Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Cybercriminals are expanding the Linux botnet dubbed "Mayhem" by leveraging the recently discovered vulnerabilities in the GNU Bash shell, according to researchers.
Edward Snowden, who was granted asylum by Moscow after revealing the extent of US global surveillance, has been reunited with his girlfriend in Russia, his lawyer said.
The founder of virtual currency firm Liberty Reserve, Arthur Budovsky, was extradited from Spain to face US criminal charges for operating what officials called a massive money-laundering scheme.
Kmart said that on Thursday, Oct. 9, its IT team detected that its payment data systems had been breached, exposing payment card data.
Dairy Queen has determined that cybercriminals managed to plant point-of-sale (PoS) malware at hundreds of stores.
A group of security researchers, hardware hackers, hardware developers and hobbyists have set out to demonstrate that many of the tools similar to those used by the NSA for surveillance operations can be reproduced on a low budget with open source software and hardware components.
Researchers at Denmark-based security firm CSIS have stumbled upon a new variant of Rovnix, a piece of malware that's designed to download other threats onto infected machines.
Hackers are shaking off their reputations as nerdy, loner basement dwellers and rebranding themselves on the world stage as members of Internet age tribes with offbeat codes of conduct and capricious goals.
A massive botnet has been linked to attacks on online banking customers of some of the largest banks in the United States and Europe, according to Proofpoint.
Taiwan's premier warned of increasing cyber attacks from China, the island's highest-ranking official to denounce attempts to "steal government secrets" despite warming cross-strait relations.

FEATURES, INSIGHTS // Cybercrime

rss icon

Jeffrey Carr's picture
The term “Tipping Point” is controversial because it has been so widely misused and loosely applied; two abuses that I often see in the cyber security marketplace.
Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Danelle Au's picture
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.
Tal Be'ery's picture
The Target breach shows that APT attacks have commoditized and therefore should concern not only the government and defense industry, but probably every enterprise.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.
Jon-Louis Heimerl's picture
For a month, I kept all of my spam, then looked at the subject matter, where it was from and tried to analyze some additional characteristics of the spam.
Marc Solomon's picture
Mosquitoes are quite similar to malware. There are thousands of species and numerous ways to try to protect against them but each method has its limitations.
Chris Hinkley's picture
Whether you’re buying a smart refrigerator for your home or a printer for your company, your first step is deciding the risk involved and how to deploy the device in a secure manner while preserving the functionality you require.
Aviv Raff's picture
Without the elements of prevention, detection, and protection all working together, threat actors will always have the advantage, and will find a way to carry out their illicit economic, political or social agendas.