Security Experts:

long dotted


Messaging app Telegram says it has blocked 78 accounts associated with the jihadist Islamic State group following the attacks in Paris.
The Angler, Magnitude, Neutrino, and Nuclear exploit kits accounted for 96 percent of the category’s activity in the third quarter of 2015.
Carnegie Mellon University has released a statement in response to recent accusations that it was paid by the FBI to hack Tor.
A new variant of the Dyre banking Trojan includes support for Windows 10 and the Microsoft Edge browser.
An impression fraud scheme involving a piece of malware dubbed Xindi could cost advertisers billions, Pixalate warns.
The Anonymous hacker collective claimed to have taken out 5,500 Twitter accounts linked to the Islamic State group, which claimed responsibility for the Paris attacks.
Cybercriminals exploit recently patched vBulletin vulnerability to hack servers. Symantec spotted up to 2,500 attack attempts per day.
Britain said it will double its investment to to £1.9 billion a year in cyber-security to counter threats including from the Islamic State group, in the wake of the Paris attacks claimed by IS.
The deadly Paris attacks have reignited debate on encrypted communications by terror cells and whether law enforcement and intelligence services are "going dark" in the face of new technologies.
A state-sponsored threat group, possibly Russia’s Turla/Waterbug, has compromised over 100 websites to track and profile potential victims.


rss icon

James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.