Cyber Crime

Cyber Crime | News, how-tos, features, reviews, and videos

digital money - binary code

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.

framework metal

What is Mitre's ATT&CK framework? What red teams need to know

The ATT&CK framework allows security researchers and red teams to better understand hacker threats.

ddos attack

Another massive DDoS internet blackout could be coming your way

A massive internet blackout similar to the Dyn DNS outage in 2016 could easily happen again, despite relatively low-cost countermeasures, according to a new study out of Harvard University.

03 cryptography

Why aren't we using SHA-3?

The Secure Hash Algorithm version 3 fixes flaws in the now-standard SHA-2 cipher. Here's how to prepare for a migration to SHA-3 when SHA-2 is inevitably compromised.

nup 177120 0001

Security lessons from the 2018 Pyeongchang Winter Olympics

Shiny buttons that go "ping!" considered harmful.

online dating scams hacker beautiful woman

How to prove and fight online dating and romance scams

Friends and family of romance scam victims sometimes call on security pros to prove their online loves are not who they claim to be. Here's how to handle the case the right way.

pile of credit cards financial tech

Using better data to fight credit card fraud

Galileo Processing uses artificial intelligence to more accurately identify fraudulent credit card transactions. It's an example of how AI can be a powerful security technology.

cyber attack virus meltdown

How bad are Meltdown and Spectre?

Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments.

cyber security

What is cyber security? How to build a cyber security strategy

Organizations face many threats to their information systems and data. Understanding all the basic elements to cyber security is the first step to meeting those threats.

wallet cash credit card pocket money belt

The truth about RFID credit card fraud

Despite demonstrations to show it's possible, documented cases of RFID credit card fraud are unknown. And as security professionals know, there is a huge gulf between potential crime and actual crime.

blockchain ecosystem

Hacking bitcoin and blockchain

Both bitcoin and blockchain are vulnerable to attack. Here's what you need to know to protect yourself and why blockchain is becoming a foundational technology.

10 phishing

Why you should fear phishing more than data breaches

A recent study from Google and UC Berkeley examined the various ways accounts are compromised, and determined that phishing attacks – not data breaches – pose the most risk to users when it comes to lost access.

05 malware

Famous malware threats: Where are they now?

The headlines may be dominated by news of NotPeyta and Wannacry, but watch out for the ‘golden oldie’ malware like Conficker and Zeus. They are still dangerous.

phishing threat

Types of phishing attacks and how to identify them

Phishing comes in many forms, from spear phishing, whaling and business-email compromise to clone phishing, vishing and snowshoeing. Here's how to recognize each type of phishing attack.

Locky Ransomware infects a Windows 10 computer

Inside the thriving ransomware market

Researchers at Carbon Black examined the Ransomware market and discovered some interesting facts about the booming criminal economy. Mirroring some of the legal technology markets, such as those for software development, the market...

clicks pageviews traffic denial of service ddos attack 100613842 orig

Unlimited DDoS protection the new norm after Cloudflare announcement

With Cloudflare ending surge pricing for DDoS protection services, all website owners are protected equally and potential attack damage is limited.

10 threat landscape apocalypse ruins

How to survive the worsening cyber threat landscape

Industry and government cybersecurity experts offer advice for protecting business assets and reputation in an increasingly dangerous cyber threat landscape.

Future cyber security threats and challenges: Are you ready for what's coming?

Among the the alarming trends highlighted in a new study from The Internet Society (ISOC) are the rise of state-sponsored cyber attacks as the internet is becoming increasingly intertwined with national security and the creation of...

2 token authentication locks

What is the biggest threat from the Equifax breach? Account takeovers

Cyber criminals have the most to gain by taking ownership of bank, brokerage and retirement accounts using people’s PII. Are traditional authentication systems obsolete?

idg cybercrime slide1

The current state of cybercrime

CSO’s 2017 U.S. State of Cybercrime report reveals what IT and security pros fear, how they protect their data, what worked, and what they spend on cyber security.

Load More