Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Researchers at Trend Micro analyze a cyber-espionage campaign that has targeted military, government and media organizations.
A new piece of malware discovered by researchers at Trend Micro is designed to steal files from infected systems and upload them to the file storage and synchronization service Google Drive.
Microsoft has become aware of targeted cyberattacks leveraging a new vulnerability (CVE-2014-6352) that affects most supported Windows releases.
Apple said Tuesday its iCloud server has been the target of "intermittent" attacks, hours after a security blog said Chinese authorities had been trying to hack into the system.
The Chinese government has started launching cyberattacks against Apple customers just as the company announced the availability of the latest iPhone in the country, an anti-censorship organization reported on Monday.
The Securities Industry and Financial Markets Association released recommendations for to guide the creation of cybersecurity regulations affecting the financial industry.
Researchers have found a way to trick Android users into executing potentially malicious applications by hiding them inside innocent-looking image files.
FBI chief James Comey renewed a call for broader authority to tap into emerging technologies, saying the Edward Snowden revelations have led to unwarranted mistrust of law enforcement.
The combined efforts of a number of security companies helped disrupt malware linked to Chinese cyber-espionage group.
A group of hackers posted a message on Pastebin claiming they have "hacked" nearly 7 million Dropbox accounts. The cloud storage giant said the data was stolen from other services, not from its own systems.

FEATURES, INSIGHTS // Cybercrime

rss icon

Jeffrey Carr's picture
The term “Tipping Point” is controversial because it has been so widely misused and loosely applied; two abuses that I often see in the cyber security marketplace.
Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Danelle Au's picture
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.
Tal Be'ery's picture
The Target breach shows that APT attacks have commoditized and therefore should concern not only the government and defense industry, but probably every enterprise.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.
Jon-Louis Heimerl's picture
For a month, I kept all of my spam, then looked at the subject matter, where it was from and tried to analyze some additional characteristics of the spam.
Marc Solomon's picture
Mosquitoes are quite similar to malware. There are thousands of species and numerous ways to try to protect against them but each method has its limitations.
Chris Hinkley's picture
Whether you’re buying a smart refrigerator for your home or a printer for your company, your first step is deciding the risk involved and how to deploy the device in a secure manner while preserving the functionality you require.
Aviv Raff's picture
Without the elements of prevention, detection, and protection all working together, threat actors will always have the advantage, and will find a way to carry out their illicit economic, political or social agendas.