Cybercrime news, analysis, research, how-to, opinion, and video.

Two indicted for stealing 1 billion email addresses in historic breach

The Vietnamese defendants are accused of using stolen email addresses for a spamming operation

Police arrest man in UK over US Defense Department network intrusion

The intrusion resulted in the contact information of 800 DoD employees being stolen from a satellite communications system

crime scene digital

The Cybercrime Economy Personified

The cybercrime economy is entrenched in digital fox holes and hoodlum hideouts the world over. It’s not going away. Your best bet is to be the hardest target on the battlefield.

FTC Targets Group That Made Billions of Robocalls

FTC and 10 state attorneys general settle with vacation services group that made massive robocall across the country.

app malware

Attackers Have Cloned Malware-Laden Copies of the Most Popular Apps Your Employees Use

Don’t get angry when cyber crooks give your enterprise the bird, get even.

computer hacking hacker thief white collar crime stealing keyboard hand shadow 000001325773

Attackers Target Subdomains of GoDaddy Customers

Attackers have set up around 10,000 malicious subdomains on accounts belonging to GoDaddy customers, according to a new report. The technique, called domain shadowing, first appeared in 2011 but has dramatically grown in popularity in...

Twitter Investigates ISIS Threats Against Dorsey, Costolo and Employees

Twitter is working with law enforcement to investigate threats made against its executives and employees.

Kaspersky Lab Unveils Cybersecurity Startup Accelerator

SSC will provide startups with access to business, cybersecurity and cross-industry expertise from around the world

Europol and security vendors disrupt massive Ramnit botnet

The operation seized command-and-control servers and Internet domains used by the Ramnit gang

internet security with lock

Google Scrubs Pwnium Hack Contest

Google has shut down its annual Pwnium hacking contest, which it has held alongside the better-known Pwn2Own challenge each spring since 2012.

Dtex Software Fights Insider Threats

Dtex started up in Australia and grew gradually into markets in Asia and Europe, and is announcing a move to San Jose, Calif., where it this week got an infusion of $15 million in venture capital to expand its U.S. presence....

DOJ offers $3 million reward for Gameover Zeus botnet suspect

DOJ hopes the multi-million dollar reward will reinvigorate the hunt for the suspect

If You Could Go Back in Time...

Turning back the clockImage by ShutterstockEvery week brings news of breaches, cybercrime and state-sponsored hacks, each more shocking than the last.Unfortunately, it's not practical to rip up the whole Internet and start over again...

Reddit bans nude photos, sex videos posted without consent

The new rule goes into effect in a couple weeks

Sony Breach is a New Breed of Attack That Needs New Responses

The big lessons from the Sony breach are that businesses need better planning and to shift security investment away from trying to protect the network from attacks and toward quickly detecting and dealing with breaches, Gartner says.

Oculus VR

Are Metaverse Pioneers Making the Same Old Security Mistakes?

Ask security pros what they would change about the Internet if they could go back in time knowing what they know now, and most can point to a list of mistakes we could have avoided. But according to some experts, we're still making...

power fingerprint

How ‘Power Fingerprint’ Could Improve Security for ICS/SCADA Systems

Every digital device or system has a power fingerprint. A new company says monitoring that fingerprint in ICS/SCADA systems can detect intrusions or malfunctions in real time. But some experts say that while it will improve security,...

022315 detect malware 1

New Tools Can Detect Hidden Malware

We tested new security appliances from Damballa, Lancope and LightCyber that are designed to detect the latest cyber-attacks.

malware 1

New Weapons Offer Hope Against Advanced Cyberattacks

Traffic monitoring tools from Damballa, Lanscope, LightCyber can detect hidden malware.

hack security malware

Security's Disastrous Week, From Superfish to Unstoppable, Hard Drive-Killing Malware

Superfish. Untrustworthy hardware. Easily hacked cars. FreeBSD's random number generator. This week was an utter disaster for security.

Load More