In order to cause disruption within the stolen data markets of the dark web, its organizational structure must be analyzed, according to one expert at DefCon 22 in Las Vegas.
In a speech to Parliament, Queen Elizabeth said the country would pursue legislation to strengthen penalties for cyber crime.
The Chinese government says it will scrutinize both foreign and domestic offerings and ban vendors that don't pass muster.
As we start 2013 off, I'm pretty sure that information security leaders everywhere are glad to hear all those predictions about their budgets getting a boost this year (and that the Mayans were wrong).
Cyber criminals are always looking for ways to fill their pockets, but SMBs seem to be a prime target.
Authorities believe Raynaldo Rivera joined previously accused Cody Kretsinger in compromising SonyPictures.com to steal personal information on about a million people.
HIPAA violations are becoming more common around the nation. To find the source of the problem you have to "follow the money."
Industrialization is a key factor driving the rate at which criminals are turning to malicious software to make serious money.
Yahoo presumably took no measures to ensure sensitive stuff like customer account credentials were kept safe and sound.
The Anti-Phishing Working Group tells us that phishing is alive and well, but another report suggests that spear-phishing is even healthier - for the criminals, at least.
An individual has no intrinsic, inalienable right to leave his own system unprotected if by doing so he puts others at risk.
The FTC has made major moves this year in its fight against cyber crime, and if enterprises and organizations aren't careful, they may be facing a team of the agency's investigators.
A jury in New Jersey has found a Georgia man guilty for his role in a fraud ring that cost financial companies some $1.5 million.
The FBI's cyber division has a new assistant director, Joseph Demarest, who formerly served as assistant director for international operations.
There's no reason to rely on the U.S. government to create new regulations to help businesses protect their data. Instead, individual organizations must initiate a change from within, and that starts with connecting IT to the bottom line.
With the London Olympics set to kick off in July, U.S. security officials are warning about the event being a target for cyber criminals.
One of the masterminds behind the infamous "Operation Phish Phry" was sentenced by a district judge to five years in prison for her part in the international ring.
Information security experts often talk about the costs of cybercrime to businesses, but a new report from Russia quantifies how much criminals make in the "cybercrime market."
An examination of the evolution from the 2010 and 2011 campaign operations provides some hints about what IT vendors might expect from hacktivists in 2012.
Debate: Identifying the culprits behind Koobface will diminish the gang's activity.
Network monitoring solutions for the enterprise should be holistically integrated with the complete security suite...
Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.
Who is behind the production, distribution and exploitation of malicious software today? Knowing the answer is a vital tool in the fight against cyber crime.
John Vigoroux, CEO of security at M86, discusses the challenges facing the IT industry today at this year's RSA Conference 2012.
The threat posed by politically motivated attackers, known as hacker activists, or hacktivists, is far-reaching, yet authorities are finding it difficult to take down a structurally decentralized movement.
The Science and Technology Committee seems to be taking malware and cyber crime seriously.