Malware/Cybercrime

Malware/Cybercrime news, information, and how-to advice

Synology
darknet2 primary 100049630 gallery

Phishing key
Awareness

Four of the newest (and lowest) Social Engineering scams

Social engineering thugs have reached new lows, as gangs play on users’ fears of privacy loss, theft and even death.

DDoS Attackers Change Techniques To Wallop Sites

Criminals behind distributed denial of service attacks are relying less on traditional botnets and more on techniques capable of launching larger assaults on websites.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

Can Heartbleed be used in DDoS attacks?

With nearly every major threat to information security, it is not long before security experts ask the question, "Can the threat play a role in distributed denial of service (DDoS) attacks?" When it comes to Heartbleed, some people...

In Depth

How a cyber cop patrols the underworld of e-commerce

Cyber "cop" for e-commerce platform Payza tracks illegal, unethical websites and works to put them out of business

The Internet of Things: An exploding security minefield

With small, underfunded developers crowding the IoT market, the need for security awareness, education and training is crucial, say Duo Security researchers

Hackers prepping for OpenSSL Heartbleed attacks

Hackers suspected of listing 10,000 domains that the flaw has made vulnerable on Pastebin

Redefining Endpoint Security With Isolation Technology: An innovative, new security architecture

Find out how to secure your enterprise and empower your users to click on anything, anywhere without the fear of being compromised.

Symantec to CISOs: Watch for the 'mega-breach'

Company releases 2013 Internet Security Threat Report, warning organizations that phishing and watering hole attacks can bury them

Slideshow

The worst data breaches of 2014…so far (Q1)

The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them through March of the this year for a loss of 4,238,983 records related to sensitive personal information exposed through hacker...

Microsoft tightens restrictions on adware on Windows PCs

Adware developers have a new set of Microsoft-imposed guidelines to follow

Zeus malware found with valid digital certificate

New version of notorious banking Trojan could avoid detection by browsers and anti-malware software

Predictive Defense and Real-Time Insight: The Next Step in Advanced Threat Protection

Download this complimentary report, featuring the Gartner Research "Designing an Adaptive Security Architecture for Protection From Advanced Attacks", and learn why organizations can't rely solely on traditional blocking

Phishing

Financial firms and social media remain top Phishing targets

Kaspersky Labs says that nearly 30 percent of all Phishing attacks last year targeted financial institutions, second only to social networking Phishing attack campaigns, which accounted for nearly 36 percent of all attacks of this...

Want to lower your risk? Lower the ROI of hackers

Most hackers are in it for the money. So, enterprises that make it more difficult and costly to breach them will send attackers looking for easier targets.

Understanding incident response: 5 tips to make IR work for you

Incident response is a plan that evolves over time to keep your organization best prepared against likely threats. CSO talked to industry experts at Black Hat about the ups and downs of IR, and how to develop a plan that's right for...

Google clarifies commercial spyware ban for Play store

Apps sold on Play store not allowed to track user activity in secret, according to updated developer guidelines

Healthcare Information Management: A New Urgency

With the challenges of an evolving regulatory environment and the information overload problem with management practices, many organizations have now reached an inflection point.

Dark Web: An ever-more-comfortable haven for cyber criminals

Study finds no special skill needed, since Cybercrime-as-a-Service has come of age

Gameover malware targets accounts on employment websites

In addition to CareerBuilder, new variants of the Trojan program target Monster.com, researchers from F-Secure said

Blue bank vault

Banks' suit in Target breach a 'wake up call' for companies hiring PCI auditors

Two banks have filed a lawsuit against Target and Trustwave Holdings, the retailer's security assessor

Cryptolocker infection forces chamber of commerce to spend $5,000 on new PCs

Still cutting a swathe through small-town America

Load More