Malware and Cybercrime

Malware and Cybercrime news, trend analysis and opinion


video

Methods hackers use to attack DNS

At 2016 Interop, Cloudmark Engineering Director Angela Knox talks with Network World about several different ways that hackers go after DNS as part of other malicious attacks. Knox explains the methods for DNS ID hacking, spoofing,...

Cybersecurity Plan for POTUS 45

The next president must fund cybersecurity education, encourage private sector investment and take the lead on improving multi-lateral international cooperation.

Hewlett Packard Enterprise servers

DDoS costs, damages on the rise

Peak-time distributed denial of service attacks cost organizations more than $100,000 per hour, said half of the respondents to a new survey of mid-sized and large corporations in the U.S. and Europe.

Gmail Google Mail

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.

insurance

Cyber insurance can keep your business afloat after a cyberattack

Cyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.

The rise of threat intelligence gateways

These network appliances automatically block known threats, mitigate risk and streamline security operations.

Otto E. Eckert power plant operated by the Lansing Board of Water and Light

Ransomware attack forces Michigan utility to shut down systems, phone lines, email

Lansing Board of Water & Light (BWL), a Michigan municipal utility, was hit with a new variant of ransomware and had to shut down many of its systems.

ransomware

Got ransomware? These tools may help

Ransomware on your system and no backups? Ouch. Check out publicly available decryptor tools and see if they can save you

ransom note letters

How to tell if you've been hit by fake ransomware

Ransomware is no joke, but sometimes, amateur attackers use 'pretend' ransomware -- and you can get your data back easily

managed security service providers

Rip up the script when assembling a modern security team

Characteristics that a modern security team needs to combat sophisticated hackers

If I were the next CEO of Symantec – Redux

Challenges from 2014 remain. Symantec must emphasize services, acquire promising startups, establish a partner ecosystem, and streamline products and operations

isis flag graphic

ISIS cyberattack capabilities are unorganized, underfunded -- for now

The U.S. and its allies should be concerned about cyberattacks from ISIS-affiliated groups, but the hackers are poorly organized and likely underfunded, at least in the short term, according to a new report.

Fraud gang targeted large European companies

Estonian man gets over 7 years in prison for role in global DNS hijacking botnet

An Estonian man was sentenced Tuesday to 87 months in prison in the U.S. for his role in a cybercriminal operation that infected over 4 million computers with DNS hijacking malware.

hollywood presbyterian

Paying ransomware is what ills some hospitals

Has the recent wave of ransomware attacks aimed at hospitals been a wakeup call for the healthcare industry? Or is this latest security plague just part of the new normal?

washington jefferson

Government worst of all industries in cybersecurity, says report

Malware, password theft and worker indiscretions are problems for all levels of government. And it may not just be related to lack of money.

data breach hacker

How to keep your small business safe from data breaches and hacks

Ecommerce and security experts provide 10 tips for preventing breaches and hacks and keeping customer data safe.

breach title

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report contains bad news on multiple fronts, including click-through rates on phishing messages, how long it takes companies to detect breaches, and even whether companies spot the breaches at all....

hack hacker cyber thief theft stolen

Better SWIFT software design would have thwarted Bangladesh Bank cyber heist

SWIFT’s application security policy should have anticipated weak cyber defenses for banks in emerging countries.

Load More