Malware and Cybercrime

Malware and Cybercrime news, trend analysis and opinion

ransomware
ransom note letters

managed security service providers

Rip up the script when assembling a modern security team

Characteristics that a modern security team needs to combat sophisticated hackers

If I were the next CEO of Symantec – Redux

Challenges from 2014 remain. Symantec must emphasize services, acquire promising startups, establish a partner ecosystem, and streamline products and operations

isis flag graphic

ISIS cyberattack capabilities are unorganized, underfunded -- for now

The U.S. and its allies should be concerned about cyberattacks from ISIS-affiliated groups, but the hackers are poorly organized and likely underfunded, at least in the short term, according to a new report.

Fraud gang targeted large European companies

Estonian man gets over 7 years in prison for role in global DNS hijacking botnet

An Estonian man was sentenced Tuesday to 87 months in prison in the U.S. for his role in a cybercriminal operation that infected over 4 million computers with DNS hijacking malware.

hollywood presbyterian

Paying ransomware is what ills some hospitals

Has the recent wave of ransomware attacks aimed at hospitals been a wakeup call for the healthcare industry? Or is this latest security plague just part of the new normal?

washington jefferson

Government worst of all industries in cybersecurity, says report

Malware, password theft and worker indiscretions are problems for all levels of government. And it may not just be related to lack of money.

data breach hacker

How to keep your small business safe from data breaches and hacks

Ecommerce and security experts provide 10 tips for preventing breaches and hacks and keeping customer data safe.

breach title

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report contains bad news on multiple fronts, including click-through rates on phishing messages, how long it takes companies to detect breaches, and even whether companies spot the breaches at all....

hack hacker cyber thief theft stolen

Better SWIFT software design would have thwarted Bangladesh Bank cyber heist

SWIFT’s application security policy should have anticipated weak cyber defenses for banks in emerging countries.

thinkstockphotos 87341123

Sites that prevent ad blockers lose readers

There are different ways to address ad blockers. Locking people out of websites doesn’t seem to be working, though.

smoking gun

Bangladesh Bank cyber-heist hackers used custom malware to steal $81 million

The hackers behind the Bangladesh Bank cyber heist used custom malware to exploit SWIFT software and hide evidence of the attack. Researchers urge all financial institutions using SWIFT Alliance Access to update their software and...

fortinet fortigate 6040e

New security fabric to unite Fortinet gear with that of other vendors

Fortinet is embarking on a mission for its firewalls and other products and those of third-party vendors to work together to boost security across core networks, remote devices and the cloud.

jigsaw ransomware logo

You’ve been hit with ransomware. Now what?

When their data has been stolen, and is being held hostage, companies are increasingly caving in to cybercriminal demands for payment. Short of paying up, the best defense is a good offense.

email bullseye with three red arrows

CEO targeted by fraud twice a month

Every couple of weeks or so, Tom Kemp's company gets hit by ever-more-sophisticated attempts to trick them out of large sums of money

434298567 b7bfe77cfe b

Hackers having a field day - time to rethink your blogging and publishing strategy

Blogging platforms such as WordPress and Drupal have evolved into general purpose publishing, marketing, and sales platforms and now they've become easy hacking targets

Hacking Team hacker DIY guide

Hacker who hacked Hacking Team published DIY how-to guide

The hacker who hacked the Hacking Team explains how he did it and includes tips to avoid being busted.

security hacker code cyberespionage

Hybrid GozNym malware targets customers of 24 financial institutions

A group of cybercriminals have combined two powerful malware programs to create a new online banking Trojan that has already stolen million dollars from customers of 24 U.S. and Canadian banks.

power transmission towers

Catastrophic cyber attack on U.S. grid possible, but not likely

U.S. critical infrastructure systems still need major security improvements. But experts say that predictions of catastrophe from portions of the electric grid being taken down for months or more by a cyber attack, are overblown.

Load More