Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Small and medium companies in the European automobile sector have been targeted by cybercriminals using a relatively new piece of malware, Symantec has warned.
Sony said that some of its online services were hit by a DDoS attack by a hacker group, while another group threatened that a plane carrying a company executive was carrying a bomb.
The United States Secret Service estimated more than 1,000 businesses have been infected by the "Backoff" point-of-sale malware, and many of them are unaware they have been compromised, according to a Department of Homeland Security advisory.
Dubbed "BotMaker," Twitter's anti-spam system is already being used in production, and the company claims to have observed a 40% reduction in key spam metrics since its introduction.
Cyber-attack activity in Las Vegas spiked during the Black Hat USA and Def Con conferences, according to Imperva.
Experts say cybercriminals are moving away from fake anti-virus attacks because they're not as profitable as they used to be.
Attackers are playing on the hype around the crypto-currency Bitcoin to cast a wider phishing net looking for victims. It's not just bank credentials cyber-criminals are looking for.
The UPS Store said on Wednesday that computer systems at several of its franchised center locations had been infected with stealthy malware that went undetected by its anti-virus software and exposed customer payment data.
The malware at the center of the 'Machete' cyber attacks is capable of a number of actions, including logging keystrokes, capturing audio and screenshots, taking photos from the victim's webcam and capturing geo-location data.
Security researchers have discovered that a piece of malware designed to run on Linux computers has been ported by its creators to Windows.

FEATURES, INSIGHTS // Cybercrime

rss icon

Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Danelle Au's picture
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.
Tal Be'ery's picture
The Target breach shows that APT attacks have commoditized and therefore should concern not only the government and defense industry, but probably every enterprise.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.
Jon-Louis Heimerl's picture
For a month, I kept all of my spam, then looked at the subject matter, where it was from and tried to analyze some additional characteristics of the spam.
Marc Solomon's picture
Mosquitoes are quite similar to malware. There are thousands of species and numerous ways to try to protect against them but each method has its limitations.
Chris Hinkley's picture
Whether you’re buying a smart refrigerator for your home or a printer for your company, your first step is deciding the risk involved and how to deploy the device in a secure manner while preserving the functionality you require.
Aviv Raff's picture
Without the elements of prevention, detection, and protection all working together, threat actors will always have the advantage, and will find a way to carry out their illicit economic, political or social agendas.
Eric Knapp's picture
Enemy infrastructure is and always has been an important military target. The difference is that with increasingly automated and connected infrastructure, the ability for an enemy to target these systems digitally has increased, putting these systems at greater risk.