Malware and Cybercrime

Malware and Cybercrime news, trend analysis and opinion

cybersecurity skills and talent shortage
What I learning playing prey to Windows scammers

Cybersecurity Canon book review: There Will Be Cyberwar

Richard Stiennon’s book There Will Be Cyberwar is a good read for those interested in the intersection of network-centric warfare and security vulnerabilities.

business man holding money bag

Yahoo shows that breach impacts can go far beyond remediation expenses

Several studies have come out recently trying to get a handle on the total costs of a data breach, with a large variation in costs - from less than $1 million on average, to $6 million - based on the data sets and types of included...

iot security

Leaky IoT devices help hackers attack e-commerce sites

Millions of IoT devices are misconfigured so that they can forward messages -- which, combined with default admin settings, allows them to be used to attack e-commerce and other websites, a new report says

shodan search engine

How Shodan helped bring down a ransomware botnet

Shodan is a search engine that looks for internet-connected devices. Hackers use it to find unsecured ports and companies use it to make sure that their infrastructure is locked down. This summer, it was also used by security...

3 phishing

Phishing still fools people, but at least more are cautious

Two new IT security studies: One looks at phishing email detection and the other at security fatigue among computer users.

hacking elections

Q&A: The myths and realities of hacking an election

Election hacking has become a key topic during this year's presidential elections, more so now that candidates and voters are being actively targeted by actors that are assumed to be acting with Russian support. In this modified...

voter registration application

Hacking an election is about influence and disruption, not voting machines

Every time there's an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can...

slack icon

Security for your collaborative software

There’s a gaping hole in your security infrastructure right now. The front door is open, the side window is ajar, and there’s an open safe with a neon sign saying “steal my data” in flashing lights.

google self driving car at the googleplex

The future of security: A combination of cyber and physical defense

With more items gaining web connectivity as part of the Internet of Things movement, the need to protect physical devices from hackers will only increase.

security of things

How to keep terrifying medical device hacks from becoming reality

More medical devices are becoming connected ones, and that’s increasing the security threat surface, said panelists this week at the Security of Things Forum in Cambridge, Mass.

Robert Silvers, DHS

Homeland Security issues call to action on IoT security

U.S. Department of Homeland Security’s Robert Silvers says his purpose in speaking at the Security of Things Forum in Cambridge on Thursday wasn’t to scare anyone, but then he went ahead and called on everyone in the room to...

Keeping up with incident response

Enterprise organizations are forced to ignore security alerts, live with excess risk, and deal with data breaches reactively when they happen.

colorful financial report with magnifying glass

Investigating Cybersecurity Incidents — a free course

Training provider Logical Operations offers a free online course on how to collect, preserve and analyze evidence from cybersecurity incidents — and prepare for the court case.

ransomware ts

FBI urges ransomware victims to step forward

The FBI has issued a plea for those who have been hit by ransomware to report this to federal law enforcement so that the country can get a better sense of just how bad this problem really is.

ransomware locked computer stock image cropped

A single ransomware network has pulled in $121 million

A ransomware author and distributor was able to collect $121 million in ransomware payments during the first half of this year, netting $94 million after expenses, according to a report released today

ransomware ts

FTC focuses on combating ransomware

Federal Trade Commission chair cautions that businesses must do more to protect consumers from ransomware extortion, one of the biggest cyberthreats today.

Big data

Data hoarders are shining a spotlight on past breaches

Old data breaches carried out years ago are entering into the limelight thanks to anonymous internet users like Keen.

cyberwar thinkstock

Government ill-equipped to thwart cyberwarfare

The U.S. infrastructure is outdated and vulnerable to cyberattacks. If government reaction doesn’t improve the country electrical could be crippled.

Load More