Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The US military is wary of cutting Internet connections to Islamic State strongholds such as Raqa in Syria, even though the Pentagon is waging cyber-war against the jihadists, officials said. [Read More]
A recently observed piece of mobile malware called "Godless" leverages multiple rooting exploits and targets nearly 90 percent of Android devices. [Read More]
HTML5 will not prevent malvertising. This has nothing to do with HTML5 per se, but is down to the nature of the adverts themselves. [Read More]
Seven years after it emerged, the Confiker worm is the most prominent malware family. [Read More]
Over the past two months, Cerber ransomware campaigns have focused mainly on three geographies: the United States, Turkey, and the United Kingdom. [Read More]
In an effort to crackdown on airline ticket fraud, Europol announced that "140 people were detained, denied boarding and questioned by police." [Read More]
The Tor (The Onion Router) browser is looking to enhance the security of its users by employing new features aimed at preventing deanonymization attacks against them. [Read More]
Exploit kit traffic is only a small percentage of what it used to be: it dropped 96% since early April 2016 [Read More]
Access to 176,000 unique hacked servers were traded on xDedic between October 2014 and February 2016. [Read More]
Researchers have spotted a couple of new tricks used by cybercriminals to improve their phishing attacks [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Alastair Paterson's picture
Cyber situational awareness can provide insights into the people, processes and technology your adversaries use and turn those into an advantage.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.