Security Experts:

long dotted


Former US intelligence contractor and whistleblower Edward Snowden joined Twitter Tuesday, picking up more than a quarter of a million followers on the social network in just over two hours.
Akamai said a botnet using the XOR DDoS Trojan is now capable of launching 150+ gigabit-per-second (Gbps) DDoS attacks.
The United States and China have agreed not to conduct or condone cyber attacks on each other's private sector for commercial gain.
A new ATM malware dubbed “GreenDispenser” allows attackers to empty cash vaults by entering passwords and commands via the PIN pad.
Researchers have linked the Naikon APT to an officer in a unit of the Chinese People’s Liberation Army (PLA).
Chinese President Xi Jinping heads to Washington Thursday for summit talks with Barack Obama having made clear that few compromises are in store on hot-button issues like cyber theft and the South China Sea.
The massive breaches of US government records resulted in the theft of some 5.6 million sets of fingerprints, officials said Wednesday, raising their estimate from 1.1 million.
Chinese President Xi Jinping rejected allegations that Beijing supports commercial cyber theft, labeling the practice a crime that should be punished under law.
A malicious application disguised as a game called BrainTest could potentially have been installed on up to one million devices, according to Check Point.
F-Secure has summed up the evidence showing that the Russian government is behind MiniDuke, CosmicDuke and the other Duke malware.


rss icon

Scott Gainey's picture
Organizations are asking the question – how much do I really need to spend on security in order to tip the scales in my favor? In order to answer that question you must first quantify the impact and risk of a cyber attack.
Marc Solomon's picture
Given the continuous innovation by attackers, it’s likely that your malware analysis needs have exceeded the capabilities of traditional sandboxing technologies.
Marc Solomon's picture
Cybercrime-as-a-Service is increasing the sophistication and frequency of attacks to the point where they seem to be pervasive. When evaluating your approach to security in light of this increasingly popular approach to attacks, seek out solutions that are equally pervasive.
Danelle Au's picture
As long as companies continue to pay ransoms when attacked, we should expect cyber extortion to continue in 2015.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.