Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Two possible suicides may be linked to the hacking of adultery website Ashley Madison and the release of its membership data, Canadian police said.
Cyber spies most probably based in China have been snooping on Indian government bodies and universities since 2012 for sensitive material on its rival neighbor, according to FireEye.
The hackers behind the Ashley Madison breach compared the affair-seeking website to "a drug dealer abusing addicts" in an email exchange threatening to carry out more attacks.
Cybercriminals using thousands of hacked WordPress sites to deliver CryptoWall 3.0 via Neutrino exploit kit. One major Angler EK customer switched to Neutrino.
Hackers released what was purported to be a second batch of data from the affair-seeker website Ashley Madison, a report said Thursday.
The Internet Explorer zero-day patched this week by Microsoft has been used in watering hole attacks to deliver the PlugX RAT.
Japanese police will re-arrest the CEO of collapsed Bitcoin exchange MtGox on theft allegations, reports said.
Hackers leak the details of more than 30 million accounts registered on the cheating website Ashley Madison.
Web.com said that hackers breached a server and made away with credit card and personal information of roughly 93,000 of its customers.
Darkode member involved in the creation and operation of a spam botnet powered by Facebook Spreader malware pleads guilty.

FEATURES, INSIGHTS // Cybercrime

rss icon

James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”