Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Hackers are shaking off their reputations as nerdy, loner basement dwellers and rebranding themselves on the world stage as members of Internet age tribes with offbeat codes of conduct and capricious goals.
A massive botnet has been linked to attacks on online banking customers of some of the largest banks in the United States and Europe, according to Proofpoint.
Taiwan's premier warned of increasing cyber attacks from China, the island's highest-ranking official to denounce attempts to "steal government secrets" despite warming cross-strait relations.
Outlier Security, a startup co-founded by former HBGary CEO Greg Hoglund emerged from stealth mode with a new approach on how enterprises can detect threats targeting their endpoints.
Marriott will pay a penalty of $600,000 for using Wi-Fi monitoring systems to block guests from accessing the Internet through their personal hotspots, the Federal Communications Commission (FCC) announced on Friday.
The FBI is offering a reward up to $5,000 for information that leads to the arrest of John Gordon Baden, considered to be one of San Diego FBI’s Most Wanted Cyber Fugitives.
China is waging an aggressive cyber-war against the United States which costs American business billions of dollars every year, Federal Bureau of Investigation director James Comey said.
US states are investigating a cyberattack against JPMorgan Chase that stole customer information, it emerged Friday, a day after the big bank revealed the massive scope of the breach.
A new piece of malware (Mac.BackDoor.iWorm) has infected thousands of Mac OS X devices and uses Reddit to get a list of command and control (C&C) servers.
JPMorgan Chase said Thursday that information such as names and addresses for 76 million household customers and seven million businesses was compromised in a data breach this summer.

FEATURES, INSIGHTS // Cybercrime

rss icon

Jeffrey Carr's picture
The term “Tipping Point” is controversial because it has been so widely misused and loosely applied; two abuses that I often see in the cyber security marketplace.
Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Danelle Au's picture
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.
Tal Be'ery's picture
The Target breach shows that APT attacks have commoditized and therefore should concern not only the government and defense industry, but probably every enterprise.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.
Jon-Louis Heimerl's picture
For a month, I kept all of my spam, then looked at the subject matter, where it was from and tried to analyze some additional characteristics of the spam.
Marc Solomon's picture
Mosquitoes are quite similar to malware. There are thousands of species and numerous ways to try to protect against them but each method has its limitations.
Chris Hinkley's picture
Whether you’re buying a smart refrigerator for your home or a printer for your company, your first step is deciding the risk involved and how to deploy the device in a secure manner while preserving the functionality you require.
Aviv Raff's picture
Without the elements of prevention, detection, and protection all working together, threat actors will always have the advantage, and will find a way to carry out their illicit economic, political or social agendas.