Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

According to CareFirst, attackers gained limited access to a single database in June of 2014.
A new study from the Ponemon Institute found that attackers are going undetected for 197 days after penetrating the networks of retail companies.
Nigerian scammers target oil logistics companies in Europe and Asia. The attacks don't involve any malware.
Germany's BND intelligence agency helped the CIA track down Osama bin Laden in Pakistan where US special forces killed the al-Qaeda leader, according to a report published Sunday.
Penn State University said Friday that it disconnected the network of its college of engineering from the Internet in response to a cyber attack believed to be conducted by threat actors based in China.
Sally Beauty confirmed today that it was hit by a data breach and stated its investigation is ongoing.
NATO and the European Union on Thursday vowed to tighten cooperation against the "hybrid warfare" that the West accuses Russia of using in the battle for influence in the former Soviet Union.
The attack group "Naikon" has spent the last five years successfully infiltrating national organizations around the South China Sea in search of geo-political intelligence, Kaspersky Lab said.
The US House of Representatives voted Wednesday to end the NSA's dragnet collection of telephone data from millions of Americans, a controversial program revealed in 2013 by former security contractor Edward Snowden.
The APT28 cyber espionage group allegedly sponsored by Russia is planning to attack several banks, according to a report by root9B.

FEATURES, INSIGHTS // Cybercrime

rss icon

Danelle Au's picture
As long as companies continue to pay ransoms when attacked, we should expect cyber extortion to continue in 2015.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.