Cyber Crime

Cyber Crime news, information, and how-to advice

Digital Key, security, encryption
1 linkedin

computer data security keyboard hands programming developer

Defend yourself! Build a cyber security database

Attackers have all kinds of data about the threat landscape -- and about your organization, if it happens to be a target. Now's the time to arm yourself with data, too

Digital Key, security, encryption

Security researchers crack new version of CryptXXX ransomware

An updated decryptor tool can help users recover files affected by the CryptXXX ransomware program

the interview 100537443 large

Malware attacks on two banks have links with 2014 Sony Pictures hack

Security researchers have found a long chain of coding coincidences linking ​attempted fraud over the SWIFT network​ to the 2014 Sony Pictures hack

hardware security embedded circuit board integrated controller

SWIFT warns of malware attack on another of its customers

Funds transfer network SWIFT has warned banks to be on the alert for attempts to replicate an attack that tried to net $1 billion from Bangladesh Bank

video

Security Sessions: Unique security challenges for healthcare IT

In the latest episode of CSO's Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Ellen Derrico from RES to discuss some of the unique security challenges that healthcare IT have to overcome. Topics include...

ibm watson cybersecurity training

IBM's Watson is going to cybersecurity school

The result will be a cloud service called Watson for Cyber Security that's designed to provide insights into emerging threats as well as recommendations on how to stop them

video

Why ransomware works so well

At Interop 2016, Network World chats with John Pironti, president of IP Architects, about why ransomware is on the rise, and why many consumers and businesses are paying the ransom.

video

Early warning signs of a DDoS attack

At Interop 2016, Avi Freedman, CEO of Kentik, chats with Network World about why Distributed Denial of Service (DDoS) attacks are still popular with hackers, why they still work, and some of the signs that an attack may soon commence....

video

Methods hackers use to attack DNS

At 2016 Interop, Cloudmark Engineering Director Angela Knox talks with Network World about several different ways that hackers go after DNS as part of other malicious attacks. Knox explains the methods for DNS ID hacking, spoofing,...

terrorist tools

Trend Micro: 6 most popular homebrewed terrorist tools

Terrorist are developing apps that include pre-packaged encryption, DDoS, and a news feed for tech-light jihadists

ransom note letters

How to tell if you've been hit by fake ransomware

Ransomware is no joke, but sometimes, amateur attackers use 'pretend' ransomware -- and you can get your data back easily

ransomware

Got ransomware? These tools may help

Ransomware on your system and no backups? Ouch. Check out publicly available decryptor tools and see if they can save you

spying eye cyberespionage surveillance

Cyberespionage group abuses Windows hotpatching mechanism to hide malware

The Platinum cyberespionage group has been leveraging a Windows feature known as hotpatching to inject malicious code into running processes

breach title

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report had bad news on multiple fronts

security code big data cyberespionage DDoS

Empty DDoS threats earn extortion group over $100,000

There's no evidence that companies that declined to pay extortion fees to the Armada Collective were attacked, researchers say

151027 facebook headquarters 1

Facebook bug hunter stumbles on backdoor left by hackers

The backdoor script stole Facebook employee credentials from a corporate server

spying eye cyberespionage surveillance

Hacker: This is how I broke into Hacking Team

Account of the breach of surveillance vendor Hacking Team highlights lessons for all companies

jigsaw ransomware logo

Jigsaw crypto-ransomware deletes more files the longer you delay paying

Malware researchers have released a tool that can decrypt files affected by the new threat

Load More