Cyber Crime

Cyber Crime news, information, and how-to advice

team teamwork global workforce
cyber attack virus meltdown

security incident responder

What it takes to be a security incident responder

A wide range of technical skills and curiosity about the mechanics and goals of an attack are key for effective incidence response.


With new dynamic capabilities, will whitelisting finally catch on?

In this age of destructive and fast-spreading malware, companies are giving whitelisting a second look -- and with cloud-based, peer-to-peer whitelists and reputation scoring, the technology now has a chance to be widely adopted.

windows xp pc

It's time to update XP, Windows Server 2003 despite Microsoft's emergency patch

Windows XP and Windows Server 2003 are supposed to be dead, but Microsoft's emergency update to address serious vulnerabilities gives organizations another excuse to hang on to these legacy operating systems a little longer.

23922465470 fe3c8b8cdf o

The 15 worst data security breaches of the 21st Century

Security practitioners weigh in on the 15 worst data security breaches in recent memory.

cybersecurity skills and talent shortage

Why linguistics can't always identify cyber attackers' nationality

The security whodunnit: analyzing the language used in an attack is just one tool to assign attribution, and it’s not always reliable.

woman holding stethoscope with medical icons

Healthcare: Are you prepared to trade privacy for treatment?

The U.S. HHS Health Care Industry Cybersecurity Task Force and the U.K.'s ICO in separate reports highlight the need to better protect patients' information.

Insuring cyber risk for government contractors

Insurance companies should understand the market opportunity for cyber insurance with government contractors.

5956775821 5ac6842f29 o

Britain’s eyes on the prize

Britain's new cybersecurity office is designed to partner with business to best protect the nation's digital interests.

Semi truck montage

Is Waymo's IP in Uber's hands? They may both be victims

Who stole Waymo's intellectual property? Was it an Uber plot to acquire the IP for $680 million of Otto, which was founded by Anthony Levandowski?

machine learning ai artificial intelligence

FireEye 2.0: Cyberhumans as a Service

FireEye CEO Kevin Mandia discusses the company's approach to cyber crime and cybersecurity.

Qatar skyline

Recap: News agency hack blamed for diplomatic meltdown in Qatar

Early Monday morning in Bahrain, the country's Foreign Affairs Ministry said the nation has severed diplomatic ties with Qatar. Within minutes of Bahrain's announcement, the United Arab Emirates, Saudi Arabia, and Egypt followed suit....

cowboy shootout

Hack Back law would create cyber vigilantes

The Active Cyber Defense Certainty Act revision demonstrates what happens when you rely upon limited information and a cowboy mentality.

Gmail Google Mail

Google uses machine learning for new security features in Gmail

Google has pushed four new security features to enterprise users on G Suite, the search giant's hosted business offering. The new protections come shortly after Citizen Lab report exposed a Russia-linked Phishing and disinformation...

cybersecurity shield and gear image

Cisco and IBM announce historic cybersecurity partnership

Cisco Security and IBM Security join forces to battle cybercrime, helping customers reduce the time to detect and mitigate threats.

patching against ransomware

How Cisco combats fast-maturing cybercrime networks

As Steve Martino approaches his 10-year anniversary as vice president and CISO at Cisco Systems, his job has morphed from treating security as simply a must-have to it becoming a strategic imperative for the company.

submarine periscope 101722825

China continues to steal high-tech trade secrets

China continues to steal trade secrets. Six were arrested and seven charged with theft of Trelleborg's dual-use undersea technology.

alert hacking threat detected

Proposed 'hack back' law would not have stopped WannaCry

On Monday, the Financial Times published a story concerning a proposed bill form Representative Tom Graves, a Republican from Georgia's 14th district. Graves has proposed changing the Computer Fraud and Abuse Act (CFAA) to allow...

cybersecurity budgets

Cybersecurity ROI: Still a tough sell

Cybersecurity is a wise investment. But as a panel of experts at the MIT Sloan CIO Symposium said, it is difficult to put an exact number on it.

Load More