Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Viator, the tour-booking company acquired this summer by TripAdvisor for $200 million, is notifying roughly 1.4 million customers that their payment card data and personal details might have been compromised following a data breach.
The official website for the popular JavaScript library jQuery (jquery.com) has been compromised and abused by cybercriminals to distribute information-stealing malware, according to reports.
Representatives from European banks have signed a memorandum of understanding (MOU) with Europol in an effort to enhance cooperation in the fight against cybercrime.
The FBI vowed to widen a probe into the massive hacking of naked celebrity photos if necessary, after new reported leaks including nude shots of Kim Kardashian.
The group was allegedly involved in withdrawing hundreds of thousands of dollars from ATMs in Spain as part of a global cyber-fraud operation
Israeli Prime Minister Benjamin Netanyahu has launched a National Authority for Cyber Defense to oversee the protection of both military and civilian systems.
Researchers at Malwarebytes noticed earlier this week that the websites of The Times of Israel and The Jerusalem Post had been serving malicious ads as part of a malvertising campaign that appears to involve several threat actors.
Russia is considering measures to protect its cyberspace from the "unpredictable" West, President Vladimir Putin's spokesman said.
The recent expansion of generic Top-Level Domains (gTLDs) has attracted the attention of cybercriminals who have started abusing them for their malicious operations, researchers warned this week.
Apple is rolling out new privacy protections for iPhones and iPads, with a new system that makes it impossible for the company to unlock a device even with a warrant.

FEATURES, INSIGHTS // Cybercrime

rss icon

Jeffrey Carr's picture
The term “Tipping Point” is controversial because it has been so widely misused and loosely applied; two abuses that I often see in the cyber security marketplace.
Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Danelle Au's picture
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.
Tal Be'ery's picture
The Target breach shows that APT attacks have commoditized and therefore should concern not only the government and defense industry, but probably every enterprise.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.
Jon-Louis Heimerl's picture
For a month, I kept all of my spam, then looked at the subject matter, where it was from and tried to analyze some additional characteristics of the spam.
Marc Solomon's picture
Mosquitoes are quite similar to malware. There are thousands of species and numerous ways to try to protect against them but each method has its limitations.
Chris Hinkley's picture
Whether you’re buying a smart refrigerator for your home or a printer for your company, your first step is deciding the risk involved and how to deploy the device in a secure manner while preserving the functionality you require.
Aviv Raff's picture
Without the elements of prevention, detection, and protection all working together, threat actors will always have the advantage, and will find a way to carry out their illicit economic, political or social agendas.