Cyber Crime

Cyber Crime | News, how-tos, features, reviews, and videos

holiday e commerce shopping holiday hacking security breach retail security by rupixen via unsplash
Asset-recovery team pulls dollar sign back from over the edge of a cliff; hacker/keyboard background

neon skull sign / danger / caution / threat

Brand reputation at risk

While leading in digital transformation, TMT companies are more vulnerable to cyber-threats, research finds.

6 indirect expenses cost money fine penalty pepi stojanovski unsplash

Cybercrime is increasing and more costly for organizations

CIOs need to focus on people-based attacks and use intelligent tools to limit data loss and business shutdowns.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

By 2020, 60 percent of digital businesses will suffer major service interruptions

The sheer number of cyberattacks resulting from an inability to manage risks — and the burgeoning talent shortage to deal with it — will force CIOs to rethink their defense strategy.

stateofcybercrimethumb

Escaping the line of fire: 2018 U.S. State of Cybercrime

One in four of organizations report greater monetary losses.

template c100.00 03 57 09.still001
video

An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41

In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.

template c100.00 06 55 04.still001
video

What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39

What is a phishing kit? In this video, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.

template c100.00 03 35 22.still001
video

An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40

Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.

salted hash thumbnail multi final
video

Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.

salted hash thumbnail multi final
video

The risks associated with global Internationalized Domain Names | Salted Hash Ep 36

Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.

salted hash thumbnail final
video

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

insurance policy

Cyber insurance: Is it worth the investment?

While cyber liability insurance policies are complex and proving claims can be daunting, CIOs in the midmarket space agree access to resources make the investment worthwhile.

template c100.00 06 00 09.still001
video

What an Apple phishing attack looks like | Salted Hash Ep 32

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

adrian sanabria
video

Is it time to kill the pen test? | Salted Hash Ep 22

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping...

CIO digital magazine November/December cover

CIO Digital Magazine, November-December 2016

Cover story: Five winners of the CIO.com and Drexel University Analytics 50 awards share details of their projects, lessons learned and advice.

Special report: platforms play big in the cloud

This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.

oct cover

CIO Digital Magazine, October 2016

Cover story: Uniting the digital enterprise. Enterprise mobility management isn't just for mobile devices and apps anymore, it's for truly becoming an extended enterprise.

sep cover primary

CIO Digital Magazine, September 2016

Cover story: Big data on campus. Facing federal and state pressure to raise retention and graduation rates, dozens of colleges and universities are developing analytics tools to help students make better decisions about everything...

Research report: IT security's looming tipping point

Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.

Load More