Cybercrime news, analysis, research, how-to, opinion, and video.

envelope cash

IBM unbolts vast threat database to fight cybercrimes

IBM offers third-party threat data and real-time indicators of live attacks, which could combat cybercrimes.

clouds money dollar signs

Report: Average cost per record breached is 58 cents, discovery times are down

According to the Verizon data breach investigations report released today, the average cost per breached data record is 58 cents. That's a far cry from other estimates that put the average per-record loss at around $200.

cybercrime smb

5 costly consequences of SMB cybercrime

Cybercrime doesn’t affect only big businesses — hackers are increasingly targeting vulnerable, smaller organizations, too. Learn more about how SMBs are targeted and the true costs of these crimes.

data analytics thinkstock

Watermarks used to track data through Dark Web to Russia, Nigeria

How far does stolen data get before a breach is detected? That's the question Bitglass asked -- and answered -- in a recent experiment. The Cambell, Calif.-based company went on the Dark Web and planted documents filled with mocked-up...

guard dog cyber attack prevent security

Malware writers take a page from the spam industry to evade detection

While the volume of cyberthreats declined slightly last year, their sophistication increased, according to a new report from Websense Security Labs


Massachusetts police department pays $500 CryptoLocker ransom

Police in Tewksbury, Mass., fell victim to CryptoLocker and paid $500 to decrypt affected files so they could get back to work.

smooth water waves ripple water concentric circle wave splash 000001280919

Cyberattacks have ripple effects on partners, industries

Cyberattacks on one organization can have ripple effects that reach far beyond it, according to a new survey

obama cybersec

Collaboration and boundaries vital for new cybersecurity initiatives

The need for cybersecurity protection is obvious and agreed upon by Congress, the President, and more. But how will newly introduced initiatives prove effective? Jonathan Feld and Suzanne Alton weigh in

viking fight

It’s time to research new ways to fight DDoS attacks

Research shows a majority of enterprises leave DDoS protection to network-servicer providers, web-hosting services or internal resources. But these aren’t the only options for shielding your organization.


Beware your own risks – when you just become another part of the business

password stolen

Employees have no qualms in selling corporate passwords

People who wouldn't think about selling their personal passwords to criminals for a few quick bucks are apparently not so concerned when it comes to their employers. A number of surveys, including one done recently, find that workers...

oil wells at sunrise 100838104

Cyberwar heats up in the Middle East

Two new malware campaigns have been spotted in the Middle East, according to reports released this week, one targeting energy companies and the other going after political targets in Israel and Lebanon.

Palo Alto service to flag particularly evil security attacks

Palo Alto Networks is introducing a service that tips customers off when it discovers unique or particularly dangerous attacks against their networks, giving them a heads up that perhaps they are the targets of particularly...

kkk ddos anonymous

Anonymous proxies now used in a fifth of DDOS attacks

The number of distributed denial of service attacks using anonymous proxies has increased dramatically over the past year, according to a new research report, as attackers use these proxies to create an instant pseudo-botnet

Silk Road investigators charged with stealing bitcoin

Two former U.S. agents face charges of wire fraud and money laundering

board room security

Security crashes the boardroom party

Given the recent spate of headline-grabbing data breaches, CIOs need to be prepared to answer a lot of board questions about risk, says IDG Communications CEO Michael Friedenberg.

maze direction

The CSO Security Career Survival Guide

CSO's Security Career Survival Guide

amazon web services born

Study: One-third of top websites vulnerable or hacked

According to a new report from Menlo Security, one out of three of the top million websites are either vulnerable to hacking or already hacked.

Premera, Anthem breaches probably espionage, expert says

Attackers that compromised personal data about 11 million customers of healthcare provider Premera were likely after intelligence about groups or individuals.

Load More