Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

FireEye uncovered details of APT30, a decade-long cyber espionage campaign carried out by China targeting governments, journalists and businesses in South East Asia and India.
French TV5Monde television channel, which suffered a major hack by self-proclaimed Islamic State militants this week, admitted an Internet security 'blunder' during a program discussing the cyber-attack.
Cisco and Level 3 have taken steps to disrupt the activities of the threat group that uses SSH brute force attacks to distribute a piece of DDoS malware.
The attack launched by ISIS-linked hackers on the French TV station TV5Monde appears to have involved Kjw0rm, a RAT developed using Njw0rm source code.
Security researchers and law enforcement agencies from around the world partnered to disrupt the malware.
The "unprecedented" cyber-attack on French television channel TV5Monde represents a major "step up" in the Internet warfare being waged by highly specialized jihadist hackers, experts said.
Hotel management company White Lodging Services said that hackers appear to have compromised point-of-sale (PoS) systems at 10 of its hotel properties, the second breach in just over a year.
French television network TV5Monde was forced to broadcast only pre-recorded programs Thursday after an "unprecedented" hack by self-proclaimed Islamic State militants.
Activist groups unveiled a new coalition aimed at repealing the law authorizing mass surveillance by US intelligence and law enforcement agencies.
The White House said it would not name those behind a cyber attack on official Washington targets last October, after reports blamed Russia.

FEATURES, INSIGHTS // Cybercrime

rss icon

Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”
Jon-Louis Heimerl's picture
Cybercrime “case studies” are always impersonal, right? Would you get more out of specific stories of individuals caught in the cross hairs instead of corporate entities?
Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.
Mark Hatton's picture
So what does the World Cup have to do with cyber security? A great deal actually. Anytime there is a large-scale global event, there is a sharp spike in the number of cyber scams that are unleashed.