Security Experts:

Cybercrime
long dotted

NEWS & INDUSTRY UPDATES

Dell SecureWorks has added Advanced Endpoint Threat Detection (AETD) as the latest solution in its Advanced Threat Services portfolio.
During the second half of 2013, APWG found that attacks on vulnerable shared hosting providers led to 18 percent of all phishing attacks worldwide
An appeals court in the United States overturned the conviction of a self-described "security research" hacker for breaking into the AT&T online network to reveal a security flaw.
A lack of security and policy training can lead to bad news for enterprises, according to a report from Enterprise Management Associates.
According to Mandiant’s M-Trends report, organizations are discovering breaches in their networks faster, but still not nearly soon as they must in order to contain damage and prevent loss of sensitive data.
The chairman of a new German parliamentary panel probing mass surveillance by the NSA abruptly quit on April 9, rejecting opposition demands that the body question fugitive US intelligence leaker Edward Snowden.
Mining companies, government agencies and manufacturing firms were hit hard by phishers in 2013, with one in three such organizations suffering at least one attack.
Intego, a provider of security products designed exclusively for Mac OS, introduced its latest product line, including VirusBarrier X8 and NetBarrier X8.
In a speech at the PLA's National Defense University, Hagel planned to urge China to be more open about its cyber capabilities to defuse tensions and avoid an inadvertent conflict, a senior defense official said.
Federal authorities have charged eight people in connection with the theft of personal data belonging to AT&T customers.

FEATURES, INSIGHTS // Cybercrime

rss icon

Noa Bar-Yosef's picture
Implanting Easter eggs is not only a developer’s take at humor. In fact, they could be sprinkled within the code to specifically cause a devastating effect.
Michael Callahan's picture
While attackers are constantly improving their evasion tactics to extend the lifetime of their malware, users can also leverage these types of evasion tactics to help prevent malware infection in the first place.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Danelle Au's picture
Trying to defend against modern, advanced attacks with one-off point solutions is like playing a whack-a-mole game, always one step behind the attacker and trying to play catch up with the alerts as they’re received.
Tal Be'ery's picture
The Target breach shows that APT attacks have commoditized and therefore should concern not only the government and defense industry, but probably every enterprise.
Wade Williamson's picture
If criminals can’t use or sell stolen data without being caught, then the data quickly becomes worthless. As a result it’s critical to understand what happens to data after a breach.
Jon-Louis Heimerl's picture
For a month, I kept all of my spam, then looked at the subject matter, where it was from and tried to analyze some additional characteristics of the spam.
Marc Solomon's picture
Mosquitoes are quite similar to malware. There are thousands of species and numerous ways to try to protect against them but each method has its limitations.
Chris Hinkley's picture
Whether you’re buying a smart refrigerator for your home or a printer for your company, your first step is deciding the risk involved and how to deploy the device in a secure manner while preserving the functionality you require.
Aviv Raff's picture
Without the elements of prevention, detection, and protection all working together, threat actors will always have the advantage, and will find a way to carry out their illicit economic, political or social agendas.