Malware and Cybercrime

Malware and Cybercrime news, trend analysis and opinion

algorithms 1
cyberthief

cutcaster 100813534 flipping through 100 dollar bills small

Ransomware is only getting worse. How do you prepare for it?

Ransomware-as-a-service, help desks, third parties -- all point to a mature yet illegal enterprise undergoing serious growth. Here are tips to protect yourself and your company.

Cybersecurity Industry News Roundup, Week of February 1, 2016

FireEye remains aggressive, Norse implodes, and cybersecurity Symantec top the week’s events

kaspersky lab

What did we learn about cybersecurity in 2015?

Cybercrime is always a hot-button issue, and last year was no different. What lessons can we learn from some of the more insidious trends and events to better prepare ourselves for the year ahead?

Survey: Average successful hack nets less than $15,000

The majority of cyber attackers are motivated by money, but make less than $15,000 per successful attack, according to a survey of hackers in the U.S., U.K. and Germany released yesterday by the Ponemon Institute.

The Endpoint Security Continuum

Next-generation endpoint security action is divided into two camps: Advanced prevention and in-depth detection and response. In between these poles lie an assortment of additional security controls.

underwater wireless 3

10 of today's really cool network & IT research projects

New enterprise and consumer network technologies are coming fast and furious these days via well-heeled startups, and yes, even from more established tech players. But further back in the pipeline, in the research labs of universities...

malware

What U.S. cities are most prone to malware infections, and why?

These U.S. cities have the highest rates of malware infection on their PCs. What causes spikes in infection rates in different cities?

Scam definition

Symantec partner caught running tech support scam

Tech support scammers can get cheeky -- making unfounded claims that PCs are infected to scare consumers into parting with their money -- but a Symantec partner took nerve to a new level.

power grid electrical

Telephonic DoS a smokescreen for cyberattack on Ukrainian utility

The late December telephonic denial-of-service attack against a Ukrainian power company was a smokescreen to cover up a cyber attack, experts say.

New tool from Cloudmark is designed to defend against spear phishing  

The purpose-built solution is said to detect spear phishing messages before they reach their targets

airplane cabin Airbus plane

Aircraft part manufacturer says cybercrime incident cost it $54 million

An Austrian airplane component maker for Boeing and Airbus said earlier this week a cybercrime-related fraud has caused it €50 million (US$54 million) in damages.

power grid electrical

How much at risk is the U.S.'s critical infrastructure?

Everybody in the security community agrees that it is bad for U.S. critical infrastructure systems to be breached by hostile hackers. But there is ongoing debate about how bad. Some of the nation’s leaders warn that skilled hackers...

compliance2

Cybersecurity much more than a compliance exercise

An overwhelming number of security executives view compliance as an effective strategy. But it’s not, and many CISOs need to rethink their priorities.

pulaski county courthouse little rock arkansas roses

Little Rock, Tampa, and St. Louis hardest-hit by malware among U.S. cities, study finds

Little Rock, Tampa, St. Louis, Orlando and Denver were the five American cities most affected by malware on a per-capita basis in 2015, according to a study released today by Enigma Software.

cybersecurity

State CIOs agenda targets cybersecurity

NASCIO's federal policy agenda for new year looks to expand resources to secure critical infrastructure, recruit top talent and ease the burden of federal regulations.

The Capitol building

Information sharing bill passes, but privacy debate goes on

The stated goal of the Cyber Information Sharing Act (CISA), passed by Congress last month as part of an omnibus budget bill, is to improve the security of both the private and public sectors through the sharing of threat information....

car wireless internet security privacy security locks 100437820 primary.idge 100597869 primary.idge

Feds say only Chryslers were vulnerable to hacks via radio, not Audi or Volkswagen

U.S. auto safety regulators have determined that only Fiat-Chrysler infotainment systems have a security flaw that could allow hackers to take control of vehicles using nothing but a laptop and cellular connection.

The Incident Response “Fab Five”

CISOs should consider and coordinate incident detection and response in five areas: hosts, networks, threat intelligence, user behavior monitoring, and process automation.

Load More