Cyber Crime

Cyber Crime | News, how-tos, features, reviews, and videos

cyber crime cybersecurity

Cybercrime groups raise the bar for security teams by borrowing APT techniques

Cyber criminals now have access to more nation-state technology to launch more sophisticated advanced persistent threat attacks. That's bad news for defenders.

mobile purchase transaction

Magecart payment card skimmer gang returns stronger than ever

Web-based card skimmers are becoming harder to detect and remove thanks to evolving techniques.

malvertising malware hacked ads advertising online

What is malvertising? And how to protect against it

Malvertising, the practice of sprinkling malicious code to legitimate-looking ads, affects both small and large websites. Protecting against it is harder than it seems.

poaching talent fishing lures bait catch recruit

6 ways to equip your phishing tackle box

Like many of the threats in cybersecurity, using a comprehensive and business-driven approach to reveal risk can help you focus your efforts on what matters most.

gears processing cost-benefit analysis

How much does it cost to launch a cyberattack?

Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low.

security threats and vulnerabilities

5 signs you've been hit with an APT

An advanced persistent threat (APT) is a cyberattack executed by criminals or nation-states with the intent to steal data or surveil systems over an extended time period. Here's how to know if you've been hit with one.

network iot world map us globe nodes global

Cybersecurity: A global threat that we can control

Protecting data and thwarting cyberattacks now have ascended alongside dealing with natural catastrophes as the most pressing threats demanding the world’s full attention.

mojave group facetime

Apple disables Group FaceTime after eavesdropping bug discovered

A bug in Apple's Group FaceTime made eavesdropping easy. A patch is expected this week.

1 volume of data breach pile of paper confidential documents

The politics of ‘Have I Been Pwned’

Data breaches are not created equal. Business leaders and security managers must beware the dangers of FUD and hype created around notification of old breaches.

1 weakest link broken rusted chain security breach hacked

Vulnerabilities found in building access system used by schools, governments

Tenable Research discovered four zero-day vulnerabilities in IDenticard's PremiSys access control system, which is used by schools, governments, medical centers, and Fortune 500 companies. Currently no patches are available.

ransomware

Major US newspapers crippled by Ryuk ransomware attack

All Tribune Publishing newspapers, as well as US-printed newspapers formerly part of Tribune, were hit with a cyber attack involving Ryuk ransomware.

The 18 biggest data breaches of the 21st century

Security practitioners weigh in on the 18 worst data breaches in recent memory.

network security hacker virus crime

A look back at cybercrime in 2018

Prepare now to mitigate the most cyber risk in 2019!

marriott breach

US senator proposes jailing execs, fining companies for data breaches

Following the Marriott breach, a U.S. senator proposes jailing senior company executives and levying multi-billion-dollar fines for data breaches.

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world

What is an insider threat? 7 warning signs to watch for

While the security industry often focuses on the nation-state and cyber criminals, often some of the biggest dangers are hiding in plain sight within your own company.

8 encryption

Encryption is the best way to protect payment card transaction data

Criminals are going to steal payment card transaction data, but it won't matter if that data is devalued through encryption.

fbi badge gun

Ad fraud botnet 3ve shut down after infecting 1.7 million PCs

An enormous ad fraud botnet, 3ve, was shut down after 1.7 million PCs were infected to falsify 12 billion ads per day.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS protection, mitigation and defense: 8 essential tips

Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.

intro cyber attack maps

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

amazon sign

Amazon 'technical error' exposes undisclosed number of customer names and emails

Amazon isn't saying how many customers had their names and email addresses exposed due to a data leak caused by an unexplained technical error.

Load More
You Might Also Like