Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A new variant of the Bifrose backdoor has been used in a cyberattack aimed at an unnamed device manufacturer, Trend Micro reported.
Scandal rocked both Hollywood and the US tech industry Monday after an apparent massive hack of a cloud data service unleashed a torrent of intimate pictures of celebrities onto the Internet.
A new variant of BlackPOS (Kaptoxa), a piece of RAM scraping malware designed to target point-of-sale (PoS) systems, has been spotted in the wild by researchers at Trend Micro.
Apple has rolled out a patch for the Find My iPhone service that could be linked to the leak of personal celebrity photos from Apple's iCloud storage service.
The United States has launched a social media offensive against the Islamic State and Al-Qaeda, setting out to win the war of ideas by ridiculing the militants with a mixture of blunt language and sarcasm.
Mozilla is warning users who have contributed to testing builds of the online bug-tracking tool Bugzilla that their email addresses and encrypted passwords were publicly available for a period of three months.
The Federal Bureau of Investigation acknowledged that it and the US Secret Service were "working to determine the scope of recently reported cyber attacks against several American financial institutions."
Srizbi, once considered one of the most powerful botnets, is apparently trying to make a comeback with the aid of a new piece of malware, F-Secure reported.
JPMorgan Chase said Thursday that it was cooperating with law-enforcement officials to determine the scale of reported cyber attacks against US financial institutions.
Netflix has released two applications used by the company's security team to monitor the Web for potential threats.

FEATURES, INSIGHTS // Cybercrime

rss icon

James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”
Jon-Louis Heimerl's picture
Cybercrime “case studies” are always impersonal, right? Would you get more out of specific stories of individuals caught in the cross hairs instead of corporate entities?
Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.
Mark Hatton's picture
So what does the World Cup have to do with cyber security? A great deal actually. Anytime there is a large-scale global event, there is a sharp spike in the number of cyber scams that are unleashed.
Tal Be'ery's picture
Defenders should use their "Strategic Depth" to mitigate attacks not on the perimeter but deeper within their network where they can leverage on their strategic advantage.
Wade Williamson's picture
In the same way we have watched APT techniques trickle down from nation-state actors to more opportunistic criminals, we should expect MitB to expand from financial services to all types of applications.
Jeffrey Carr's picture
The term “Tipping Point” is controversial because it has been so widely misused and loosely applied; two abuses that I often see in the cyber security marketplace.