Cyber Crime

Cyber Crime | News, how-tos, features, reviews, and videos


template c100.00 03 35 22.still001
video

An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40

Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.

salted hash thumbnail multi final
video

Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.

salted hash thumbnail multi final
video

The risks associated with global Internationalized Domain Names | Salted Hash Ep 36

Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.

salted hash thumbnail final
video

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

template c100.00 06 00 09.still001
video

What an Apple phishing attack looks like | Salted Hash Ep 32

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

adrian sanabria
video

Is it time to kill the pen test? | Salted Hash Ep 22

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping...

salted hash thumbnail final
video

Scammers spoof Office 365, DocuSign and others | Salted Hash Ep 21

As phishing attacks evolve, hackers are using customization and targeted scams to ensnare users. Asaf Cidon, vice president, email security services at Barracuda, talks with host Steve Ragan about the ever-changing cat-and-mouse game...

sequence 01.00 29 58 30.still001
video

Ready for the EU's GDPR compliance deadline? Many companies aren't | Salted Hash Ep 16

CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline.

sequence 01.00 37 12 47.still001
video

The people you call when you've had a breach | Salted Hash Ep 15

Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.

sequence 01.00 10 50 27.still002
video

Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14

Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.

cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

Salted Hash, Steve and Michael
video

What keeps IT administrators up at night? Ransomware, for one | Salted Hash Ep 8

A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.

salted hash title card 0 00 12 20
video

Ransomware marketplaces and the future of malware | Salted Hash Ep 6

Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.

pt 2 image
video

U.S. Cyber Command gains status | Salted Hash Ep 1, Pt 2

Reporters Steve Ragan and Fahmida Rashid discuss the implications of the U.S. Cyber Command's recent elevation in status, putting it on the same level as the military’s other functional combatant commands.

sequence 01.00 00 56 43.still001
video

Kaspersky Lab, U.S. Cyber Command, Hollywood hacking and ransomware | Salted Hash Ep 1

Reporters Steve Ragan and Fahmida Rashid unpack the hottest topics in the security realm: Kaspersky Lab's Russia connection, the new status for the U.S. Cyber Command, Hollywood's hacking woes and ransomware.

cwtt 002 ep2 pt3 img
video

GPS spoofing, jamming and real-world threats | Tech Talk Ep 1, Pt 3

The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.

fivetotry nov20 gameofthrones

Winter is coming. Protect your content kingdom

The struggles that HBO is facing are prime examples of a breach of confidentiality by a trusted user or group who bypassed multiple security controls to leak sensitive intellectual property

04 ddos

Cybercrooks fight over DDoS attack resources

As more groups get into the denial-of-service attack business they're starting to get in each other's way. The good news is that translates into a smaller average attack size

Load More