Heads-Up: Second Generation Ransomware In The Wild
Last week, Fedor Sinitisyn, blogger and security researcher for Kaspersky posted something worrisome. He reported that the Angler Exploit Kit was delivering a new second-generation type ...
We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.
Last week, Fedor Sinitisyn, blogger and security researcher for Kaspersky posted something worrisome. He reported that the Angler Exploit Kit was delivering a new second-generation type ...
Dell has its own news site called Tech Page One. A few days ago they had a new article that started with: "Human errors that aid social engineers. The weakest links in computer networks ...
Unscrupulous eastern European cyber mafias are preying on U.S. workers that try to make ends meet and look for a second (or third) job. This is not a new scam, but it is sticking up its ...
This is from a few weeks ago, and I only just got to it. Hackers can exfiltrate data via a cellphone and no longer need the Internet to invade and control a system, Ben Gurion University ...
Talk about adding insult to injury. Brian Krebs has the update, he's been reporting on the legal gray area when cyber mafia steals hundreds of thousands out of a company's bank account. ...
Ok, unless you were on an Internet-free vacation (fat chance); you have heard that eBay managed to lose all its 145 million credentials.
CyberheistNews Vol 4, # 20
Today, in the Wall Street Journal, an article told the story of a software product called blackshades that experts call a "rat" (Remote Access Trojan) which was commercially sold to cyber ...
This could be a very expensive scam to fall for, so keep on reading.
Applying Engineering Values to IT Security. The National Institute of Standards and Technology is developing new cybersecurity standards based on the same principles engineers use to ...
Ready to be hit upon by the likes of Anna Chapman? MI5 in the UK warned that foreign spy agencies are targeting IT workers within big organizations as a means of gaining privileged access ...
Rob Rachwald and Zheng Bu at FireEye came up with some interesting observations: "At FireEye, we look at hundreds of malware samples daily, and, in a recent talk at RSA Conference, Zheng ...
An article in the Wall Street Journal of May 5, 2014 summarized what I have been talking about these last few years. 25 years ago, Symantec was one of the first IT security companies to ...
An Eastern European Cyber Mafia has been found to run a multi-year campaign that targets small U.S. banks and credit unions with a sophisticated VoIP phishing scheme (aka vishing) to ...
In IT, we are subject to help desk tickets and putting out fires. The problem with this is that most of these are short-term fixes. It is usually about last week's downtime, today's ...
Welcome to the new world of malware.
Danny Yadron at the WSJ got the picture right. State, and local law enforcement are struggling to keep up as their online case load grows. They are even gettting a hand from the FBI here ...
Here is another reason why buying legitimate operating systems and application software is a good idea. A new study conducted by IDC and commissioned by Microsoft reveals some troubling ...
Virus Bulletin came up with some interesting historical facts. In 1989, when the very first Virus Bulletin rolled off the press (produced in a black-and-white, printed pamphlet style), ...
This week I attended a webinar about Security Awareness Training hosted by David Monahan, Research Director Security and Risk Management of Enterprise Management Associates.