Cyber Crime

Cyber Crime news, information, and how-to advice

The Forbidden City in Beijing

Average successful hack nets less than $15,000

Survey of cyber attackers shows the majority are motivated by money, but they make a quarter of what a cyber security professional makes

space invader

27% of all malware variants in history were created in 2015

Last year was a record year for malware, with more than 84 million new malware samples collected over the course of 2015

hospital records

Over 113 million health records breached in 2015 -- up 10-fold from 2014

One out of every three Americans was affected by a healthcare record breach last year

power grid electrical

How much at risk is the U.S. critical infrastructure?

The U.S. intelligence community is well aware that hostile hackers have gained access to portions of the nation’s critical infrastructure. But the debate about how big a threat it is rages on

credit card wallet

Why you don't need an RFID-blocking wallet

You don't need a tinfoil hat, either. Opportunists have exploited consumer fears to create an industry that doesn't need to exist

Flying red retro telephones on green background

Train your users to beat phone scams

'Press 1 to hand us the family jewels' works more often than you might think. A little training can stop this sort of social engineering


Cyber criminals abusing free Let's Encrypt certificates

Trend Micro researchers have identified a malvertising campaign targeting sites that use free Let's Encrypt certificates

russian hackers

Microsoft mirrors rivals, pledges to warn customers of state-backed hacks

Microsoft failed to alert more than a thousand Hotmail users as long ago as 2009, former employees claim

08 prediction

Top 15 security predictions for 2016

Cyber security experts and analysts weigh in on what the new year will bring in the world of evolving threats and solutions


Hyatt Hotels says payment-processing systems hit by malware

The company has asked customers to review their payment card account statements

security 2016 2

How computer security changed in 2015

We made progress, suffered setbacks, added complexity, and did little to deter the onslaught of cyber crime

machine learning

Machine learning: Cyber security dream-come-true or pipe dream?

Machine learning has demonstrated enormous value in enhancing search engines or spotting patterns, but the debate continues about its value in cyber security

quarter population breach

Data breaches will affect 1.5 billion people by 2020

Watch IDC's free FutureScape webcast for more security predictions and their impact on your business


Challenging the liability of bad end users in cybersecurity

In Part 3 of our three-part interview with Alejandro N. Mayorkas from the Department of Homeland Security, CSO Contributing Writer Ira Winkler discuss regulation in cybersecurity and liability issues of end users.


US cyber criminal underground a shopping free-for-all

The North American cyber criminal underground isn't buried as deep as in other geographies, according to a new report by Trend Micro


US, China cybersecurity hotline offers no guarantees

Speaking at the New England Cybercrime Conference the nation's top lawyer for national security also addressed the threat of cyber terrorists. He doesn't think they have advanced cyber weapons because if they did they would have used...

victim identity theft computer problem

Widespread exploit kit, password stealer, and ransomware program make dangerous cocktail

Cyber crime group combines Pony, Angler, and CryptoWall 4.0 in a single campaign

Apple brings down apps, mainly Chinese ones, with malware

Microsoft teams with law enforcement to disrupt Dorkbot botnet

The 4-year-old botnet called Dorkbot steals login credentials for many online services and has infected 1 million computers worldwide

Load More