Cyber Crime

Cyber Crime news, information, and how-to advice

nup 177120 0001
11 victims

7 response

Data breach fatigue requires better response planning

Customers may view data breaches as common, but companies have to nail the response, or risk a consumer backlash.

online dating scams hacker beautiful woman

How to prove and fight online dating and romance scams

Friends and family of romance scam victims sometimes call on security pros to prove their online loves are not who they claim to be. Here's how to handle the case the right way.

computer forensics

4 reasons forensics will remain a pillar of cybersecurity

When protection fails, forensics can still prevail.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

alert hacking threat detected

How to automate threat hunting

The quest for hidden threats...

steal theft hacker crime laptop firewall

Who Is watching the watchers?

The Kaseya event should serve as a wake-up call for companies that fail to scrutinize the security standards of their vendors—including their security vendors!

businessman looking through binoculars future vision prediction

The future: it ain’t what it used to be

The problem with the future—as baseball legend Yogi Berra, the founders of the internet and any CISO or CTO can assure you—is that, increasingly, it ain’t what it used to be.

healthcare data breach ts

Why healthcare cybersecurity spending will exceed $65B over the next 5 years

Hospitals and healthcare providers remain under cyber attack, causing organizations to spend more to protect their systems and patient data.

blockchain cryptocurrency digital security

New cryptocurrencies offer better anonymity, new security challenges

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.

14 check your device manager

A checklist for avoiding cyberattacks with vendors’ tech products

Vendors who offer products with few or none of these protections should be closely scrutinized.

pile of credit cards financial tech

Using better data to fight credit card fraud

Galileo Processing uses artificial intelligence to more accurately identify fraudulent credit card transactions. It's an example of how AI can be a powerful security technology.

sequence 01.00 29 58 30.still001
video

Ready for the EU's GDPR compliance deadline? Many companies aren't | Salted Hash Ep 16

CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline.

23922465470 fe3c8b8cdf o

The 17 biggest data breaches of the 21st century

Security practitioners weigh in on the 17 worst data breaches in recent memory.

laptop security breach password identity theft hacker

Cybercriminals impersonate Outlook and DocuSign to steal your identity

Attackers are now impersonating popular web services like Microsoft Outlook, DocuSign and Google Docs to trick you to freely give up your credentials.

cyber attack virus meltdown

How bad are Meltdown and Spectre?

Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.

supermoon 5

For a moonshot, you need more than just the moon

At one time, we were challenged to ask not what our country could do for us but what we could do for our country. It is time that the leading organizations in digital technology come together once again to ask the same.

hand connect binary access

Transforming secure access to take on today’s cyber threats

Last year, 81% of cyber attacks involved compromised passwords—up from 63% the previous year. How much worse can it get? Let’s not wait around to find out.

sequence 01.00 37 12 47.still001
video

The people you call when you've had a breach | Salted Hash Ep 15

Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.

Load More