Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

The recent expansion of generic Top-Level Domains (gTLDs) has attracted the attention of cybercriminals who have started abusing them for their malicious operations, researchers warned this week.
Apple is rolling out new privacy protections for iPhones and iPads, with a new system that makes it impossible for the company to unlock a device even with a warrant.
Online piracy of music, films and other content has moved to the Internet cloud, reaping big profits for digital thieves, according to a study.
Beijing strongly denied a US congressional panel's claim that Chinese government-linked hackers had launched dozens of cyberattacks on American defense contractors, saying the charges were "fabricated out of thin air".
A media rights group urged Qatar to revoke sections of a new cybercrime law, saying they threaten freedom of expression in the Gulf state.
According to Bromium, attackers planted malicious code on a United States-based company's website in an effort to infect the computers of its visitors, an attack known as a watering hole attack.
Chinese hackers believed to be linked to Beijing conducted dozens of cyberattacks on US defense contractors between 2012 and 2013, potentially compromising military operations, a congressional probe warned.
Hackers accessed the hosted managed services environment of Goodwill vendor C&K Systems for roughly 18 months
Nigeria's anti-graft agency said it was hunting a 38-year-old bank worker for allegedly stealing $38 million from his employers by hacking into computer systems.
JPMorgan Chase, one of the largest banks in the United States, has confirmed that its systems were breached this summer.

FEATURES, INSIGHTS // Cybercrime

rss icon

James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”
Jon-Louis Heimerl's picture
Cybercrime “case studies” are always impersonal, right? Would you get more out of specific stories of individuals caught in the cross hairs instead of corporate entities?
Wade Williamson's picture
The most important aspect for us as security professionals is to realize that the man-in-the-browser is not going away, and to understand what exactly has made it so successful.
Mark Hatton's picture
So what does the World Cup have to do with cyber security? A great deal actually. Anytime there is a large-scale global event, there is a sharp spike in the number of cyber scams that are unleashed.
Tal Be'ery's picture
Defenders should use their "Strategic Depth" to mitigate attacks not on the perimeter but deeper within their network where they can leverage on their strategic advantage.
Wade Williamson's picture
In the same way we have watched APT techniques trickle down from nation-state actors to more opportunistic criminals, we should expect MitB to expand from financial services to all types of applications.
Jeffrey Carr's picture
The term “Tipping Point” is controversial because it has been so widely misused and loosely applied; two abuses that I often see in the cyber security marketplace.