Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The Philippines has launched criminal proceedings against six bankers accused of failing to stop the theft of $81 million from Bangladesh’s central bank earlier this year. [Read More]
A Taiwanese government organization and an energy company have been targeted in the Tropic Trooper espionage campaign [Read More]
Madison Square Garden warns customers that their card information may have been compromised after hackers installed malware on payment processing systems [Read More]
Distributed via spam emails pretending to be complaints from an Internet Service Provider (ISP), a newly observed Locky ransomware variant appends the .AESIR extension to the encrypted files, security researchers reveal. [Read More]
A total of 580 money mules were recently identified, of which 380 suspects were interviewed by the national law enforcement agencies. [Read More]
"Admiral Rogers is a terrific patriot and has served this country well in a number of positions," Obama said at a press conference in Peru. [Read More]
Information security giant Symantec said on Monday that it will acquire identity protection firm LifeLock for $2.3 billion. [Read More]
The hackers who breached the phone upgrade systems of UK telecoms firm Three obtained information from over 133,000 customer accounts [Read More]
The Defense Department and broader US government intelligence community have urged President Barack Obama to fire National Security Agency chief Admiral Michael Rogers, US media reported Saturday. [Read More]
A log of all phone calls made from iPhone devices running iOS 8 or newer may be automatically synchronized to iCloud and susceptible to third-party access. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Alastair Paterson's picture
Cyber situational awareness can provide insights into the people, processes and technology your adversaries use and turn those into an advantage.
David Holmes's picture
A cyber espionage attack against Swiss defense firm RUAG was carried out by the Russia-linked hackers according to a report commissioned by the Swiss government.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Jennifer Blatnik's picture
It is critical for business leadership to address the growing threat of ransomware as a business risk rather than a siloed IT issue.
Bill Sweeney's picture
The concept of cyber Unicorns is that financial crime achieved via cyber means is no longer a pastime; rather it’s a full time job.