Security Experts:

long dotted


The Federal Financial Institutions Examination Council (FFIEC) says attacks targeting ATM web-based control panels poses a serious threat to banks
In a speech at the PLA's National Defense University, US Defense Secretary Chuck Hagel planned to urge China to be more open about its cyber capabilities to defuse tensions and prevent a potential crisis.
Bank of America Merrill Lynch is expanding chip and PIN technology to all purchasing and travel credit card products available to clients in the United States.
Seattle, Washington-based network security firm WatchGuard Technologies has added a new level of defense to its Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) appliances to help block Advance Persistent Threats.
Research from Incapsula shows DDoS attackers are innovating in a number of ways to stay a step ahead of mitigation efforts.
Turkey lifted a criticized block on Twitter on Thursday, 24 hours after its highest court had overturned the ban as a breach of the right to free speech.
Turkey's government faced growing pressure Thursday to quickly implement a top court order to unblock Twitter, which it had banned after corruption claims went viral on the social media site.
Two members of an international cybercrime operation have pleaded guilty in federal court in New Jersey to their roles in an identity theft and fraud scheme that attempted to steal at least $15 million.
Stephen Gunn paid FedEx drivers each thousands of dollars to intercept smartphone shipments, remove the contents, and re-ship the contents to addresses he provided.
More than 40 activist organizations and companies called for an overhaul of US government surveillance authority that goes beyond President Barack Obama's proposal.


rss icon

Eric Knapp's picture
Enemy infrastructure is and always has been an important military target. The difference is that with increasingly automated and connected infrastructure, the ability for an enemy to target these systems digitally has increased, putting these systems at greater risk.
Aviv Raff's picture
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
Mark Hatton's picture
One of my concerns heading into these Olympic Games is that the public has become somewhat desensitized to cyber-attacks and we may not have the same level of vigilance against cyber threats as we should.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Gil Zimmermann's picture
Understanding why passwords are so valuable to hackers can both explain and prepare enterprises to deal with potential security vulnerabilities. There are potentially hundreds of uses for stolen passwords once they are obtained.
Aviv Raff's picture
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.
Aviv Raff's picture
There are four key reasons why cloud-based sandboxes are qualitatively more effective than on-premise appliances...
Jeff Hudson's picture
Organizations need to consider more than just the malware itself if they are to defend against it; the first step in defending against malicious code infections is ensuring that a strong trust infrastructure is in place and well secured.
Eric Knapp's picture
Because transactions using virtual currencies happen anonymously, they confuse issues of jurisdiction and can become difficult to enforce. When authorities do take action, cybercrime simply re-images itself with a new currency and a new platform.
Wade Williamson's picture
By shortening the scope of an attack, it’s far less likely that response teams will get the chance to analyze such attacks in situ, so to speak.