Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

A new study from the Ponemon Institute found that attackers are going undetected for 197 days after penetrating the networks of retail companies.
Nigerian scammers target oil logistics companies in Europe and Asia. The attacks don't involve any malware.
Germany's BND intelligence agency helped the CIA track down Osama bin Laden in Pakistan where US special forces killed the al-Qaeda leader, according to a report published Sunday.
Penn State University said Friday that it disconnected the network of its college of engineering from the Internet in response to a cyber attack believed to be conducted by threat actors based in China.
Sally Beauty confirmed today that it was hit by a data breach and stated its investigation is ongoing.
NATO and the European Union on Thursday vowed to tighten cooperation against the "hybrid warfare" that the West accuses Russia of using in the battle for influence in the former Soviet Union.
The attack group "Naikon" has spent the last five years successfully infiltrating national organizations around the South China Sea in search of geo-political intelligence, Kaspersky Lab said.
The US House of Representatives voted Wednesday to end the NSA's dragnet collection of telephone data from millions of Americans, a controversial program revealed in 2013 by former security contractor Edward Snowden.
The APT28 cyber espionage group allegedly sponsored by Russia is planning to attack several banks, according to a report by root9B.
Tens of thousands of routers infected with the Spike malware have been used to launch DDoS attacks. Incapsula has published a report detailing the botnet.

FEATURES, INSIGHTS // Cybercrime

rss icon

Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”
Jon-Louis Heimerl's picture
Cybercrime “case studies” are always impersonal, right? Would you get more out of specific stories of individuals caught in the cross hairs instead of corporate entities?
Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.
Mark Hatton's picture
So what does the World Cup have to do with cyber security? A great deal actually. Anytime there is a large-scale global event, there is a sharp spike in the number of cyber scams that are unleashed.