Cyber Crime

Cyber Crime news, information, and how-to advice

security vulnerabilities such as hackers and cyberattacks
vulnerable cryptojacking hacking breach security

business people conference room collaboration boardroom

Having a boardroom conversation about cybersecurity and material risk

Those who embrace a material risk approach to addressing cyber threats will command the attention of senior leaders and steadily drive improvements into their organization’s security posture.

credit card fraud

Inside RSA's state-of-the-art fraud intelligence command center

RSA’s Anti-Fraud Command Center helps financial services firms stay a step ahead of fraudsters and criminals. The ultimate goal: Someday make it not worth their effort to even try.

intro cyber attack maps

What is a cyber attack? Recent examples show disturbing trends

From virtual bank heists to semi-open attacks from nation-states, the last couple of years has been rough on IT security. Here are some of the major cyber attacks of 2017-2018 and what we can learn from them.

ep21 salted hash

Salted Hash Ep 21: Scammers targeting Office 365 and DocuSign

Welcome back! Salted Hash is gearing up to shoot our next season, as well as other segments in April during the RSA Conference, but this week we're going to chat with Asaf Cidon, vice president of email security services at Barracuda....

salted hash thumbnail final
video

Scammers spoof Office 365, DocuSign and others | Salted Hash Ep 21

As phishing attacks evolve, hackers are using customization and targeted scams to ensnare users. Asaf Cidon, vice president, email security services at Barracuda, talks with host Steve Ragan about the ever-changing cat-and-mouse game...

medical heart rate monitor ekg hospital

Nuance says NotPetya attack led to $92 million in lost revenue

Nuance Communications, a software company that offers speech and imaging technology to a number of markets, including healthcare and finance, said the 2017 NotPetya malware attacks caused the company to lose $92 million in revenue,...

cyberinsurance

Training insurance agents and brokers in cyber risk

In the past year, tremendous regulatory developments have taken shape in the realm of cybersecurity, fiduciary responsibility and legal liability for licensees. Starting with the State of New York’s Department of Financial...

ddos attack

Another massive DDoS internet blackout could be coming your way

A massive internet blackout similar to the Dyn DNS outage in 2016 could easily happen again, despite relatively low-cost countermeasures, according to a new study out of Harvard University.

hacker, laptop, binary code, world map

U.S. cybersecurity threat risk remains high -- no signs of lessening

The U.S. Director National Intelligence says the public and private sectors in the U.S. are at continual risk and the country should expect cyber attacks from nation state and non-state actors.

keys authentication

The path to modern authentication and cybersecurity is pervasive, connected and continuous

What makes secure access truly secure today? Authentication that works seamlessly – everywhere, all the time.

hand holding paper cloud for google cloud logo

What is SQL injection? This oldie but goodie can make your web applications hurt

SQL injection attacks are well-understood and easily preventable, and the priority for risk mitigation should be preventing SQL injection attacks in the first place. Listen to Little Bobby Tables and sanitize your database inputs.

security bug

Automation is the key to mitigation of today’s cyber threats

Organizations need to look at the real risk to its business and its data. When it comes to cybersecurity, one size definitely does not fit all.

cyberwarfare defense illustration

The global cyber war is heating up: Why businesses should be worried

From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them.

steal theft hacker crime laptop firewall

Sinovel Wind Group found guilty of IP theft valued at $800 million

While American Superconductor's data logs and stores were helpful in convicting Sinovel Wind Group of IP theft, a data loss prevention strategy could have identified the thieves' activities sooner.

03 cryptography

Why aren't we using SHA-3?

The Secure Hash Algorithm version 3 fixes flaws in the now-standard SHA-2 cipher. Here's how to prepare for a migration to SHA-3 when SHA-2 is inevitably compromised.

Robot Artificial Intelligence chat bot

The borg ate my login

There is no ‘one size fits all’ solution for bots...

north korea statue pyongyang

North Korea hacking group is expanding operations, researchers say

A group of hackers from North Korea (DPRK), recently connected to the usage of an Adobe Flash zero-day vulnerability (CVE-2018-4878), has expanded its operations in both scope and sophistication, FireEye says.

cat hiding box hide and seek

How to protect your network from PowerShell exploits

PowerShell is a powerful and versatile tool for both Windows sysadmins and hackers, who use it to build malicious scripts that avoid detection. This advice will make it harder for them to do so.

Load More