August 10, 2017
Via: Russel EdwardsRansomware as a service, (RaaS), lets malicious parties use predefined malware, in order to extort their victims of choice. Available online, these cyber crime – to lease – deals are making the digital environment even worse. So far, only those […]
August 2, 2017
Via: CSO OnlineAs enterprises get better about encrypting network traffic to protect data from potential attacks or exposure, online attackers are also stepping up their Secure Sockets Layer/Transport Layer Security (SSL/TLS) game to hide their malicious activities. In the first half of […]
July 17, 2017
Via: CSO OnlineThe short answer to the question posed in the headline is ‘everyone’: Every small business, midsized company, enterprise, and organization is fair game, especially in light of the recent WannaCry and Petya attacks (though the latter was an atypical ransomware example). The long answer […]
June 27, 2017
Via: CSO OnlineIncident response (IR) plans are designed to test your company’s ability to respond to a security incident. The ultimate goal is to handle the situation so that it limits the damage to the business while reducing recovery time and costs. […]
June 27, 2017
Via: MalwarebytesDear you, It appears you need to update your information. Click here to tell us all your secrets. No really, it’s totally safe. We’re not going to steal your identity, we swear. If only phishing attempts were that obvious. Instead, […]
June 26, 2017
Via: The HillThe British parliament was hit by a cyberattack Friday night that left members and staffers unable to access emails as hackers attempted to exploit weak passwords and gain access to accounts. Multiple news agencies reported Saturday that the U.K. parliament […]
March 7, 2017
Via: We Live SecurityTechnology has changed the way we live, our relationships with others, and even how we take care of ourselves. These days, everyone – from the most inexperienced to the most advanced user – takes measures to protect themselves from cybercriminals […]
March 7, 2017
Via: The HillPresident Trump on Monday declared this week National Consumer Protection Week, underscoring the need to increase awareness about cyber crime. Trump directed industry leaders and government officials to engage in “consumer education activities” across the country to raise awareness about […]
February 15, 2017
Via: DataBreach TodayEvil hackers with monomaniacal intentions of a globe-disrupting nature have long dominated pop culture sensibilities. But when it comes to for-profit hacking, it’s important to remember that cybercrime has been, and remains, predominantly a business-driven concern, says Eduardo Cabrera, chief […]
February 10, 2017
Via: WiredTYPICAL ANTI-MALWARE SOFTWARE scans hard drives in search of malicious files, and then flags them for removal. That strategy breaks down, though, when there’s no file to find on the system in the first place. And that’s exactly how an […]
Cyber-crime, Email security, Phishing, Security
February 10, 2017
Via: Help Net SecurityGmail shows no warning as it delivers legitimate-looking spoofed emails seemingly coming from an existing Gmail.com address, even though they come from a non-Gmail server. This fact can be misused by attackers who want to trick their targets into clicking […]
February 9, 2017
Via: Help Net SecurityKaspersky Lab researchers have brought to light a series of attacks leveraged against 140+ banks and other businesses around the world. But what makes these attacks unusual is the criminals’ use of widely used legitimate tools and fileless malware, which […]
February 8, 2017
Via: Zone AlarmThere has been a lot of trouble for Yahoo users lately since they announced there was a breach of 1 billion Yahoo accounts in August 2013, and then in September released a statement that in 2014 an additional 500 million […]
February 8, 2017
Via: Zone AlarmApproximately 15 million residents of the United States are victims of identity theft per year. It’s important to protect yourself by taking certain precautions to ensure your data isn’t vulnerable to hackers. These 6 recommendations will ensure you’re protected against […]
January 24, 2017
Via: InfoWorldContrary to popular belief, ransomware has been around for decades. The first malware program to lock up people’s files and ask for a ransom was the PC Cyborg Trojan in 1989. It was created by Harvard-trained evolutionary biologist Dr. Joseph […]
January 11, 2017
Via: CSO OnlineSometimes, when a network is breached, when servers are compromised, or when unencrypted data is at risk, companies will get, or even seek, assistance from government offices. The nature of cybercrime points to the ways in which our digital architectures […]
December 14, 2016
Via: Radware BlogWhile some variables stay the course, the industry moves incredibly quickly, and it takes just one small catalyst to spark a new direction that nobody could have predicted. Let’s take a look back at how our predictions fared in 2016—and […]
December 13, 2016
Via: Security IntelligenceIn a world full of threat actors, from cyber-criminals to state-sponsored agencies, it’s clear that risks are increasing. The global cost of cyber-crime is expected to hit $2 trillion by 2019, a threefold increase from the 2015 estimate of $500 […]
December 6, 2016
Via: Dark ReadingHelp us wipe out the remaining bots and put an end to Avalanche once and for all. The last day of November was also the last day of activity for one of the largest cyber-crime platforms in the world. Dubbed […]
October 3, 2016
Via: DataBreach TodayThe record-breaking Yahoo breach wasn’t perpetrated by nation-state attackers, as Yahoo has claimed, but rather by a group of “professional blackhats from Eastern Europe” who are also suspected of stealing and reselling customer data from LinkedIn, MySpace and Tumblr, according […]