Security Experts:

long dotted


The value of Ethereum, a cryptocurrency somewhat similar to bitcoin, has plummeted following a hack on The DAO's Ethereum holdings. [Read More]
Ardit Ferizi admitted in a United States court to providing material support to the Islamic State of Iraq and the Levant (ISIL) . [Read More]
The FBI's facial recognition database has more than 400 million pictures to help its criminal investigations, but lacks adequate safeguards for accuracy and privacy protection, a congressional audit shows. [Read More]
Malware authors have been long using JavaScript to distribute their malicious applications, but none of them has created a piece of ransomware using exclusively JavaScript until now. [Read More]
VerticalScope, which hosts 1,100 websites and forums, was hacked earlier this year, with the details of around 45 million users later leaked online. [Read More]
Hacked servers from all around the world are up for sale on obscure online marketplaces, and they are quite cheap too, going for as low as $6, Kaspersky Labs researchers warn. [Read More]
Malware authors are switching from macros to object linking and embedding (OLE) to hide malicious Visual Basic and JavaScript scripts in Office documents, Microsoft warns. [Read More]
US authorities charged Xu Jiaqiang, a former Chinese employee of IBM, with economic espionage for allegedly stealing proprietary source code to hand over to a Chinese government agency. [Read More]
Hackers aligned with Russia's government breached US Democratic National Committee computers and stole data including a trove of opposition research on Republican presidential hopeful Donald Trump. [Read More]
The PhotoMiner worm spreads through infecting websites that are hosted on FTP servers, and brings its authors money by mining for the Monero crypto-currency. [Read More]


rss icon

Bill Sweeney's picture
The concept of cyber Unicorns is that financial crime achieved via cyber means is no longer a pastime; rather it’s a full time job.
Wade Williamson's picture
The evolution of ransomware from simple malware to more persistent attacks has a major impact on the way enterprise security teams have to think about mitigation.
Scott Gainey's picture
By monitoring for and detecting the underlying and shared behaviors of malware we can effectively stop ransomware infections before they can cause damage.
Shlomo Kramer's picture
Mid-market enterprises with limited resources and weak defenses are a particularly good target for ransomware attacks: they have just enough assets worth paying for, and the capital to do so.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Tim Layton's picture
The value of identifying your organization’s information out on the Dark Web can serve as a first-line indicator of a new breach that otherwise may go undetected for long periods of time.
Alastair Paterson's picture
In 2015 we saw a surge in attacks against the financial services industry that involved extortion, social engineering, credential-stealing malware and sophisticated threats.
Wade Williamson's picture
Asking for security backdoors that only benefit the good guys is like asking for bullets that only hurt the bad guys. That’s simply not how encryption works.
Tim Layton's picture
By understanding your adversaries’ activity on the Dark Web , you can take more of a proactive approach that helps reduce uncertainty and improves overall cyber resiliency.
Alastair Paterson's picture
As security professionals, it’s our job to enable business while protecting it; embracing social media is an imperative, but we also need to mitigate the exploitation of what our organizations reveal online.