Cyber Crime

Cyber Crime | News, how-tos, features, reviews, and videos

intro cyber attack maps

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

amazon sign

Amazon 'technical error' exposes undisclosed number of customer names and emails

Amazon isn't saying how many customers had their names and email addresses exposed due to a data leak caused by an unexplained technical error.

ransomware breach hackers dark web

10 things you should know about dark web websites

Catch a glimpse of what flourishes in the shadows of the internet.

spearfishing trap

Russian Cozy Bear APT 29 hackers may be impersonating State Department

Russian Cozy Bear hackers may be impersonating the U.S. State Department in a large, new spear-phishing campaign, plus other cybersecurity news.

quell cyber attacks primary

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

The cyber kill chain breaks down each stage of a malware attack where you can identify and stop it, but be aware of how attack strategies are changing.

group of hackers in digital environment

Cylance researchers discover powerful new nation-state APT

A new APT, dubbed White Company, is flexing its muscle on the world stage, and it has security researchers worried.

hacker

Cyber criminals abuse US Postal Service Informed Delivery for ID theft

Criminals are abusing the US Postal Service's Informed Delivery for ID theft and fraud. Meanwhile, vulnerabilities were found in Oracle's VirtualBox, WordPress and Adobe ColdFusion servers.

07 vote

Republican Kemp accuses Georgia Democrats of hacking but provides no proof

Georgia’s Secretary of State Office is investigating the Democratic Party of Georgia for hacking the state’s voter registration system but failed to cite any evidence.

stateofcybercrimethumb

State of cybercrime 2018: Security spending up, but so are the risks

IT and security management use more technology to defend against sophisticated hacker attacks, but still lag on security training.

10 cloud security breach virtualization wireless

6 takeaways from McAfee MPower

The company articulates its device-to-cloud security strategy with vision and series of announcements.

Call of Duty: Black Ops IIII - Blackout

FBI: Call of Duty gamers helped steal $3.3 million in cryptocurrency hacking scheme

The FBI suspects Call of Duty players of participating in a cryptocurrency hacking ring that allegedly managed to steal over $3 million in cryptocurrency.

cyber security lock padlock firewall code breach password

Trend Micro shines a light on its new cybersecurity solutions

Trend Micro provides an overview of its new cybersecurity products, platforms, and services.

hand holding paper cloud for google cloud logo

What is SQL injection? How SQLi attacks work and how to prevent them

SQL injection is a type of attack that can give an adversary complete control over your web application database by inserting arbitrary SQL code into a database query.

blockchain links

Cybercriminals are using blockchain to improve security. Should you?

Business-minded hackers are testing blockchain technologies to secure their illegal operations. Here's what enterprises can learn from them.

controling it costs

The potential costs of cybercrime that can’t be calculated

Cybersecurity risk often is treated as a nebulous, abstract concept. However, the possibility of attacks that start as cyber incidents but turn out to be a precursor to physical attacks are increasingly commanding more of our...

12 incident response life preserver survival disaster recovery

6 steps for building a robust incident response plan

While a lot of energy is put it into avoiding security breaches, it’s not always possible. A solid incident response plan can restrict damage, reduce recovery time and limit the associated costs.

british airways Boeing 747

British Airways hack was by same group that compromised Ticketmaster

The British Airways hack involved a highly targeted approach using 22 lines of skimmer code by the group that compromised Ticketmaster.

number 4 four with binary grunge background

4 frameworks you need to protect your digital enterprise against the latest cybersecurity threats

Cybersecurity attacks are getting vicious, expensive and bringing entire businesses to their knees. CIOs and CISOs don’t have time to reinvent the wheel and should adapt US Government and Department of Defense lighthouse frameworks...

thief stolen hacked hacker jail prison

Bad OpSec led to the downfall of teenage DDoS-for-hire group leader

A UK teenager and leader of a DDoS-for-hire group pleaded guilty to three counts of making fake bomb threats that affected thousands of students and resulted in the grounding of a United Airlines flight.

asia china flag grunge stars pixabay etereuti

China’s MSS using LinkedIn against the U.S.

The head of the U.S. National Counterintelligence and Security Center says China's MSS is using social networks, specifically LinkedIn, to target, access, and recruit U.S. sources.

Load More