Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Law enforcement officials have asked Congress to consider legislation that would give them more tools to go after the botnet operators.
NIST's VCAT committee released a report this week calling for the organization to reach out to outside experts and be cautious about relying on the NSA during the development of crypto standards.
Solutionary found that Amazon Web Services (AWS) continues to be responsible for hosting most malware.
According to Arbor Networks, the first six months of 2014 saw the most volumetric DDoS attacks ever, with more than 100 events of more than 100 GB/sec reported.
Security website Abuse.ch announced the creation of a blacklist containing SSL certificates that are known to be associated with malware and botnet activities such as command and control (C&C) traffic.
Russian President Vladimir Putin condemned the "hypocrisy" of Western countries who use cyber-espionage to eavesdrop on leaders, and called for an international campaign to combat the problem.
Malware developers have recently started advertising a new banking Trojan called "Kronos" on a Russian cybercrime forum.
Qendrim Dobruna, an Albanian hacker who was part of a cybercrime group that stole $14 million from ATM machines all over the world, pleaded guilty to bank fraud.
The source code for a version of the Tinba malware was published last week on a private underground forum, Denmark-based CSIS Security Group reported on Thursday.
Cybercriminals have developed a new Trojan largely based on Gameover Zeus in an effort to revive the botnet that was recently disrupted by international authorities.

FEATURES, INSIGHTS // Cybercrime

rss icon

Jon-Louis Heimerl's picture
For a month, I kept all of my spam, then looked at the subject matter, where it was from and tried to analyze some additional characteristics of the spam.
Marc Solomon's picture
Mosquitoes are quite similar to malware. There are thousands of species and numerous ways to try to protect against them but each method has its limitations.
Chris Hinkley's picture
Whether you’re buying a smart refrigerator for your home or a printer for your company, your first step is deciding the risk involved and how to deploy the device in a secure manner while preserving the functionality you require.
Aviv Raff's picture
Without the elements of prevention, detection, and protection all working together, threat actors will always have the advantage, and will find a way to carry out their illicit economic, political or social agendas.
Eric Knapp's picture
Enemy infrastructure is and always has been an important military target. The difference is that with increasingly automated and connected infrastructure, the ability for an enemy to target these systems digitally has increased, putting these systems at greater risk.
Aviv Raff's picture
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
Mark Hatton's picture
One of my concerns heading into these Olympic Games is that the public has become somewhat desensitized to cyber-attacks and we may not have the same level of vigilance against cyber threats as we should.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Gil Zimmermann's picture
Understanding why passwords are so valuable to hackers can both explain and prepare enterprises to deal with potential security vulnerabilities. There are potentially hundreds of uses for stolen passwords once they are obtained.
Aviv Raff's picture
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.