News, blogs, analysis, tips, discussion and how-to about cybercrime.
Wed, March 05, 2014 - Nothing spurs malware development like success and that's likely to be the case in the coming months with ransomware.
Wed, March 05, 2014 - As Beth Jacob's resignation from Target shows, retail CIOs are culpable for security breaches even though they might not have the resources in-house to protect the company.
Wed, March 05, 2014 - Microsoft's government security expert warns that there's no such thing as perfect security, so systems must be able to adapt and respond to attacks on unforeseen vulnerabilities.
Fri, February 28, 2014 - Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at this week's RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access -- you have to rethink all types to security to protect data and lives.
Wed, February 26, 2014 - How bad can cyberattacks get? How about burning the internal components of a machine, whether PC or Mac, to a crisp so there's no thought of it being recoverable? That's what security vendor CrowdStrike showed could be done to an Apple Mac OS X today at the RSA Conference.
Wed, February 26, 2014 - Here's a whirlwind look at some of the wildest and potentially most useful technology research projects from university and vendor labs related to computer networking.
Wed, February 26, 2014 - In the battle between enterprises and malicious hackers, the bad guys are clearly winning, judging by the sheer number of people and exhibitors at the RSA security conference going on here this week.
Fri, February 21, 2014 - Any government that wants to set priorities for cybersecurity should probably put its energy infrastructure close to the top.
Fri, February 21, 2014 - In medieval times, kings let barbarians break down the castle gates but made sure they paid the price once they got inside. McAfee's approach to security takes a similar approach -- since data breaches are inevitable, companies should worry less about the perimeter and more on catching the bad guys in the act.
Tue, February 18, 2014 - Leaders of the tech sector laud the Obama administration's rollout of voluntary cybersecurity guidelines, but broader private-sector adoption could remain a challenge.
Mon, February 10, 2014 - A cyberespionage operation that used highly sophisticated multi-platform malware went undetected for more than five years and compromised computers belonging to hundreds of government and private organizations in more than 30 countries.
Thu, February 06, 2014 - A contractor for Target said Thursday it was also a victim of a cyberattack, supporting the retailer's claim that hackers gained entry to its network via a third party.
Fri, January 31, 2014 - There has never been a successful catastrophic cyberattack on North America's critical infrastructure (CI) -- yet.
Mon, January 27, 2014 - Retailers in the US have been warned by the FBI to prepare for further cyber attacks, according to Reuters.