Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Kaspersky Lab has published a new research paper on Koler, the "police" ransomware that has been targeting Android users since April.
The crash of the Malaysia Airlines flight MH17 in eastern Ukraine on June 17 continues to make headlines, making it a perfect event for cybercriminals to leverage in their malicious campaigns.
Starting with Firefox 31, the malware detection mechanism integrated into the Web browser has been expanded to include downloaded files, Mozilla announced on Wednesday.
The European Court of Human Rights (ECHR) ruled that a Latvian man suspected of being involved in the creation of the Gozi banking Trojan would not be exposed to a real risk of ill-treatment if he were to be extradited to the United States.
UK Travel Company W3 Limited was fined £150,000 for violating the Data Protection Act after hackers stole details of 1.1 Million payment cards.
The White House chief of staff and his German counterpart met Tuesday amid a serious rift over allegations of US spying.
A large number of websites have been compromised by cybercriminals who are exploiting a recently patched security hole the popular MailPoet newsletter plugin for WordPress.
The cyber-crime crew was able to take over some 1,600 StubHub user accounts as part of their scheme, authorities said.
The attack used the Nuclear exploit kit, which is known for targeting vulnerabilities in Microsoft Internet Explorer and Oracle Java SE.
StubHub confirmed today it had been hit by cyber-attackers in a global operation

FEATURES, INSIGHTS // Cybercrime

rss icon

Tal Be'ery's picture
The Target breach shows that APT attacks have commoditized and therefore should concern not only the government and defense industry, but probably every enterprise.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.
Jon-Louis Heimerl's picture
For a month, I kept all of my spam, then looked at the subject matter, where it was from and tried to analyze some additional characteristics of the spam.
Marc Solomon's picture
Mosquitoes are quite similar to malware. There are thousands of species and numerous ways to try to protect against them but each method has its limitations.
Chris Hinkley's picture
Whether you’re buying a smart refrigerator for your home or a printer for your company, your first step is deciding the risk involved and how to deploy the device in a secure manner while preserving the functionality you require.
Aviv Raff's picture
Without the elements of prevention, detection, and protection all working together, threat actors will always have the advantage, and will find a way to carry out their illicit economic, political or social agendas.
Eric Knapp's picture
Enemy infrastructure is and always has been an important military target. The difference is that with increasingly automated and connected infrastructure, the ability for an enemy to target these systems digitally has increased, putting these systems at greater risk.
Aviv Raff's picture
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
Mark Hatton's picture
One of my concerns heading into these Olympic Games is that the public has become somewhat desensitized to cyber-attacks and we may not have the same level of vigilance against cyber threats as we should.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.