Cyber Crime

Cyber Crime | News, how-tos, features, reviews, and videos

Blockchain graphic

Blockchain: what is it good for, in real-world IT?

Blockchain elicit's big ideas – but how can IT utilize it to make day-to-day life easier?

artificial intelligence / machine learning / network

Why AI is crucial to cyber security

Why AI is crucial to cyber security

fbis most wanted cybercriminals

FBI's top 10 most wanted cybercriminals

The internet has impacted the world in numerous ways, but it isn't always positive. Thanks to technology, we now have the rise of the cybercriminal, and the FBI even has a most wanted list for these criminals.

Will macOS protect you from ransomware attacks?

The recent WannaCry ransomware attacks on Windows have some Mac users wondering if they are safe. Is macOS secure from ransomware attacks?

WannaCry: Sometimes you can blame the victims

Last week’s big malware outbreak caused a lot of damage, but organizations that made good decisions ahead of time weren’t affected.

ransomware

Stopping ransomware starts with the security pros

Bromium survey of security professionals shows lapses in their own best practices.

04 ddos

Cybercrooks fight over DDoS attack resources

As more groups get into the denial-of-service attack business they're starting to get in each other's way, according to a report released this morning. That translates into a smaller average attack size.

What is WannaCry? What does WannaCry ransomware do?

Ransomware is a type of malicious software that encrypts your files until you pay a ransom.

Will the WannaCry ransomware serve as a meaningful infosec wake-up call?

Ransomware is no new threat: will WannaCry finally act as a catalyst to a wider infosec wake-up call?

wannacrypt ransom note

New WannaCry variant being monitored, DHS official says

A variant of the WannaCry ransomware has been able to infect some of the computers patched after the original malware struck. But attacks in the U.S. appear to be limited so far.

it security salaries

The NHS ransomware event and security challenges for the U.S healthcare system

The malware attack on the U.K National Health System (NHS) draws attention to the need for urgent building code upgrades in healthcare data security. While short-term fixes may enable hospitals to recover their data and resume normal...

img 20170512 095943

'Perfect storm' of ransomware and network worm hits unprotected computers globally

Enterprises were clearly unprepared. The question is if they'll fare any better the next time around -- and there will likely be a next time.

internet web security risk

8 ways to manage an internet or security crisis

IT, communications and security experts share tips on what to do when your business is hit with an IT-related disaster, such as a cyberattack, an ecommerce site crash or a software failure.

horse asleep

Risks to the enterprise from the one-trick pony

Whether an adversary is highly skilled and targeting an organization or taking advantage of a black market service to make a few bucks, any threat is a threat.

1 ceo target threat

Did Kaspersky step in dog-doo?

How did Kaspersky find themselves in the cross hairs of the US intelligence community

trump sign immigration eo

Mixed reviews for Trump’s Executive Order on cybersecurity

Experts generally agree that President Trump’s cybersecurity Executive Order is well intended and a good start. But several of them have specific suggestions on how it could be improved.

stan black

Q&A Citrix CSO: How to deal with security across multiple generations of employees

Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He talks about how security has changed among employees in each generation.

old billboard

Ad network takes steps to reduce fraud

Online advertisers are losing billions to fraud, but one advertising network has successfully taken steps to clean up its platform. U.S. advertisers spent more $25 billion on programmatic online ads last year, meaning that about $8...

iot data smartcity

Another IoT botnet with pieces of Mirai embedded can do DDoS from 100k devices

Bot-herding software called Persirai, which incorporates pieces of the Mirai botnet code, can commandeer significant chunks of a known 150,000 IP cameras that are vulnerable to Mirai and use them to fire off distributed...

Threat detection automation won’t solve all your problems

To close the cybersecurity gap, look to incident response automation

Load More