Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

According to Symantec, researchers have seen a spike in emails with malicious links of late.
A new financial malware designed to target the customers of South Korean banks has been spotted in the wild by researchers at Trend Micro
Microsoft said it had secured broad support from a coalition of influential technology and media firms as it seeks to challenge a US ruling ordering it to hand over emails stored on a server in Ireland.
Vulnerabilities affecting a popular WordPress plugin are being abused by cybercriminals to hijack websites and redirect their visitors to a page set up to serve malware, researchers at Sucuri reported on Monday.
Sony Pictures organized a town hall-style meeting with staff Monday to discuss the massive cyber attack on the Hollywood studio, a day after hackers promised a big "Christmas gift."
Researchers at Dell SecureWorks took a look at the market for stolen identities online.
Mark Marmilev, the former chief technology officer of the Costa Rica-based centralized digital currency service Liberty Reserve, has been sentenced to five years in prison and ordered to pay a $250,000 fine, the U.S. Department of Justice reported on Friday.
Sony Pictures Entertainment pressed media outlets against using data hackers may have leaked about the studio.
Indian police arrested Mehdi Masroor Biswas who is believed to be the handler of the influential Twitter account "ShamiWitness" which supports the Islamic State group, officials said.
Researchers at Trend Micro have observed a spike in the number of Ursnif infections. The most affected countries are the United States and the United Kingdom.

FEATURES, INSIGHTS // Cybercrime

rss icon

David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”
Jon-Louis Heimerl's picture
Cybercrime “case studies” are always impersonal, right? Would you get more out of specific stories of individuals caught in the cross hairs instead of corporate entities?