Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Researchers at Palo Alto Networks outlined a cyber-espionage operation targeting Southeast Asia that may be state-sponsored.
The US State Department -- on the front lines of the sensitive Iran nuclear negotiations -- said Thursday it was confident there had been no security breach, after Swiss and Austrian investigators launched probes into alleged cyber-spying.
Suspected Chinese hackers who infiltrated the US government's human resources records have sensitive information on all federal employees, an American union said Thursday.
A tech-savvy US teen pleaded guilty in court on Thursday to using social media to aid the Islamic State group, a crime punishable by up to 15 years in prison.
The man responsible for reviewing Britain's anti-terrorism laws called for greater judicial oversight over data interception as ministers prepare legislation firming up the powers of security services following leaks by Edward Snowden.
Chinese hackers accused of attacking US federal databases may have snared the names of Chinese with links to American officials, putting them in danger, The New York Times said Wednesday.
A new report from Trustwave shows that PoS compromises accounted for 40 percent of their breach investigations in 2014.
49 individuals suspected of being part of a cybercrime ring have been arrested in Europe. They used malware and social engineering to defraud European companies.
The investigation into the cyberattack suffered by France's TV5Monde television channel in April is now focusing on "a group of Russian hackers known as APT28.
The US Army's official website was hacked Monday with messages denouncing Washington's training of rebel fighters inside Syria, but no data was stolen, officials said.

FEATURES, INSIGHTS // Cybercrime

rss icon

Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”
Jon-Louis Heimerl's picture
Cybercrime “case studies” are always impersonal, right? Would you get more out of specific stories of individuals caught in the cross hairs instead of corporate entities?
Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.