Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

North Korea denied involvement in cyber-attacks on South Korea's nuclear power plant operator, accusing Seoul of fabricating a story to shift the blame for high cross-border tensions.
Cybercriminals are taking advantage of smartphones and mobile malware to rake in significant profits through sextortion schemes, a report from Trend Micro has found.
The House Intelligence Committee introduced legislation this week offering companies liability protection when they share cyber-threat indicators with the government or each other.
In its Fourth Quarter, 2014 State of the Internet Report, Akamai Technologies cited China as the originator of 41 percent of observed attack traffic.
Big US technology firms joined a coalition of activists urging Congress to pass a law scaling back government surveillance ahead of key deadline.
China's cyberspace administration is "complicit" in attacks on major Internet companies including Google, an anti-censorship group said.
Cybercriminals have been using the Vawtrak Trojan in an ongoing campaign targeted at Canadian online banking users.
Twitch has been hacked. The streaming service has reset user passwords and streaming keys.
Palo Alto Networks shared details of a security vulnerability in Android that could allow an attacker to hijack the installation of a what appears to be a safe Android application and modify or replace it with malware.
When Florida police got a call from a man who said he shot four people at rapper Lil Wayne's house this month, they responded as they are trained to.

FEATURES, INSIGHTS // Cybercrime

rss icon

Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.