New Report: Top 5 Reasons to Choose User-Friendly Strong Authentication
Welcome Guest | Sign In
TechNewsWorld.com
Feds' Photobucket Strategy Could Hobble White Hats
June 2, 2015
There's a new twist in the way feds are seeking to penalize bad actors for making and distributing software used in crimes, suggest recent arrests by Justice Department and FBI officials. "There's a more concerted campaign to go after go after those folks who are distributing in the underground," said Tom Kellermann, chief cybersecurity officer at Trend Micro.
No Wrongdoing at NCIS, Says Defense Watchdog
May 28, 2015
The U.S. Department of Defense's Inspector General has rejected allegations that the Naval Criminal Investigative Service engaged in questionable domestic intelligence activity. The finding concluded a DoD IG probe spurred by allegations that NCIS was making available to military intelligence agencies its Law Enforcement Information Exchange, a database of 506.3 million law enforcement records.
Containing the Zombie Malware Outbreak
May 22, 2015
Your computer could be operating as part of a botnet, sending out email spam, stealing confidential information, or furthering the spread of malware at this very moment. Computers can become zombies in many ways, but the most common technique is through a Trojan virus installed via malicious email attachments or drive-by downloads from infected websites.
DoJ Calls On Private Sector to Strengthen Cybersecurity
May 20, 2015
The Justice Department is stepping up its program to engage more actively with the private sector on dealing with cybercrime and cybersecurity breaches. "We in government know that we cannot go it alone in fighting cybercrime. We need a strong partnership with you in the private sector," Assistant Attorney General Leslie Caldwell said at a recent Cybersecurity Industry Roundtable.
FireEye, Microsoft Outsmart Clever Chinese Malware
May 15, 2015
FireEye and Microsoft have scotched a scheme by a group of cybercriminals based in China to use an IT pro forum to hide malicious activity, according to a report released Thursday. The Chinese gang known as "APT17" devised the scheme, which uses forum pages and profiles on Microsoft's TechNet, to cover traffic from machines infected with the group's Black Coffee malware.
Report: Top Endpoint Security Packages Perfectly Foil Drive-By Attacks
May 5, 2015
Drive-by attacks on the Internet are a particularly pernicious form of online threat, especially for individual Web surfers. On the corporate level, though, a company with good endpoint protection software can foil the malicious practice. A drive-by occurs when an infected website automatically downloads malware onto a Net traveler's computer. Endpoint solutions can thwart those kinds of attacks.
Other Shoe Drops in White House Security Breach
April 28, 2015
Last year's breach of unclassified White House computer systems reportedly was far more intrusive than initially thought and included the theft of some presidential correspondence. No classified systems were compromised, including the servers that control message traffic from the president's BlackBerry. However, much of the information the unclassified servers handle is considered sensitive.
Breach Outbreaks Fuel Encryption Adoption
April 22, 2015
As data breaches make headlines around the world, more companies are turning to encryption to protect their information jewels. That is one of the findings in a study released Monday, conducted by the Ponemon Institute and sponsored by Thales E-Security. "Mega breaches and cyber attacks have increased companies' urgency to improve their security posture," says the report.
Your Lawyer Is Vulnerable to Cyberattacks
April 20, 2015
Lawyers help their clients as they negotiate confidential business transactions, hold intellectual property, manage funds and litigate disputes, among many other business activities. In the ordinary course of business, lawyers also maintain numerous confidential documents and data of and about their clients. Lawyers therefore have a big bull's-eye drawn on their backs, visible to cybercriminals.
Ransomware Perps Put the Squeeze on Police
April 14, 2015
Five police departments in Maine, whose networks are linked together so they can share files, recently deposited bitcoins worth 300 euros into a Swiss bank account as ransom for their records. The departments' management system was locked down by ransomware that scrambled their data and rendered it unusable. The police decided to pay up after their experts failed to crack the ransomware code.
Obama Draws Cyber Line in Sand
April 2, 2015
President Barack Obama on Wednesday signed an executive order that gives the Secretary of Treasury the authority to impose sanctions on entities found responsible for or complicit in carrying out a cyberattack harmful to U.S. interests. The Secretary of Treasury will have to consult with the Secretary of State and the Attorney General before enacting the powers granted under the order.
Proposed Amendments to US Cybersecurity Laws Under Scrutiny
March 31, 2015
The White House in January proposed updates to the Computer Fraud and Abuse Act that have stirred controversy within the cybersecurity industry. "If the proposed legislation were to be enacted, it would certainly have a chilling effect on cybersecurity research," said Chris Doggett, managing director at Kaspersky Lab North America.
