Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

According to Mandiant’s M-Trends report, organizations are discovering breaches in their networks faster, but still not nearly soon as they must in order to contain damage and prevent loss of sensitive data.
The chairman of a new German parliamentary panel probing mass surveillance by the NSA abruptly quit on April 9, rejecting opposition demands that the body question fugitive US intelligence leaker Edward Snowden.
Mining companies, government agencies and manufacturing firms were hit hard by phishers in 2013, with one in three such organizations suffering at least one attack.
Intego, a provider of security products designed exclusively for Mac OS, introduced its latest product line, including VirusBarrier X8 and NetBarrier X8.
In a speech at the PLA's National Defense University, Hagel planned to urge China to be more open about its cyber capabilities to defuse tensions and avoid an inadvertent conflict, a senior defense official said.
Federal authorities have charged eight people in connection with the theft of personal data belonging to AT&T customers.
The Federal Financial Institutions Examination Council (FFIEC) says attacks targeting ATM web-based control panels poses a serious threat to banks
In a speech at the PLA's National Defense University, US Defense Secretary Chuck Hagel planned to urge China to be more open about its cyber capabilities to defuse tensions and prevent a potential crisis.
Bank of America Merrill Lynch is expanding chip and PIN technology to all purchasing and travel credit card products available to clients in the United States.
Seattle, Washington-based network security firm WatchGuard Technologies has added a new level of defense to its Unified Threat Management (UTM) and Next-Gen Firewall (NGFW) appliances to help block Advance Persistent Threats.

FEATURES, INSIGHTS // Cybercrime

rss icon

Aviv Raff's picture
A combination of new threat actors, new attack approaches, and new masking tactics demand that enterprises redefine malware, and make all necessary investments in people, technology and systems to stay one step ahead.
Mark Hatton's picture
One of my concerns heading into these Olympic Games is that the public has become somewhat desensitized to cyber-attacks and we may not have the same level of vigilance against cyber threats as we should.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Gil Zimmermann's picture
Understanding why passwords are so valuable to hackers can both explain and prepare enterprises to deal with potential security vulnerabilities. There are potentially hundreds of uses for stolen passwords once they are obtained.
Aviv Raff's picture
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.
Aviv Raff's picture
There are four key reasons why cloud-based sandboxes are qualitatively more effective than on-premise appliances...
Jeff Hudson's picture
Organizations need to consider more than just the malware itself if they are to defend against it; the first step in defending against malicious code infections is ensuring that a strong trust infrastructure is in place and well secured.
Eric Knapp's picture
Because transactions using virtual currencies happen anonymously, they confuse issues of jurisdiction and can become difficult to enforce. When authorities do take action, cybercrime simply re-images itself with a new currency and a new platform.
Wade Williamson's picture
By shortening the scope of an attack, it’s far less likely that response teams will get the chance to analyze such attacks in situ, so to speak.
Oliver Rochford's picture
As the “Snowden leaks” continue in their revelations and unraveling of the twisted web of government surveillance, it is becoming clear that the foundation of trust in the Internet as a shared commons has been thoroughly undermined.