Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Reddit on Thursday issued its first transparency report, revealing numbers of requests for user data and bids to have content removed from the online messaging board.
Researchers at SentinelOne have analyzed a new variant of the notorious banking Trojan Zeus and managed to access the control panel used by cybercriminals to monitor and control their operations.
Hackers encrypt information stored in website databases and hold it for ransom in a type of attack dubbed by researchers "RansomWeb"
It didn't take long for information security professionals to take to Twitter, blogs, and social media to blast the latest White House proposals for cybersecurity legislation. A small group of civic-minded professionals are calling on the industry to stop complaining and actually do something about it.
InfoArmor, a provider of fraud and identify theft protection services, has acquired cybercrime research firm IntelCrawler for an undisclosed sum.
Suits and Spooks DC will be held at the Ritz-Carlton, Pentagon City on February 4-5. Take a look at the agenda to see why this will be one of the hottest events of the year!
Symantec has published a new whitepaper detailing the activities of a threat group dubbed by the security firm “Waterbug.”
A new survey underscores the security challenges the Internet of Things is posing to enterprise networks.
Russia-based dating website Topface says it’s investigating reports that the details of 20 million users have been stolen by hackers.
The Malaysia Airlines website was defaced by hackers who referenced the Islamic State jihadists and claimed to be from the "Lizard Squad".

FEATURES, INSIGHTS // Cybercrime

rss icon

James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.