Cyber Crime

Cyber Crime | News, how-tos, features, reviews, and videos

6 small business security
Capital One  >  hack

data center / network servers

6 ways cybercriminals use commercial infrastructure

Whether through fraud or legitimate purchase, cybercriminals increasingly depend on mainstream services to support their activities.

hacker / cryptocurrency attack

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

zeroday software bug skull and crossbones security flaw exploited danger vulnerabilities by gwengoa

What is a zero day? A powerful but fragile weapon

A zero day is a security flaw that has not yet been patched by the vendor and can be exploited. These vulnerabilities fetch high prices on the black market

hacked computer security symbol   hacked rot

15 signs you've been hacked -- and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been hacked.

CSO  >  ransomware / security threat

To pay or not pay a hacker’s ransomware demand? It comes down to cyber hygiene

A recent call for city leaders to stop paying ransomware demands underscores the need for municipalities to step up their cyber practices and have a good backup process in place.

Closed markets in a dangerous neighborhood behind a police line caution tape barrier.

Dark web takedowns make good headlines, do little for security

Shutting down dark web marketplaces looks and feels good, but it hasn't significantly reduced risk. Worse, it drives cybercriminals to harder-to-track channels.

CSO  >  Skull + crossbones on binary code

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

CSO  >  Botnet  >  Robots amid a blue binary matrix

What is a botnet? When armies of infected IoT devices attack

A botnet is a collection of internet-connected devices that an attacker has compromised. Commonly used in distributed denial of service (DDoS) attacks, botnets can also take advantage of their collective computing power to send large...

shadowy figure reaching out from behind transparent wall

Forthright handling of cybercrime essential to improved results

While it is has become generally well-known that enterprises have a problem dealing with cybercrime, the true extent of the problem is much worse than many realize. In fact, even the entities that really ought to know the reality –...

collage of US government icons

Will the US ever get serious about security and privacy?

We have the ability to drastically reduce cybercrime. So why are we still failing?

computer crime scene / hacked / infected / cybercrime / cyberattack

Why businesses don’t report cybercrimes to law enforcement

Law enforcement agencies estimate the number of cybercrimes that go unreported by businesses number in the millions. Here why and when you should report breaches and other cyber attacks.

Asset-recovery team pulls dollar sign back from over the edge of a cliff; hacker/keyboard background

Act fast to recover assets after cyber fraud

Here's what companies can do to recover lost assets in the wake of a data theft or a BEC scam.

avengers wallpaper

‘Nuff said!

The Marvel Cinematic Universe started in comic books as the creations of three main visionaries: Stan Lee, Jack Kirby and Steve Ditko. They weren’t always successful. Through following the vision of their creators, a new group was...

cyber crime cybersecurity

Cybercrime groups raise the bar for security teams by borrowing APT techniques

Cyber criminals now have access to more nation-state technology to launch more sophisticated advanced persistent threat attacks. That's bad news for defenders.

mobile purchase transaction

Magecart payment card skimmer gang returns stronger than ever

Web-based card skimmers are becoming harder to detect and remove thanks to evolving techniques.

malvertising malware hacked ads advertising online

What is malvertising? And how to protect against it

Malvertising, the practice of sprinkling malicious code to legitimate-looking ads, affects both small and large websites. Protecting against it is harder than it seems.

poaching talent fishing lures bait catch recruit

6 ways to equip your phishing tackle box

Like many of the threats in cybersecurity, using a comprehensive and business-driven approach to reveal risk can help you focus your efforts on what matters most.

gears processing cost-benefit analysis

How much does it cost to launch a cyberattack?

Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low.

Load More