Cyber Crime

Cyber Crime news, information, and how-to advice

xmas malware
identity theft thief artificial stealing white collar crime 000000706819

anonymous mask

How Anonymous really targets ISIS

With the ISIS attacks on Paris, Anonymous declared war on ISIS. The reality is that is more hype than fact, and misleading


How GhostSec takes on ISIS

In September, Ira Winkler and Araceli Treu Gomes interviewd WauchulaGhost, spokesperson for, about the group's efforts in taking down ISIS accounts and websites. The full 30-minute interview is presented here.

malware bug virus security magnifying glass detection

Serious bug in widely used Java app library patched

The CSRF-style bug in Java Spring Social core library affected websites that allowed users to log in with credentials from LinkedIn, Twitter, GitHub, and Facebook, among others

ted koppel

Ted Koppel discusses the inevitable cyberattack on U.S. infrastructure

Author of 'Lights Out' speaks about the risks of a catastrophic cyber attack on U.S. infrastructure, and how government has no apparent plan to deal with the results

ransom note

Facing cyber blackmail? Don't pay a king's ransom

The growing scourges of ransomware and DDoS threats scare many victims into paying up. The only way to stop the madness is to refuse to succumb when possible


Cyber criminals turn to video ads to plant malware

The complex code behind video ads makes it harder to detect malware

nyc power plant

Are vendors on the wrong path where smart plant security is concerned?

Cyber criminals can't wait for enterprises to mainly apply access controls and encryption as their toughest solution for securing smart plants

mabouia mac ransomware

Ransomware for Mac is nothing to worry about -- for now

Writing ransomware is easy, but getting it installed on Macs would be harder


Irari Report: ISIS using U.S. hosting services to avoid intelligence agencies

In the first segment of The Irari Report interview with WauchulaGhost, leader of the hacktivist group GhostSec, which has been taking down ISIS operations and actually credited with stopping terrorist attacks, Ira Winkler and Araceli...

151027 cisa vote copy

CISA sails through Senate despite tech companies' opposition

Corporate America largely supported the information-sharing bill and the immunity from liability it offers


Meet the man-in-the-middle of your next security crisis

That pesky, stealthy man-in-the-middle shows up everywhere from the cloud to SSL. You could be at a disadvantage if you don’t know where he’ll strike next

fbi seal

The FBI isn't wrong; sometimes you will have to pay the ransom

It might make you feel dirty, but paying could be the best bet in some situations

obama and xi

China reportedly tries to hack U.S. businesses the day after agreeing not to

Security firm CrowdStrike says Chinese hacker tried to breach seven tech and pharma companies


Sale! Your personal info, cheap

From login credentials to whole identities, almost any info can be found at a discount in the cyber crime marketplace

blocked shot volleyball

Survey says enterprises are stepping up their security game

To fight threats, enterprises are increasing information security spending, collaborating on threat intelligence efforts, and turning to cyber security insurance policies

Average business spends $15 million battling cyber crime

The cost was up 20 percent compared to last year, as attacks are happening more frequently and are becoming more severe

15 10cwdsecurity

5 tips for better enterprise security

Do your security policies and procedures actually promote better security, or is your company only looking for known malware and ignoring the human factor?

Security online

Scottrade had no idea about data breach until the feds showed up

The breach affected around 4.6 million customers' names and addresses

Load More