News, blogs, analysis, tips, discussion and how-to about cybercrime.
Mon, May 20, 2013 - For the last three months or so, the U.S. government and some of its defense contractors have engaged in a war of shame on China to pressure it to cool its cyber-attacks on U.S. targets. The campaign appeared to be yielding results, but it seems that Chinese hackers were only catching their breath.
Mon, May 20, 2013 - State-sponsored cybercriminals use simple weapons to infiltrate U.S. networks, and then quietly steal data while remaining undetected.
Fri, May 17, 2013 - Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and nongovernmental organizations from over 100 countries.
Wed, May 15, 2013 - The FBI has reportedly briefed U.S. bank executives on a wave of cyberattacks that have lashed the industry since last summer as part of a new policy designed to foster co-operation between the state and private sectors.
Tue, May 14, 2013 - Intelligence not the only part of government that has struggled. Senate has not moved on legislation to back President's order on cybersecurity
Fri, May 10, 2013 - Indicted cyber thieves used pre-paid debit cards, maniulated bank accounts to withdraw huge sums from ATMs around the world.
Fri, May 10, 2013 - Spammers revived some old scams during the first three months of 2013, according to Kaspersky Lab, but spam volumes remained flat.
Thu, May 09, 2013 - As cyberattacks increase, victims are fighting back. But retaliation has its own consequences--and may create more damage.
Wed, May 08, 2013 - The remarkable success that Chinese state-sponsored groups have had in infiltrating U.S. government, military and corporate networks in recent years should not be mistaken as a sign of growing technical superiority over the U.S. in cyberspace, security experts said.
Tue, May 07, 2013 - Chinese cyber espionage activities are fueling a rapid modernization of the country's defense and high tech industries, the Pentagon said in an unusually candid assessment of China's military and security developments last year.
Tue, April 30, 2013 - Splunk is seeking to make it easier than ever to use statistical analysis on your machine-generated data to automate the identification of anomalies and outliers in your systems.
Thu, April 25, 2013 - Between agenda-pushing hactivists, money-grubbing cybercriminals and -- more recently -- spying nation-states, there is no shortage of attackers breaking into our networks, stealing our trade secrets and generally wreaking havoc throughout IT infrastructure.
Thu, April 25, 2013 - Do you know what to do if your Twitter account is hacked? Here are four steps to take to regain control of your account and ensure it doesn't happen again.
Wed, April 24, 2013 - Following Tuesday's hacking of the Associated Press' Twitter account, the microblogging site is reportedly working on a two-step authentication security solution to help prevent future hijackings.