To shine a light on cybercrime, go Dark
One of the best ways to understand your enemy – what he's up to, what his capabilities are and how he can damage you – is to spy on him.
Taylor Armerding | 11 Aug | Read more
One of the best ways to understand your enemy – what he's up to, what his capabilities are and how he can damage you – is to spy on him.
Taylor Armerding | 11 Aug | Read more
Phishing scammers have infiltrated the enterprise and they're finding easy prey, but it's not in the C-suite as previously thought. Attackers are exploiting the multitasking, often overloaded middle management ranks, according to research by security and compliance firm Proofpoint.
Stacy Collett | 24 Jun | Read more
There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.
David Strom | 11 Mar | Read more
Last week, U.S. Marshals sold off another 50,000 Bitcoins that used to belong to Silk Road founder Ross Ulbricht -- a.k.a. "Dream Pirate Roberts." Ulbricht was found guilty on all accounts last month, and faces up to life in prison.
Maria Korolov | 10 Mar | Read more
While the Center for Strategic & International Studies and McAfee estimated the annual cost to the global economy from cybercrime at $375 billion conservatively and $575 billion maximally as of June 2014, at least one expert stands by cost figures that are many times those numbers.
David Geer | 05 Mar | Read more
"Whodunit" is essential to solving crimes. You can't make an arrest or prosecute a crime if you don't even know who committed it.
Taylor Armerding | 10 Feb | Read more
Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. Cripple the automated processes presented by certain malware platforms, and suddenly the threats -- and the losses --aren't quite so serious.
Grant Hatchimonji | 20 Aug | Read more
I recently had the opportunity to speak with two representatives from the Netherlands-based security research firm Fox-IT--Maurits Lucas, InTELL Business Director, and Andy Chandler, VP of WW Sales & Marketing. Collectively, the two shared an in-depth story of cybergang warfare suitable for Hollywood.
Sean Martin | 12 Aug | Read more
Leaders of the tech sector laud the Obama administration's rollout of voluntary cybersecurity guidelines, but broader private-sector adoption could remain a challenge.
Kenneth Corbin | 18 Feb | Read more
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
Grant Gross | 20 Dec | Read more
It may be difficult to remember now, but not too long ago, cyberattacks rarely made headlines in mainstream news. That's not to say that these advanced persistent threats, sometimes state-sponsored or the product of organized crime, were uncommon. On the contrary, they were booming. It was just that few people liked to talk about them.
Colin Neagle | 12 Sep | Read more
It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.
Thor Olavsrud | 20 Feb | Read more
We are standing in a parking lot in the city of Malmö, southern Sweden, one of the many places Peter Sunde now calls home. The sky above us is grey, as usual at this time of year. Just as the parking meter spits out our ticket, a young man driving much too fast on a motorcycle roars up behind us. He is followed by a police car, sirens blaring and blue lights flashing.
Daniel Goldberg and Linus Larsson | 19 Feb | Read more
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
Ellen Messmer | 15 Feb | Read more
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
Thor Olavsrud | 09 Jan | Read more