Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The breach has cost Target $162 million so far, according to the firm's earnings report.
Bitdefender finds 10 apps hiding aggressive adware on Google Play. The applications redirect users to ads in all Web browser and even Facebook.
Canada's electronic eavesdropping agency has amassed a huge trove of emails sent to the government, as part of its cybersecurity mandate, according to a leaked secret document Wednesday.
Microsoft, Symantec and others teamed up with the law enforcement community to take down the Ramnit botnet.
Google’s Vietnam domain (google.com.vn) was hijacked on Monday by hackers apparently associated with the notorious Lizard Squad group.
NSA chief Admiral Michael Rogers said intelligence services need access to encrypted devices to thwart terrorism, and hopes to find common ground with the tech sector on the issue.
A new piece of Android malware can perform a wide range of actions on infected phones without being detected by making it look like the device is turned off.
Researchers have obtained samples of what appears to be Babar, a nation state espionage malware believed to have been developed and used by a French intelligence agency.
Pindrop Security, a startup focused on combating phone-based fraud, announced that it has raised $35 million in a Series B round of financing.
A new report from Verisign reveals that DDoS-for-hire services can be sold for as little as $2 an hour.

FEATURES, INSIGHTS // Cybercrime

rss icon

Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.