Cybercrime

Cybercrime news, analysis, research, how-to, opinion, and video.

Man charged with selling fake discount coupons on Silk Road

The trade in counterfeit coupons still thrives on other underground marketplaces

computerworld digital edition june 2015 cover 100587327 orig

boardroom table

Cybersecurity on the agenda for 80 percent of corporate boards

Cybersecurity is a topic of discussion at most board meetings, according to a new survey of 200 corporate directors. The survey revealed that more than 80 percent of board members say that cybersecurity is discussed at most or all...

male victim sad

What enterprise should do when helpless employees lose hope in fighting cyber attacks

CSO looks at the symptoms of the victim mentality in the enterprise, how it comes about, and what enterprises can do technically and psychologically to avoid it.

Illustration: safety net, disaster recovery, emergency rescue

5 things you should know about cyber insurance

As more companies step in to offer insurance coverage against a broad range of cyber losses, we break down five points that organizations should keep in mind as they consider their options.

irs stoplight

IRS cut its cybersecurity staff by 11% over four years

As headcount is falling, cybersecurity spending at the agency is increasing.

Anit Yoran

Is security really stuck in the Dark Ages?

RSA President Amit Yoran wasn't passing out compliments in his opening keynote at last month's convention. But he says the response from both colleagues and competitors is that he said what needed to be said: The industry needs to...

Startup Cyber adAPT takes on threat detection

Cyber adAPT, a startup springing from DARPA funded research, is shipping its first products that detect network compromises and gather data that can be used later for forensic analysis of breaches.

global data flow thinkstock

DDoS reflection attacks are back – and this time, it's personal

This time, instead of hitting data center servers or DNS servers, the attackers are going after personal computers on misconfigured home networks.

U.S. Secretary of State lays out 5 principles for international cybersecurity

US Secretary of State John Kerry in a speech give in South Korea highlights the importance of the Internet to supporting 21st century society and its freedoms and outlines a number of key principles that all nations should follow for...

security tools 1

Top security tools in the fight against cybercrime

There’s no silver bullet, so load up with as many of these as you can.

security tools 1

13 must-have security tools

The experts weigh in on their top picks for protecting enterprise networks.

risk

Applying the Irari Rules to a risk-based security program

A few respected critics took issue with what we call the Irari Rules. Here’s why their concerns are off base.

wordpress dot org

Unusual Wordpress attack steals login credentials

Wordpress is a common target for criminals who redirect innocent users to malware download sites -- but a new type of malware steals user login credentials instead.

ecommerce thinkstock

Criminals attempt 25 million payments and logins a month

During the last quarter of 2014 and the first quarter of 2015, 4 percent of all attempts to create new online accounts were definitely illegitimate, as were 2.3 percent of all account logins, and 3.2 percent of all payment attempts.

thelist doctor smartphone

Criminal attacks now surpass accidental breaches in healthcare

Data breaches caused by criminals outnumbered accidental ones for the first time, according to Ponemon's fifth annual benchmark study of privacy and security in the healthcare industry

safety first 620x465

SAFETY Act liability shield starts showing cracks

This week, Salted Hash has examined the Department of Homeland Security's (DHS) SAFETY Act, and FireEye's promise to customers that their certification under the act provides them protection from lawsuits or claims alleging that the...

sony awareness

Awareness lessons from the Sony hack

As more information is disclosed from the Sony hack, it demonstrates that awareness concerns go well beyond phishing.

quarantine sign

Automating incident response lets IDT take battle to the enemy

By automating the incident response process, IDT was able to reduce the time before the infection was quarantined, shorten the remediation cycle, reduce investigation time, and free up security staff to go after the bad guys themselves...

angry hacker

Hack the hackers? The debate rages on

The split between experts who believe "hacking back" against cyber criminals is the worst thing an organization can do, and those who think it is a necessary element of an effective response, is sharper than ever.

Load More