Compliance Mindset Can Lead to Epic Security Fail
March 30, 2015
The recent data breach at Premera Blue Cross -- in which the personal information of some 11 million customers was compromised -- raises questions about how effective government regulators are at ensuring that healthcare providers adequately protect their patients' data. There have been abundant warnings that compliance with government regulations alone would not be adequate.
CAPTCHAs May Do More Harm Than Good
March 26, 2015
If an annoyance contest were held between passwords and CAPTCHAs, passwords would probably win, but not by much. CAPTCHA -- Completely Automated Public Turing Test To Tell Computers and Humans Apart -- was created to foil bots attempting to mass-create accounts at websites. Once created, those accounts could be exploited by online lowlifes for malicious ends, such as spewing spam.
How Secure Is the Apple Watch?
March 19, 2015
Apple typically has impeccable timing for its new product introductions, but that may not be the case with its new smartwatch. In a gala event last week, the company announced model and pricing details -- but that came just six days after questions were raised about the security of Apple Pay. Those questions haven't gone away, and now they're also being asked about the Apple Watch.
Windows Caught in Path of FREAK Security Storm
March 6, 2015
Microsoft on Thursday issued a security advisory acknowledging a vulnerability in all versions of Windows that could allow FREAK exploits. Windows systems previously were thought to be immune to FREAK attacks. "The vulnerability could allow an attacker to force the downgrading of the cipher suites used in an SSL/TLS connection on a Windows client system," the advisory reads.
Bracing for the Cyberthreat Deluge
March 6, 2015
Almost 17,000 malware alerts surface every week, the Ponemon Institute recently found. Only 4 percent of alerts were investigated, and traditional antivirus products missed nearly 70 percent of malware in the first hour, researchers discovered in a recent Damballa study. Rescanning led to identification of 66 percent of the malware in 24 hours and 72 percent after seven days.
Apple Pay Cybercrime Burns Banks
March 4, 2015
Identity thieves are using Apple Pay to defraud banks of what could amount to millions of dollars. Due to weak authentication procedures at the institutions issuing the cards, fraudsters are able to use stolen cards to make purchases through Apple Pay. Before cards can be added to Apple Pay, they must be approved by the card issuer. Criminals are finding that process easy to game.
Malicious Emailers Find Healthcare Firms Juicy Prey
February 26, 2015
Healthcare providers have garnered growing interest from hackers in recent months. More evidence of that trend appeared last week in a report on email trust. An email that appeared to come from a healthcare company was four times more likely to be fraudulent than an email purportedly from a social media company like Facebook, one of the largest creators of email on the Internet, Agari found.
FTC, Private Sector Lock Horns Over Consumer Data Protection
February 25, 2015
The major headline hacking event of 2014 involved data theft at a highly visible enterprise: Sony Pictures. Perhaps just as significant in e-commerce security was a 2014 federal court ruling which allows the FTC to continue penalizing commercial firms for failure to protect consumer data from hackers. That decision has been challenged, and in early March the FTC and its opponent will square off in court.
Google Rails Against Proposal to Give Feds Remote Hacking Authority
February 20, 2015
Google is fighting a proposed amendment to Rule 41 of the U.S. Criminal Code that might allow authorities to hack into computers abroad. The amendment seeks to empower a magistrate in a district where activities related to a crime may have occurred to issue a warrant for remote search of computers, as well as seizure or copying of their files, under certain circumstances.
Cyberthieves Bag a Billion in Snail-Speed Bank Heists
February 18, 2015
Criminals using Carbanak malware have stolen up to $1 billion from 100 financial institutions in Russia, China, Germany and the United States, Kaspersky Lab has revealed. The gang is expanding operations to other countries. Kaspersky has advised financial institutions to scan their networks for intrusion by Carbanak. "These are advanced threat actors," said Lancope CTO TK Keanini.
It's Time to Investigate Cyber Insurance
February 17, 2015
Almost every day there are reports of cyberintrusions, attacks and related security breaches. If your company does not have the right insurance, it could be even more of a disaster. What company can afford not to have insurance for a potential cyberdisaster? Let's look at some protective measures that can be taken to safeguard your business.
Facebook Launches ThreatExchange to Stymie Cybercrime
February 13, 2015
"Threat researchers do already share this data manually," Jeremy Demar, director of threat research at Damballa, told TechNewsWorld. "The value in systems like this isn't the ability to share raw intelligence [it's the] structured data that allows for the information to be accessed quickly and easily by the users." ThreatExchange is based on Facebook's ThreatData threat analysis framework.

See More Articles in Cybercrime Section >>
Facebook Twitter LinkedIn Google+ RSS
The publication of Ashley Madison members' information online...
Is fine with me -- they're cheaters who got what they deserved.
Is a vicious crime, and the hackers should be caught and punished.
Is a frightening sign of the times -- no one and nothing is safe online.
Has nothing to do with me, and I couldn't care less.