Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

An email scam which targets businesses with bogus invoices has netted more than $214 million from victims in 45 countries in just over one year, an FBI task force said Thursday.
A new variant of the CTB-Locker (Critroni) ransomware has been spotted in the wild by researchers at Trend Micro.
Huawei CEO Ren Zhengfei said at the World Economic Forum that China has never asked it to spy on the United States or others.
According to Vormetric's 2015 Insider Threat Report, 93 percent of the organizations surveyed based in the U.S. felt they were vulnerable to insider threats.
Israeli police arrested a man suspected of hacking into the computers and stealing the work of international recording artists including Madonna, police said.
Please join us for a special webcast: Protecting Against Fraud and Cybercrime from Mobile Devices, presented by ThreatMetrix.
Nathan Leroux, 20, of Bowie, Maryland, has admitted taking part in an international hacking and intellectual property theft conspiracy, the FBI announced on Tuesday.
The computers of gamers in Taiwan and other Asian countries might have been infected with a piece of malware after cybercriminals managed to compromise official installers and updates for a couple of popular online games.
Chinese authorities are accused of launching a man-in-the-middle (MitM) attack against customers of Microsoft’s email service Outlook.
The World Economic Forum released two reports touching on cybersecurity as business leaders around the world prepare to descend on Switzerland for the group's annual meeting.

FEATURES, INSIGHTS // Cybercrime

rss icon

Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”
Jon-Louis Heimerl's picture
Cybercrime “case studies” are always impersonal, right? Would you get more out of specific stories of individuals caught in the cross hairs instead of corporate entities?
Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.
Mark Hatton's picture
So what does the World Cup have to do with cyber security? A great deal actually. Anytime there is a large-scale global event, there is a sharp spike in the number of cyber scams that are unleashed.
Tal Be'ery's picture
Defenders should use their "Strategic Depth" to mitigate attacks not on the perimeter but deeper within their network where they can leverage on their strategic advantage.
Wade Williamson's picture
In the same way we have watched APT techniques trickle down from nation-state actors to more opportunistic criminals, we should expect MitB to expand from financial services to all types of applications.
Jeffrey Carr's picture
The term “Tipping Point” is controversial because it has been so widely misused and loosely applied; two abuses that I often see in the cyber security marketplace.
Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.