Security Experts:

long dotted


A piece of malware caused significant disruptions in factories of TSMC, which supplies chips to Apple and others [Read More]
Massachusetts college student Joel Ortiz was arrested on July 12, 2018 on suspicion of using his tech skills to hack victims' personal cell phones and steal millions of dollars in digital currency. [Read More]
A man who worked as a public relations specialist for criminal online marketplace AlphaBay was sentenced in Atlanta to serve nearly four years in federal prison. [Read More]
Three members of the FIN7 hacking group (also known as Anunak, or Carbanak) have been arrested for hacking more than 100 US companies and stealing millions of customer records. [Read More]
The leak of an alleged Russian hacker’s conversations with a security researcher shows more about the shadowy group of 12 Russian spies indicted by the FBI for targeting the 2016 U.S. election. [Read More]
The Trump administration is facing criticism that it has no clear national strategy to protect the country during the upcoming midterms and beyond. [Read More]
Facebook shut down more than 30 fake pages and accounts involved in what appeared to be a "coordinated" effort to stoke hot-button social issues ahead of November midterm US elections. [Read More]
UnityPoint Health has notified about 1.4 million patients and former patients about a computer breach that might have exposed their personal information. [Read More]
Google recently removed 145 applications from Google Play after they were found to carry malicious Windows executables inside, Palo Alto Networks reveals. [Read More]
The DHS has launched The National Risk Management Center, a joint center housed within DHS that will enable the private sector and government to collaborate and devise solutions to reduce risk to critical infrastructure. [Read More]


rss icon

Siggi Stefnisson's picture
Historical patterns and recent activity indicate that another major Necurs malware outbreak is looming just around the corner.
Markus Jakobsson's picture
Men and women may jokingly refer to their significant other as their “partner in crime,” but when it comes to romance scams, this joke may become a sad reality.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Siggi Stefnisson's picture
It remains to be seen whether more legitimate web operations will embrace the approach, but you can count on illegitimate and malicious use of cryptomining to grow robustly.
Oliver Rochford's picture
Cryptocurrencies have revolutionized the economics of cybercrime, with a noticeable impact on threat actors’ Tactics, Techniques and Procedures (TTP’s).
Siggi Stefnisson's picture
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but also a business problem.
David Holmes's picture
Take a step back and realize that cryptocurrency mining is really just another form of malware, which is something you should be good at finding already.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Alastair Paterson's picture
With better security practices both on an individual and organizational level, you can mitigate the risk of cryptocurrency fraud while remaining an active user.
Alastair Paterson's picture
The most technically sophisticated use detailed social engineering techniques, zero-day exploits and weaknesses in the supply chain.