Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Terdot banking Trojan packs information-stealing capabilities that could easily turn it into a cyber-espionage tool [Read More]
Kaspersky shares more details from its investigation into reports that Russian hackers stole NSA data using its software [Read More]
Cyber criminals have latched onto the notion of "fake news" and turned it into a profitable business model, with services starting at under $10, security researchers said. [Read More]
The U.S. government introduced greater transparency into the process by which government agencies decide whether to disclose or stockpile the cyber vulnerabilities they discover. [Read More]
Russia has launched cyber attacks on the UK media, telecoms and energy sectors in the past year, Britain's cyber security chief said Wednesday amid reports of Russian interference in the Brexit referendum. [Read More]
A newly discovered multi-stage Android malware that managed to sneak into Google Play is using advanced anti-detection features, ESET security researchers reveal. [Read More]
Forever 21 investigating payment card breach, but only few details were provided by the company [Read More]
The United States Department of Homeland Security (DHS) shared details of hacking tools they say are being used by a hacking group linked to the North Korean government known as “Hidden Cobra.” [Read More]
A newly discovered banking Trojan called IcedID packs a modular design and modern capabilities when compared to older financial threats, IBM X-Force warns. [Read More]
Internet-connected Automated teller machines (ATMs) can be discovered using dedicated search engines and specific keywords and then ensnared into botnets, Kaspersky Lab researchers believe. [Read More]

FEATURES, INSIGHTS // Cybercrime

rss icon

Alastair Paterson's picture
There are several mitigation measures and best practices that you can adopt to improve your organization’s security posture and reduce the risk of supply chain infections.
Siggi Stefnisson's picture
In the cat-and-mouse game between security providers and malware authors, cybercriminals keep innovating and experimenting – a dynamic seen in the recent resurgence of the Locky ransomware.
Travis Greene's picture
While a credit freeze can protect against the opening of fraudulent credit accounts, it is not an inoculation against identity theft. What can be done to help protect identities and the attributes associated with them?
Jack Danahy's picture
While devastating to the victims, the recent rash of ransomware has been helpful in putting an objective and quantifiable face on modern threats associated in cybersecurity.
Siggi Stefnisson's picture
SSL encryption can create blind spots in many organizations, as malware in the HTTPS channel is essentially hidden from most web security tools.
Jennifer Blatnik's picture
If the rest of the community would give hackers more of a chance before writing them off as evildoers, there would potentially be more incentives for capable people to go into the white hat hacking business.
Alastair Paterson's picture
The emergence of decentralized marketplaces within the criminal ecosystem poses significant challenges for law enforcement agencies and private security vendors.
Jack Danahy's picture
Awareness is not enough. Companies also need to dedicate themselves to protecting users and eliminating the blind spots caused by unpatched systems and a lack of strong endpoint protection.
Alastair Paterson's picture
As the opportunity for payment card fraud grows, it’s safe to assume that more cybercriminals will take advantage of new, sophisticated online courses to get a piece of the pie.
Ting-Fang Yen's picture
The attackers may be looking for the path of least resistance, but there is no shortcut to securing your platform.