Cyber Crime

Cyber Crime news, information, and how-to advice

think ponder reflect
switchboard operators

blue padlock in circle pixels digital security padlock

The rise of analyst-centric security operations technologies

The shift of technology to meet analyst needs has altered the infosec market -- for the better.

TSB Phishing page

Salted Hash – SC 02: What a TSB phishing attack looks like

In April, TSB (a retail and commercial bank in the UK) announced they would shutdown some systems for an IT upgrade. However, the upgrade was a disaster, and over a month later customers are still having problems. As a result,...

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

email security risk - phishing / malware

Cybercriminals impersonate popular file sharing services to take over email accounts

Email account takeover attacks are growing, and attackers are impersonating OneDrive and other popular web services to steal credentials from employees.

ransom locked encrypt

Preventing ransomware attacks the right way

Ransomware attacks continue to be a major threat with no sign of slowing down. Here are some lessons organizations can learn from federal agencies to better prevent them.

orange monitors with lock icon network security cyber threat

Fighting fraud: Tips for getting ahead of the ever-evolving threat

Fraud is largely inevitable but fighting it doesn’t have to be fruitless. Chris Camacho shares tips to help businesses combat this threat more effectively.

Apple phishing webpage

Salted Hash - SC 01: What an Apple phishing attack looks like

Today on Salted Hash, we’re going to look at a phishing attack from two sides. The first side will be what the victim sees. After that, we're going to see what the criminal sees. We'll also discuss some steps administrators can take...

template c100.00 06 00 09.still001
video

What an Apple phishing attack looks like | Salted Hash Ep 32

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

dark web hacker tablet malware

Salted Hash Ep 25: A quick tour of the Dark Web

The Dark Web has an interesting persona, and much of it is fueled by hype. This week on Salted Hash we speak to Alon Arvatz, co-founder at IntSights, who gives us a basic overview of some of the things people do in this somewhat...

north korea flag games

Theft of North Korean secrets may have pushed Kim Jong Un into talks

The ultimate insider has made off with North Korea's cyber intelligence, counterintelligence and nuclear secrets, causing people to think that's why Kim Jong Un met with South Korea's leader.

whyhpcmatters frauddetection 1000

CNP fraud spikes during the holiday shopping season. Here are 3 things you can do now to protect your holiday sales

CNP fraud spikes during every holiday season, and 2018 will be no exception. Before it’s too late, online retailers need to get prepared in their fraud prevention efforts. Here are three steps that online sellers can take right now to...

ransom locked encrypt

2018 – the year of the targeted attack?

There is a definite increase in sophisticated bad actor groups focusing on specific, high value targets.

forensics threat hunter cyber security thumbprint

Who wants to go threat hunting?

Rob Lee talks about how he became one of the first threat hunters and how you can become one. It will take skills in IR, forensics, and security analytics.

cyber resilience shock absorber

What is cyber resilience? Building cybersecurity shock absorbers for the enterprise

Sure, you’ve prepared for attacks and breaches, but how well can core business processes function when a crisis hits?

hunting and monitoring security threats

Cyberwar: Silicon Valley’s new bright, shiny thing

Tech companies are hoping you forget history and ignore their culpability.

greetings from augusta georgia

Hackers protest Georgia’s SB 315 anti-hacking bill by allegedly hacking Georgia sites

Hackers claim to have credentials from the City of Augusta and Georgia Southern University and to have defaced the Georgia websites in retaliation for the anti-hacking bill.

Will LaSala

Salted Hash Ep 24: Defending against mobile threats

Welcome back! After shooting several episodes during the RSA Conference in San Francisco, this week Salted Hash talks mobile threats with VASCO's Will LaSala. In addition to this week's episode, we've also got some additional footage...

cybercrime

A first quarter look at cybercrime

What did we learn about cybercrime in the first quarter of 2018? Malicious cryptomining has taken over and it’s leaving all other malware families behind.

Load More