Malware and Cybercrime

Malware and Cybercrime news, trend analysis and opinion

credit card fraud
analytics dish

connected nodes network

Understanding the attack surface to better allocate funds

How CISOs can be better informed and get ahead of attacks

170214 hagerman

Sophos CEO sounds the alarm on enterprise ransomware attacks

Ransomware is increasingly becoming a problem for companies, and the CEO of a leading computer security company says he fears 2017 could see entire companies shut down until they pay up, or risk losing all their data.

In and Around the 2017 RSA Conference

Interesting announcements on cognitive computing, endpoint security, middleware, and threat intelligence

01 worms

Heartbreaking hacks

Every year hackers take advantage of cupid’s sharp arrow to trip-up unsuspecting online users.

medical marijuana sign

Hackers show no mercy—even for pot dispensaries

Anatomy of a national point-of-sale hack and takedown of more than 1,000 marijuana dispensaries

03 shipping malware

'Fileless malware' attacks, used on banks, have been around for years

Fileless malware attacks, which were recently discovered in the networks of at least 140 banks, telecoms and governments, account for about 15% of known attacks today and have been around for years.

Fraud gang targeted large European companies

Polish banks on alert after mystery malware found on computers

Malware discovered on computers and servers of several Polish banks has put the country's financial sector in alert over potential compromises.

ransomware locked computer stock image cropped

Criminals release fewer new types of malware last year, double down on ransomware

Cybercriminals have been producing fewer new kinds of malware last year -- but that's because they're so busy raking in the money from their ransomware attacks. The number of unique malware samples discovered last year was 60 million,...

RSA Conference 2017: Security analytics and operations

At the upcoming RSA Conference, expect to see vendors talking about architecture, machine learning, threat intelligence and incident response automation.

kaboom election hacking

Hacking the 2016 election: A timeline

Russian interference in the 2016 U.S. election played out in a series of hacks taking place over several months. Here’s how the attacks unfolded.

cyber warfare war

How AI is stopping criminal hacking in real time

Almost every day, there’s news about a massive data leak -- a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around,...

RSA 2017: Anticipating network security chatter

DDoS protection, network security analytics and cloud security will take center stage at RSA 2017.

hacker hacked security risk

Why 2017 will be the worst year ever for security

High-profile breaches are just the tip of the iceberg. Many have never been detected or disclosed--and without a major infrastructure changes it's only going to get worse

chain security stock

In treason case, Russia alleges security experts aided US

Two officers of the Russian Federal Security Service, the FSB, and a cybercrime investigator from Kaspersky Lab have reportedly been charged with treason for allegedly helping U.S. intelligence services.

macbook air apple

Are Apple-specific threats on the rise?

Macs are really no more secure than a PC, but for many years there just weren’t as many out there because of the expense of the hardware and other issues. They've historically been a much less popular choice among both consumers,...

machine learning

AI isn't just for the good guys anymore

Criminals are beginning to use artificial intelligence and machine learning to get around cyber defenses

RSA Conference 2017: Endpoint security in the spotlight

Lots of visibility and hype around next-generation endpoint security, suites, EDR and services at the upcoming RSA Security Conference

cyberattack

6 ways to launch a targeted cyberattack

The threat of a targeted attack for any business is real and substantial. It's vital to ensure that your organization can identify constantly evolving threats, find abnormal and suspicious activity, and take effective action to...

Load More