Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

According to Vormetric's 2015 Insider Threat Report, 93 percent of the organizations surveyed based in the U.S. felt they were vulnerable to insider threats.
Israeli police arrested a man suspected of hacking into the computers and stealing the work of international recording artists including Madonna, police said.
Please join us for a special webcast: Protecting Against Fraud and Cybercrime from Mobile Devices, presented by ThreatMetrix.
Nathan Leroux, 20, of Bowie, Maryland, has admitted taking part in an international hacking and intellectual property theft conspiracy, the FBI announced on Tuesday.
The computers of gamers in Taiwan and other Asian countries might have been infected with a piece of malware after cybercriminals managed to compromise official installers and updates for a couple of popular online games.
Chinese authorities are accused of launching a man-in-the-middle (MitM) attack against customers of Microsoft’s email service Outlook.
The World Economic Forum released two reports touching on cybersecurity as business leaders around the world prepare to descend on Switzerland for the group's annual meeting.
The United States secretly penetrated North Korea's computer systems four years ago -- a breach that allowed Washington to insist Pyongyang was to blame for the recent cyberattack on Sony Pictures, the New York Times reported Monday.
Washington - Hackers took over the Twitter accounts of the New York Post and United Press International on Friday, writing bogus messages, including about hostilities breaking out between the United States and China.
Defense lawyers for Ross Ulbricht, the alleged mastermind of online criminal enterprise Silk Road, sought to convince New York jurors on Thursday that the wrong man was in the dock.

FEATURES, INSIGHTS // Cybercrime

rss icon

James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
David Holmes's picture
Even if a currency revolution is happening, the winner might not be Bitcoin, or any crypto currency. It might be an alternative currency.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Jon-Louis Heimerl's picture
Credit card security really is easier than it sounds. Some of this stuff is easy once you are set up.
David Holmes's picture
In 2011, Twitter began encrypting all information between the (mostly) mobile endpoints and their own servers. This made it more difficult for monitoring agencies to determine a mobile user’s Twitter profile, and thereby that user’s follow list. More difficult, but not impossible.
James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
Adam Firestone's picture
The time has come for the technology professions to demonstrate ethical maturity and adopt standards of ethical conduct to which we hold ourselves and our peers accountable.