Cyber Crime

Cyber Crime news, information, and how-to advice

lawsuit judge law court decision sued gavel
spam email

security camera safety equipment alarm wall mounted surveillance camera 000000156723

Surveillance cameras most dangerous IoT devices in enterprise

Networked security cameras are the most likely to have vulnerabilities, according to a new report

Yahoo

Yahoo investigating if insiders knew of hack

Yahoo said in a filing it was possible that its acquisition by Verizon could be terminated or renegotiated

wallet cash credit card pocket money

No, you still don't need an RFID-blocking wallet

Criminals with RFID scanners roaming the streets stealing credit card numbers should be way down your list of worries

email thinkstock

How Clinton could have avoided the Wikileaks fiasco

Hillary Clinton's email server and her advisers' email accounts are no more or less vulnerable than most, but securing them would have been easy

blockchain bitcoin

Why blockchain’s growing pains will be worth it

Experts say blockchain has a bright future, much like the optimistic predictions the industry had for the cloud 10 years ago

ddos

Friday's IoT-based DDoS attack has security experts worried

The cybersecurity attack that relied on IoT connected devices was serious, unusual, and historic

security alert shield protect

The only realistic plan to avoid DDoS disaster

Emergencies like the Dyn DDoS attack will keep occurring. The only solution is a better, more secure internet

What I learning playing prey to Windows scammers

Younger users more likely to fall for tech support con jobs

Two-thirds of those polled in 12 countries say they have encountered the scam

hacker, DDOS, IoT, SkilledAnalysts

Which country has the best hackers: Russia or China?

Both are notorious for high-profile attacks, advanced persistent threats, and theft of money or intellectual property. And the award goes to ...

hacker

Enterprises outsmarting themselves with security, while attackers easily use common techniques

Attackers use common techniques to steal data while companies focus too much on sophisticated attacks

iot security

Leaky IoT devices help hackers attack e-commerce sites

Akamai first noticed a big spike in attacks that used credentials from breaches such as the recent Yahoo hack, and traced them to badly configured IoT devices

voter registration application

Hacking an election is about influence and disruption, not voting machines

Election systems have problems, sure, but voters are the larger, softer target

hacking elections

Q&A: The myths and realities of hacking an election

We explore the myths and realities of hacking an election, by speaking with a number of security experts

looking ahead spying

Data leaks evolving into weapons of business destruction

Increasingly, attackers are using data leaks to target the companies themselves, going after proprietary or embarrassing information and releasing it in such a way as to do the most harm.

slack icon

Security for your collaborative software

Collaborative apps like Slack and Convo are like a sieve, but no one quite knows what to do about it

password security reset questions

A quick fix for stupid password reset questions

This ridiculous feature is a major vulnerability. If you're forced to use it, here's how to make it more secure

Chip and

Trump hotel chain fined over data breaches

The chain, one of Donald Trump’s businesses, also delayed in reporting the breaches to consumers

yahoo mail

Hackers have a treasure trove of data with the Yahoo breach

The data breach affects at least half a billion Yahoo accounts

Load More