Cyber Attacks/Espionage

Cyber Attacks/Espionage news, information, and how-to advice

energy usage
00 virusmuseum

Internal Revenue Service IRS tax filing form 1040

Identity thieves obtain 100,000 electronic filing PINs from IRS system

The Internal Revenue Service was the target of an attack that used stolen Social Security numbers and other taxpayer data to obtain PINs that can be used to file tax returns electronically.

hearthstone game

Hearthstone cheats and tools spiked with malware

Researchers at Symantec are warning Hearthstone players about a number of add-on tools and cheat scripts. While some of the tools are designed to help players, Symantec discovered that a majority do little more than compromise a...

colorful book

Hacked Again: The cybersecurity Bible for small business owners

A cybersecurity expert tells small business owners what they need to know about protecting themselves against cybercrime.

security code big data cyberespionage

Java-based Trojan was used to attack over 400,000 systems

A Java-based Trojan known as Adwind and AlienSpy has been rebranded as JSocket and is being sold as a service to all types of attackers, from opportunistic cybercriminals to cyberespionage groups.

malware payment terminal credit card

Cybercriminals adopt spies' techniques to pull off online bank heists

Researchers from security vendor Kaspersky Lab have identified three cybercrime groups that compromise and steal money from financial institutions using sophisticated techniques and custom malware.

cyberthief

Fed up with bogus computer support calls, man turns tables on scammers

Like countless others, Seth had gotten scammers' phone calls from people who said they wanted to fix his computer. The last time they called, he was ready to turn the tables.

malware payment terminal credit card

Dridex banking malware mysteriously hijacked to distribute antivirus program

An unknown person -- possibly a white hat hacker -- gained access to some of the servers that cybercriminals use to distribute the Dridex online banking Trojan and replaced the malware with an installer for Avira Free Antivirus.

robot keyboard

China vs. the machine (learning)

The highly publicized agreement last fall between the U.S. and China to end economic espionage has had little effect. Experts say that it is up to companies to protect themselves, and that tools like machine learning can help.

usa goverment cyber security

CIOs wary of sharing cyber threat data

CIOs are still lukewarm to the idea of sharing the cybersecurity threat information the U.S. government is requesting in its Cybersecurity Information Sharing Act. Department of Homeland Security official Andy Ozment reassures IT...

kasperskylabs

What did we learn about cybersecurity in 2015?

Cybercrime is always a hot-button issue, and last year was no different. What lessons can we learn from some of the more insidious trends and events to better prepare ourselves for the year ahead?

gavel court trial

Security negligence goes to court

The number of people whose data was breached in 2015 exceeded that of the previous year. How do we plan to regulate these cases? What should organizations be compelled to do in order to protect the sensitive information they store?...

tiananmen beijing

China's next five-year plan offers preview of cybersecurity targets

Is your industry next in line to be targeted by China's government-sponsored hackers? To find out, look at China's latest five-year plan, suggests a global threat report released this morning

police lineup identification

Does attribution matter to security leaders?

Levi Gundert shares his experience on when, how, and why attribution matters for security leaders

Survey: Average successful hack nets less than $15,000

The majority of cyber attackers are motivated by money, but make less than $15,000 per successful attack, according to a survey of hackers in the U.S., U.K. and Germany released yesterday by the Ponemon Institute.

dominos

What those new to security can learn from the biggest breaches of all time

OPSWAT's CEO Benny Czarny talks about what can be learned from a breach.

space invader

27% of all malware variants in history were created in 2015

Last year was a record year for malware, according to a report from Panda Security, with more than 84 million new malware samples collected over the course of the year

battle of trenton

Why your security strategy should not be created in a vacuum

Sound strategy supports the core business processes of the organization. It should be (as we often said in the military) a combat multiplier. Meaning it should bolster, strengthen, and galvanize each of the efforts of each business...

credit card reader

Credit card security has no silver bullet

Credit-card security should improve with the launch of EMV (Europay, MasterCard and Visa) technology. But EMV doesn’t address online purchases, which are growing much faster than in-person transactions.

Load More