Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Nigeria's electoral commission admitted on Saturday that its website had been hacked, as the country's crucial presidential and parliamentary elections were hit by technical problems.
The U.S. Department of State is offering a total reward of $3 million for information leading to the arrest or conviction of two Russian cybercriminals.
The UN Human Rights Council appointed an investigator to look into violations of digital privacy rights, following revelations of large-scale cyber-snooping by Washington and others.
Cybercriminals have been leveraging a vulnerability in a popular WordPress plugin to redirect the visitors of thousands of websites to exploit kits.
PhishMe, a company that helps organizations teach security awareness by educating employees on how to identify Phishing attacks, has raised $13 million in Series B funding.
North Korea denied involvement in cyber-attacks on South Korea's nuclear power plant operator, accusing Seoul of fabricating a story to shift the blame for high cross-border tensions.
Cybercriminals are taking advantage of smartphones and mobile malware to rake in significant profits through sextortion schemes, a report from Trend Micro has found.
The House Intelligence Committee introduced legislation this week offering companies liability protection when they share cyber-threat indicators with the government or each other.
In its Fourth Quarter, 2014 State of the Internet Report, Akamai Technologies cited China as the originator of 41 percent of observed attack traffic.
Big US technology firms joined a coalition of activists urging Congress to pass a law scaling back government surveillance ahead of key deadline.

FEATURES, INSIGHTS // Cybercrime

rss icon

Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.