Cyber Crime

Cyber Crime | News, how-tos, features, reviews, and videos

whyhpcmatters frauddetection 1000

CNP fraud spikes during the holiday shopping season. Here are 3 things you can do now to protect your holiday sales

CNP fraud spikes during every holiday season, and 2018 will be no exception. Before it’s too late, online retailers need to get prepared in their fraud prevention efforts. Here are three steps that online sellers can take right now to...

ransom locked encrypt

2018 – the year of the targeted attack?

There is a definite increase in sophisticated bad actor groups focusing on specific, high value targets.

forensics threat hunter cyber security thumbprint

Who wants to go threat hunting?

Rob Lee talks about how he became one of the first threat hunters and how you can become one. It will take skills in IR, forensics, and security analytics.

cyber resilience shock absorber

What is cyber resilience? Building cybersecurity shock absorbers for the enterprise

Sure, you’ve prepared for attacks and breaches, but how well can core business processes function when a crisis hits?

hunting and monitoring security threats

Cyberwar: Silicon Valley’s new bright, shiny thing

Tech companies are hoping you forget history and ignore their culpability.

greetings from augusta georgia

Hackers protest Georgia’s SB 315 anti-hacking bill by allegedly hacking Georgia sites

Hackers claim to have credentials from the City of Augusta and Georgia Southern University and to have defaced the Georgia websites in retaliation for the anti-hacking bill.

Will LaSala

Salted Hash Ep 24: Defending against mobile threats

Welcome back! After shooting several episodes during the RSA Conference in San Francisco, this week Salted Hash talks mobile threats with VASCO's Will LaSala. In addition to this week's episode, we've also got some additional footage...

cybercrime

A first quarter look at cybercrime

What did we learn about cybercrime in the first quarter of 2018? Malicious cryptomining has taken over and it’s leaving all other malware families behind.

security threats and vulnerabilities

5 signs you've been hit with an advanced persistent threat (APT)

Do you have valuable data on your network? Noticing odd network behavior? You could be the victim of an APT attack

ransomware breach hackers dark web

Another night at the information security museum

Firms need to put fundamental information security processes in place to ensure they don’t become ransomware victims. It’s not that difficult, people.

CSO: Have you met these hackers? [slide 01]

10 types of hackers and how they'll harm you

Understanding the different types of hackers, what motivates them, and the malware they use can help you identify the attacks you are most likely to face and how to properly defend yourself and your organization.

frustrated computer user

Tech support scams are on the rise, up 24%, warns Microsoft

Social engineering attacks like the Microsoft tech support scams still work. Fake cold calls, fake messages on websites, and malicious emails continue to trick victims.

security risk - phishing / malware / social engineering

What is cross-site scripting (XSS)? Low-hanging fruit for both attackers and defenders

With XSS, attackers enter malicious code into a web form or web app URL to trick the application into doing something it's not supposed to do.

virtual transactions - digital money - cryptocurrency - blockchain

Cryptomining, not ransomware, the top malware threat so far this year

Cryptominer-based attacks increased, while ransomware-based attacks decreased in Q1 2018, according to Comodo Cybersecurity Threat Research Labs.

group silhouette filled with binary code

SamSam explained: Everything you need to know about this opportunistic group of threat actors

The group behind the SamSam family of ransomware is known for recent attacks on healthcare organizations, but that's not its only target.

russian military

Russia is hacking routers in global cyber attacks, US and UK warn

In a first-of-its-kind advisory, the U.S. and U.K. warned of malicious cyber activity by state-sponsored Russian hackers who are targeting network infrastructure devices.

balance - measure - comparison - risk assessment

Want IT resiliency? Stop the see-saw of imbalanced attention

As cyber threats continue to grow among companies with sensitive data, IT must take a holistic approach to managing and mitigating these threats. Here’s how to bridge preventative and restorative measures for IT resiliency.

Computerworld - Scary Tech [Slide-03] - Facial recognition systems reporting to secret govt agencies

Protecting trade secrets: technology solutions you can use

The fourth and final part of a series on stopping trade secret theft in your organization.

allscripts health care ransomware bitcoin

Ransomware, healthcare and incident response: Lessons from the Allscripts attack

The actors behind SamSam launched a devastating attack against Allscripts in January, 2018. As Allscripts worked its incident response plan, things started to unravel. Here are the lessons learned.

ransomware

Microsoft network engineer faces charges linked to Reveton ransomware

A Microsoft network engineer was charged with money laundering and conspiracy linked to Reveton ransomware.

Load More