Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The NSA spied on French companies focused on telecommunications, electricity, gas, oil, nuclear and renewable energy, and health projects, as well as all deals valued at above $200 million, according to WikiLeaks.
The head of US intelligence said that China is "the leading suspect" in a massive data breach at the US Office of Personnel Management (OPM).
In an analysis of 660,000 pieces of information collected, Recorded Future found login credentials for 89 unique domains possibly belonging to government agencies.
Ercan Findikoglu is accused of hacking into financial institutions, stealing debit card data and organizing fraudulent ATM withdrawals on a massive scale across the world from 2010 to 2013.
France summoned the US ambassador on Wednesday and said it "will not tolerate any acts that threaten its security" after leaked documents indicated Washington spied on President Francois Hollande and his two predecessors.
Alex Yucel, 25, co-creator of the "Blackshades" malware, was jailed for 57 months in New York for computer hacking.
Facebook has been using a new security tool to help detect and remove malicious software for users of the world's biggest social network.
Top US and Chinese officials were set to join "candid" talks Tuesday to discuss maritime disputes and cyber hacking.
Europol is launching a cybercrime unit to combat social media accounts promoting jihadist propaganda, particularly those of the Islamic State (IS) group.
WikiLeaks released 276,394 new documents from the hack of Sony Pictures in what could be a further embarrassment for the Japanese media and electronics group.

FEATURES, INSIGHTS // Cybercrime

rss icon

Marc Solomon's picture
Cybercrime-as-a-Service is increasing the sophistication and frequency of attacks to the point where they seem to be pervasive. When evaluating your approach to security in light of this increasingly popular approach to attacks, seek out solutions that are equally pervasive.
Danelle Au's picture
As long as companies continue to pay ransoms when attacked, we should expect cyber extortion to continue in 2015.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.