Cyber Crime

Passwords are passé

Passwords are passé

By

New solutions are gaining traction to complement, or replace, the legacy use of username and password, reports Ashley Carman.

DefCon: Stolen data markets are as organized as legitimate online businesses

DefCon: Stolen data markets are as organized as legitimate online businesses

By

In order to cause disruption within the stolen data markets of the dark web, its organizational structure must be analyzed, according to one expert at DefCon 22 in Las Vegas.

Hackers face life sentences under planned UK law

By

In a speech to Parliament, Queen Elizabeth said the country would pursue legislation to strengthen penalties for cyber crime.

China to vet IT products and services for security flaws

By

The Chinese government says it will scrutinize both foreign and domestic offerings and ban vendors that don't pass muster.

Starting the year off with a...bang?

Starting the year off with a...bang?

By

As we start 2013 off, I'm pretty sure that information security leaders everywhere are glad to hear all those predictions about their budgets getting a boost this year (and that the Mayans were wrong).

Barnes & Noble pulls PIN pads after fraud ring hits stores

By

Fraudsters tampered with the point-of-sales devices at a number of locations to steal customers' debit and credit card information.

Why smaller companies are cyber crime's sweet spot

Why smaller companies are cyber crime's sweet spot

Cyber criminals are always looking for ways to fill their pockets, but SMBs seem to be a prime target.

Purported LulzSec member charged in Sony Pictures hack

By

Authorities believe Raynaldo Rivera joined previously accused Cody Kretsinger in compromising SonyPictures.com to steal personal information on about a million people.

Selling your pain for their gain

Selling your pain for their gain

HIPAA violations are becoming more common around the nation. To find the source of the problem you have to "follow the money."

Industrial crimeware sets a blistering pace

Industrial crimeware sets a blistering pace

Industrialization is a key factor driving the rate at which criminals are turning to malicious software to make serious money.

Staying out of the headlines

Staying out of the headlines

By

Yahoo presumably took no measures to ensure sensitive stuff like customer account credentials were kept safe and sound.

Two men sentenced in Michaels breach after looting ATMs

Two men each have been sentenced to 36 months in prison for withdrawing tens of thousands of dollars from ATMs with credit card information that was stolen from craft-store retail chain Michaels Stores.

Phishing phrenzy

Phishing phrenzy

The Anti-Phishing Working Group tells us that phishing is alive and well, but another report suggests that spear-phishing is even healthier - for the criminals, at least.

Low-hanging fruit in walled gardens

Low-hanging fruit in walled gardens

An individual has no intrinsic, inalienable right to leave his own system unprotected if by doing so he puts others at risk.

America's privacy and security enforcer

America's privacy and security enforcer

The FTC has made major moves this year in its fight against cyber crime, and if enterprises and organizations aren't careful, they may be facing a team of the agency's investigators.

Man convicted for role in phishing racket

By

A jury in New Jersey has found a Georgia man guilty for his role in a fraud ring that cost financial companies some $1.5 million.

FBI announces cyber personnel moves

By

The FBI's cyber division has a new assistant director, Joseph Demarest, who formerly served as assistant director for international operations.

Cyber crime as a market

Cyber crime as a market

Information security experts often talk about the costs of cybercrime to businesses, but a new report from Russia quantifies how much criminals make in the "cybercrime market."

What we learned from Anonymous/AntiSec

What we learned from Anonymous/AntiSec

An examination of the evolution from the 2010 and 2011 campaign operations provides some hints about what IT vendors might expect from hacktivists in 2012.

Cyber Warfare: The next Cold War

Cyber Warfare: The next Cold War

By

Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.

Malware Incorporated: Turning your data into their dreams

Malware Incorporated: Turning your data into their dreams

Who is behind the production, distribution and exploitation of malicious software today? Knowing the answer is a vital tool in the fight against cyber crime.

Sponsored Video: John Vigoroux of M86 on security industry issues

John Vigoroux, CEO of security at M86, discusses the challenges facing the IT industry today at this year's RSA Conference 2012.

U.K. MPs bite the cyber bullet...

The Science and Technology Committee seems to be taking malware and cyber crime seriously.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US