Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Google has used its Safe Browsing infrastructure to analyze the attacks launched recently against GitHub and GreatFire using a new censorship enforcement tool of the Chinese government dubbed "Great Cannon."
Emails to and from President Barack Obama were read by Russian hackers last year in a breach of the White House's unclassified computer system, according to a report.
The U.S. Department of Defense (DoD) on Thursday unveiled its latest cyber strategy, described as a way to guide the development of DoD's cyber forces and strengthen its cyber defense and cyber deterrence posture.
Neustar has published its North America DDoS Attacks & Impact Report for 2014. Companies are better equipped to handle DDoS attacks compared to last year.
Russian hackers were able to access an unclassified Pentagon computer network earlier this year, US Secretary of Defense Ashton Carter said.
The US House of Representatives passed a bill aimed at improving the sharing of information about cybersecurity threats between the government and the private sector.
Raytheon and Websense discuss the decision to join and form a new company at the RSA Conference.
An APT actor dubbed CozyDuke/CozyBear is believed to be behind the recent attacks on the White House and State Department.
At the RSA Conference, RSA President Amit Yoran says the security industry must focus on five key things to emerge from the dark ages.
FireEye detected a highly targeted attack exploiting two zero-day vulnerabilities in an effort to compromise an “international government entity” in an industry vertical that aligns with known targets hit by a threat actor group which FireEye calls APT28.

FEATURES, INSIGHTS // Cybercrime

rss icon

Danelle Au's picture
As long as companies continue to pay ransoms when attacked, we should expect cyber extortion to continue in 2015.
Wade Williamson's picture
By building security controls that identify and correlate the malicious behaviors of an attack, we can begin to the tip the scales back in our favor.
Wade Williamson's picture
Like most modern malware, Carbanak is not some autonomous bit of code running on its own, but rather a vehicle for a remote human attacker to watch, learn and remotely drive the attack.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.