Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The Russian and Chinese governments are likely behind widespread cyberespionage that has hit targets in the US and elsewhere, two separate security reports said Tuesday.
FireEye has released a new report uncovering and detailing a large cyber-espionage campaign that the company believes is sponsored by the Russian government and dates back to 2007.
Credit-card hacking is the number one crime on Americans' worry list, far above getting mugged or murdered, according to a Gallup survey released Oct. 27.
According to the report, 94 percent of businesses have encountered at least one cyber-security incident in the past 12 months, with 12 percent of the countries having experienced at least one targeted attack.
Three suspects have been arrested for allegedly being part of an eastern European criminal organization that uses malware to steal money from ATMs.
An Estonian man was sentenced to prison for his role in hacking RBS WorldPay and stealing $9.4 million in 2008.
The Delaware River and Bay Authority (DRBA) published a data security event notice on Friday to warn people who have made purchases at Cape May-Lewes Ferry terminals and vessels that their payment card data might have been compromised.
Bulgarian national Aleksi Kolarov was sentenced to 30 months in prison for his role in an international conspiracy to operate the hacking and identity theft online marketplace called ShadowCrew.
The number of DNS amplification attacks grew by 183 percent between January and August, according to a new report from Symantec.
Researchers at Trend Micro analyze a cyber-espionage campaign that has targeted military, government and media organizations.

FEATURES, INSIGHTS // Cybercrime

rss icon

James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”
Jon-Louis Heimerl's picture
Cybercrime “case studies” are always impersonal, right? Would you get more out of specific stories of individuals caught in the cross hairs instead of corporate entities?
Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.
Mark Hatton's picture
So what does the World Cup have to do with cyber security? A great deal actually. Anytime there is a large-scale global event, there is a sharp spike in the number of cyber scams that are unleashed.
Tal Be'ery's picture
Defenders should use their "Strategic Depth" to mitigate attacks not on the perimeter but deeper within their network where they can leverage on their strategic advantage.
Wade Williamson's picture
In the same way we have watched APT techniques trickle down from nation-state actors to more opportunistic criminals, we should expect MitB to expand from financial services to all types of applications.