a new offensive system used by the Chinese government in the recent distributed denial-of-service (DDoS) attacks against GitHub and GreatFire.
Interpol formally opened a new office in Singapore that will provide additional support to law enforcers and boost the fight against Internet-based criminal activities.
Simda botnet taken down by law enforcement authorities, Microsoft, Trend Micro, Kaspersky and the Cyber Defense Institute in Japan.
Hackers attacked one of Belgium's top newspaper publishers just days after Tunisian Islamist militants took control of a regional government portal to denounce US counter-terror operations.

FEATURES, INSIGHTS // Cybercrime

rss icon

Danelle Au's picture
As long as companies continue to pay ransoms when attacked, we should expect cyber extortion to continue in 2015.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.