Cybercriminals often target those areas of a network that pose the least resistance to get what they're after - usually the personally identifiable information of customers and employees, trade secrets, intellectual property and still other critical data.
Organizations continue to face the ongoing challenges of securing a continually evolving network perimeter. Organized crime has shifted to the digital underworld.
Cyber threat investigators discuss privileged account vulnerabilities found in most serious security breaches.
A California man was sentenced to 18 months in prison for remotely accessing POS machines that he sold to Subway restaurant franchises, and loading up at least $40,000 onto gift cards.
Police nabbed five suspects in a series of raids, all for being suspected of using Remote Access Trojans to compromise computers.
Jacob Mahonri Espinal hacked into his school's computer system to bring his grades up from academic probation status to straight As.
Two telemarketing operations conned thousands of customers by tricking them into buying into tech support services for computer problems that didn't exist.
Nicolae Popescu and Dumitru Daniel Bosogioiu are wanted for organizing an international crime scheme that led to millions of lost dollars.
Israeli police arrested eight former Leumi employees in a scheme to extort millions of shekels.
Cameron Harrison, 28, posessed more than 260 compromised credit and debit card numbers at the time of his arrest and is one of 55 people facing charges pertaining to their association with "Carder.su."
Arturas Samoilovas allegedly illegally accessed the computer network of Eaton Corporation and installed malware after he was denied a position at the company.
The anonymity software's moderators aren't entirely sure how up to 50 illicit websites were discovered and shut down this past week.
One-time passwords (OTPs) sent via SMS are increasingly the target of Android malware, the report by Javelin revealed.
A college student showing off his technical prowess hacked into websites of malls, hospitals and universities.
Seventeen suspected members of online marketplaces, including Silk Road 2.0's alleged operator, have been arrested.
After months of looking for him, Baden was nabbed in Tijuana when tips began coming in about his whereabouts.
Fredrik Neij was arrested at the Thai-Laos border earlier this week on copyright violation charges.
Vladimir Drinkman, who was charged for his involvement in the Heartland breach, is currently in the Netherlands.
Scott Walton served as a lead member of the SnappzMarket Group, which conspired to illegally reproduce and distribute more than one million copyrighted Android apps.
Industry experts debate whether organizations should or should not pay a cyber ransom to miscreants.
Tracking down threat actors is no easy feat, and requires an immense amount of research and collaboration.
Researchers at Trend Micro found that attackers were targeting Simple Mail Transfer Protocol (SMTP) servers to execute malicious code and an IRC bot.
Gottfrid Svartholm Warg was found guilty of hacking an IT service provider in Denmark. This is his second court case for illegally accessing data.
Christian Lacroix, who famously hacked Paris Hilton's phone and Burger King's Twitter account was sentenced for breaking into Bristol Community College computers.
An Estonian man, Sergei Tsurikov, was sentenced Friday after helping to steal over $9.4 million from payment processor RBS WorldPay in 2008.
Nicholas Rotundo was taken into custody by federal agents for blackmailing a female college student by threatening to post her nude images on a revenge porn website.
A federal court shut down Pairsys at the request of the Federal Trade Commission.
Aleksi Kolarov was a vendor on Shadowcrew.com, an online cybercrime marketplace that sold stolen credit and bank cards and caused millions of dollars in damages.
Speaking at a National Association of State Attorneys General conference, ISA's Larry Clinton asked the AGs to step up efforts to get more resources.
Kristin Nyunt of Monterey, Calif., is charged with two counts of illegal wiretapping and possession of illegal interception devices and faces a sentence of up to five years in prison.
Sign up to our newsletters
SC Magazine Articles
- APT operation 'Double Tap' exploits serious Windows OLE bug
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- The Internet of Things (IoT) will fail if security has no context
- Regin: nation-state possibly behind the stealthy modular spying malware
- Operators disable firewall features to increase network performance, survey finds
- DDoS attacks cost organizations $40,000 per hour, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Study: 'High priority' issues hamper endpoint security solution implementation
- Researchers identify POS malware targeting ticket machines, electronic kiosks
- Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor
- DDoS attacks grew in size, threats became more complex, Q3 reports say
- Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards