Blog Posts Tagged with "cybercrime"
Why Cyber Security Should Be at the Top of Your Christmas List
December 17, 2020 Added by:Steve Durbin
To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function.
Comments (0)
Global Security Threats Organizations Must Prepare for in 2020
January 08, 2020 Added by:Steve Durbin
To take advantage of emerging trends in both technology and cyberspace, businesses need to manage risks in ways beyond those traditionally handled by the information security function.
Comments (0)
New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board
January 04, 2019 Added by:Steve Durbin
Four security topics businesses should focus on in 2019.
Comments (0)
Security Gets Messy: Emerging Challenges from Biometrics, New Regulations, Insiders
October 11, 2018 Added by:Steve Durbin
Information security professionals are facing increasingly complex threats—some new, others familiar but evolving.
Comments (0)
The Soaring Success of Cybercrime as a Company
March 22, 2018 Added by:A. N. Ananth
In a raging cyber war, it pays to think like cybercriminals and understand how they are organizing and operating as corporations. While enterprises won’t resort to cybercrime, we need to understand, outthink and outplay our adversaries at a strategic, not just tactical, level.
Comments (0)
The 5 Motives of Ransomware
January 04, 2018 Added by:Joseph Carson
Who would have foreseen the impact of both WannaCry and NotPetya
Comments (0)
Security of IIoT Devices: Time to Operate in Tandem with the Drive for Productivity?
December 22, 2016 Added by:Jalal Bouhdada
Manufacturers are increasingly adopting IIoT technology with the goal of boosting manufacturing productivity, but are security practices falling by the wayside?
Comments (0)
The Home of Cyber Security Best Practice: Public or Private Sector?
December 15, 2016 Added by:Bernard Parsons
There are areas where private and public sector can take a leaf out of each other’s books, as the security challenges facing both continue to escalate.
Comments (0)
SCADA Systems Offered for Sale in the Underground Economy
June 22, 2015 Added by:Idan Aharoni
Access to such compromised SCADA systems that control various real-world equipment is being sold in the underground economy.
Comments (0)
Can Hackers Use FraudFox VM to Defeat Your Fraud Prevention?
January 22, 2015 Added by:Robert Siciliano
So how worried should your business—and customers—be about FraudFox VM ? I sat down with Scott Waddell the Chief Technology Officer of iovation, the fraud prevention experts, to find out what the reality is behind the media headlines.
Comments (5)
Webcast: Using Global Intelligence Data to Prevent Online Fraud and Cybercrime
December 12, 2014 Added by:InfosecIsland News
Please join ThreatMetrix and SecurityWeek on Thursday, Dec. 18th, 2014 at 1PM ET for a Live Webcast.
Comments (0)
Cybercriminals Use Patriotic Russians to Revive Kelihos Botnet
August 30, 2014 Added by:Eduard Kovacs
Cybercriminals seem to be well aware that many Russian nationals are unhappy with the sanctions imposed by foreign governments against their country, so they're relying on them to revive the Kelihos (Waledac) botnet
Comments (0)
New Insights into Email Spam Operations
June 01, 2014 Added by:Gianluca Stringhini
Recently, we have been working on gaining a better understanding of spam operations and of the actors involved in this underground economy. We believe that shedding light on these topics can help researchers develop novel mitigation techniques, and identifying which of the already-existing techniques are particularly effective in crippling spam operations, and should therefore be widely deployed.
Comments (0)
Why are Cybercrimes NOT Always White-collar Crimes?
June 17, 2013 Added by:DHANANJAY ROKDE
A generic definition of a crime would be an act that is in violation of the applicable laws.
Comments (0)
Don’t Let Your Guard Down: Tragedies Pave Way for Phishing Attacks
April 16, 2013 Added by:Jake Garlie
Tragic events such as what happened during the Boston Marathon creates an opportunity for attackers in the digital world as well. With everyone scrambling for more information, the success rate of a phishing attack at this time can skyrocket.
Comments (38)
Just One of Many Internet Scams
March 05, 2013 Added by:Robert Siciliano
A good friend of mine called me recently to ask what I knew about scams from online sales. He had placed an ad on CraigsList for something he was trying to sell and had asked for $150 for the item. He had received a call from a woman and she offered to send him a check for the item....
Comments (0)
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps