Malware and Cybercrime

Malware and Cybercrime news, trend analysis and opinion

security of things
Robert Silvers, DHS

Keeping up with incident response

Enterprise organizations are forced to ignore security alerts, live with excess risk, and deal with data breaches reactively when they happen.

colorful financial report with magnifying glass

Investigating Cybersecurity Incidents — a free course

Training provider Logical Operations offers a free online course on how to collect, preserve and analyze evidence from cybersecurity incidents — and prepare for the court case.

ransomware ts

FBI urges ransomware victims to step forward

The FBI has issued a plea for those who have been hit by ransomware to report this to federal law enforcement so that the country can get a better sense of just how bad this problem really is.

ransomware locked computer stock image cropped

A single ransomware network has pulled in $121 million

A ransomware author and distributor was able to collect $121 million in ransomware payments during the first half of this year, netting $94 million after expenses, according to a report released today

ransomware ts

FTC focuses on combating ransomware

Federal Trade Commission chair cautions that businesses must do more to protect consumers from ransomware extortion, one of the biggest cyberthreats today.

Big data

Data hoarders are shining a spotlight on past breaches

Old data breaches carried out years ago are entering into the limelight thanks to anonymous internet users like Keen.

cyberwar thinkstock

Government ill-equipped to thwart cyberwarfare

The U.S. infrastructure is outdated and vulnerable to cyberattacks. If government reaction doesn’t improve the country electrical could be crippled.

connected home security

Security an afterthought in connected home, wearable devices

In a survey of publicly reported vulnerabilities for consumer connected-home and wearable technology products between November 2015 and July 2016, the nonprofit Online Trust Alliance found that all of potential problems could have...

voting booth election

Hack the vote: Experts say the risk is real

This nation’s fragmented electronic voting systems are dangerously vulnerable to cyber attacks, security experts agree. And while they don’t predict direct tampering with votes in the coming election, they say uncertainty about...

silhouettes of people in line to vote 86806388

Election exploits: What you need to know [infographic]

In June and August, voter registration databases in Illinois and Arizona were breached. This infographic offers an overview of the breaches, including how the attackers got in and what they stole.

quantum computing KryptAll

Why quantum computing has the cybersecurity world white-knuckled

As quantum computers inch closer to reality, experts are sweating over their potential to render many of today's cybersecurity technologies useless.

Injection syringe needle vaccinate

Half of network management systems vulnerable to injection attacks

Cross-site scripting and SQL injection attacks are well-known threats for public-facing Web applications, but internal systems can be attacked as well. For example, about half of network management systems studied had these...

smartphone sick malware

Smartphone infections double, hotspots are also a trouble area

One out of every 120 smartphones had a malware infection during an April test period, a lab reveals. Android devices were hit the hardest.

security phishing hook

New tech can help catch spearphishing attacks

Highly-targeted spearphishing attacks slip past spam and anti-virus filters, but new approaches that look for more subtle patterns can help reduce the threat

US government politics and elections

Can cybersecurity save the November elections?

Cyber pros weigh in on how to protect voter databases and the election process.

solarin

What this expensive ‘secure’ phone tells us about mobile hacking

Mobile security is a bit of a misnomer. Few of us can say we’ve been attacked by a piece of malware or have quarantined an actual virus. Yet, there’s a sneaking suspicion that mobile security is a bigger concern.

Legislation of privacy security keyboard law legal gavel court ruling

Romanian hacker Guccifer sentenced to 52 months in US prison

A Romanian hacker known as Guccifer has been sentenced to 52 months in prison after breaking into Internet accounts of about 100 U.S. citizens, including government officials.

pokemon go mexico

How to keep viral memes from spreading malware in your enterprise

CSO shares the process attackers use to slip inside the enterprise through memes and games together with enterprise security policies and enforcements that help ensure the next viral internet craze doesn’t lead to malware playtime...

Load More