Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Cyber attacks that ultimately prompted Sony Pictures to scrap the release of a madcap comedy about North Korea are a "serious national security matter," the White House said Thursday.
Sony Pictures on Wednesday cancelled the release of a comedy about North Korea that triggered chilling threats from hackers, as US investigators reportedly blamed Pyongyang for a damaging cyber-raid on the movie giant.
US cinemas canceled screenings, including a red-carpet New York premiere, of a madcap comedy that offended North Korea, after hackers issued a chilling threat.
The developers of the popular PHP-based open source Internet forum software phpBB have shut down their network following a cyberattack in which user information might have been compromised.
Hackers invoked the 9/11 attacks Tuesday in their most chilling threat yet against Sony Pictures.
According to Symantec, researchers have seen a spike in emails with malicious links of late.
A new financial malware designed to target the customers of South Korean banks has been spotted in the wild by researchers at Trend Micro
Microsoft said it had secured broad support from a coalition of influential technology and media firms as it seeks to challenge a US ruling ordering it to hand over emails stored on a server in Ireland.
Vulnerabilities affecting a popular WordPress plugin are being abused by cybercriminals to hijack websites and redirect their visitors to a page set up to serve malware, researchers at Sucuri reported on Monday.
Sony Pictures organized a town hall-style meeting with staff Monday to discuss the massive cyber attack on the Hollywood studio, a day after hackers promised a big "Christmas gift."

FEATURES, INSIGHTS // Cybercrime

rss icon

David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”
Jon-Louis Heimerl's picture
Cybercrime “case studies” are always impersonal, right? Would you get more out of specific stories of individuals caught in the cross hairs instead of corporate entities?