Security Experts:

long dotted


Attend this webinar to learn how to leverage findings based on actual cybercrime attacks detected during real-time analysis and interdiction of fraudulent account logins, online payments and registrations.
A Romanian man was sentenced today to serve more than five years in prison for his role in an international fraud scheme involving online marketplace websites.
Sony Pictures apologized for racially insensitive remarks about President Barack Obama in company emails, including an email in which Sony co-chairwoman Amy Pascal asks film producer Scott Rudin what she should ask Obama at a "stupid" fundraising breakfast.
Nearly two years after the Red October cyber espionage operation was exposed, researchers have spotted a new advanced persistent threat (APT) campaign that appears to represent the return of the Red October group.
Cyber crime is a serious threat to safety in the skies, aviation industry heavyweights said Wednesday, vowing to fight the growing scourge before it causes a catastrophic incident.
Area 1 Security has raised $8 million in a Series A funding round led by Ted Schlein at Kleiner Perkins Caufield & Byers (KPCB).
Researchers say the attackers used a proxy network of routers as well as the WebDAV protocol to mask their identities.
A digital certificate stolen from Sony Pictures under the recent cyber attack have been used to sign malware, according to a report from Kaspersky Lab.
A new report from the Association of National Advertisers and fraud detection firm WhiteOps estimates that bot fraud is costing the ad industry billions.
Electronic payment gateway solutions provider CHARGE Anywhere, LLC said on Tuesday that an attack against its network resulted in hackers gaining access to payment card data for transactions processed through many merchants.


rss icon

Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.
Mark Hatton's picture
So what does the World Cup have to do with cyber security? A great deal actually. Anytime there is a large-scale global event, there is a sharp spike in the number of cyber scams that are unleashed.
Tal Be'ery's picture
Defenders should use their "Strategic Depth" to mitigate attacks not on the perimeter but deeper within their network where they can leverage on their strategic advantage.
Wade Williamson's picture
In the same way we have watched APT techniques trickle down from nation-state actors to more opportunistic criminals, we should expect MitB to expand from financial services to all types of applications.
Jeffrey Carr's picture
The term “Tipping Point” is controversial because it has been so widely misused and loosely applied; two abuses that I often see in the cyber security marketplace.
Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Danelle Au's picture
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.
Tal Be'ery's picture
The Target breach shows that APT attacks have commoditized and therefore should concern not only the government and defense industry, but probably every enterprise.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.