Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The Malaysia Airlines website was defaced by hackers who referenced the Islamic State jihadists and claimed to be from the "Lizard Squad".
US spies intercepted communications between the chief suspects in the murder case of Russian former spy Alexander Litvinenko, linking his poisoning to the Russian state, Britain's Daily Telegraph reported Saturday.
Barrett Brown, journalist also known as an informal spokesman for the hacker group Anonymous was sentenced to five years in prison.
An email scam which targets businesses with bogus invoices has netted more than $214 million from victims in 45 countries in just over one year, an FBI task force said Thursday.
A new variant of the CTB-Locker (Critroni) ransomware has been spotted in the wild by researchers at Trend Micro.
Huawei CEO Ren Zhengfei said at the World Economic Forum that China has never asked it to spy on the United States or others.
According to Vormetric's 2015 Insider Threat Report, 93 percent of the organizations surveyed based in the U.S. felt they were vulnerable to insider threats.
Israeli police arrested a man suspected of hacking into the computers and stealing the work of international recording artists including Madonna, police said.
Please join us for a special webcast: Protecting Against Fraud and Cybercrime from Mobile Devices, presented by ThreatMetrix.
Nathan Leroux, 20, of Bowie, Maryland, has admitted taking part in an international hacking and intellectual property theft conspiracy, the FBI announced on Tuesday.

FEATURES, INSIGHTS // Cybercrime

rss icon

James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.