Security Experts:

long dotted


Researchers have discovered new malware designed to infect point-of-sale (PoS) terminals and capable of intercepting GET and POST requests sent from Web browsers on infected machines.
On October 6, 2015, Suits and Spooks will host a unique invite-only event in the “Wine Cave” at the exclusive Wingtip Club in San Francisco.
Dutch police arrested two young hackers who infiltrated a type of malware known as "ransomware" to access thousands of computers worldwide, before demanding money to unlock the machines.
Vladimir Drinkman, a Russian national accused of hacking payment systems of major retailers and the Nasdaq stock market, resulting in $300 million in losses, pleaded guilty to US criminal charges.
The operators of an online shop specialized in selling account data and SOCKS proxies might be using CoreBot’s data theft capabilities.
Newswire hacking case: Ukrainian traders don’t admit wrongdoing, but they’ve agreed to pay $30 million to settle SEC charges.
A new ATM malware, dubbed “Suceful,” allows fraudsters to physically steal payment cards. The threat can also be used to steal card data and disable ATM sensors.
A young American who assumed the online identity of an Australian jihadist has been arrested for an alleged plan to bomb a September 11 memorial event, authorities said.
A new Android screening-locking malware targeting mainly users in the United States has been discovered by ESET researchers, who say this is the first ransomware to change a smartphone’s PIN security code.
CoreBot stealer has now turned into a full-fledged banking malware. New features include webinjects, form-grabbing, MitM plugin, and VNC module.


rss icon

James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”