cybercrime


Read this post to find out why your employees might just be today’s biggest threat to healthcare data security. [Read More]
by RSS Susan Biddle  |  Dec 14, 2016  |  Filed in: Industry Trends & News
Malware and hacking services are becoming commoditized. Ransomware as a service has become popular this year. More effective security tools have cybercriminals looking for new tools and techniques to more effectively target victims and bypass security. And malware developers are continually looking for new markets where they can connect and sell their services. In the past, we have discussed the rise of the DarkNet as a cybercrime marketplace. But the reality is that many attackers simply use sites such as eBay, Craigslist, and other well-known... [Read More]
by RSS Aamir Lakhani  |  Nov 07, 2016  |  Filed in: Industry Trends & News
Can mobile carriers afford to put the loyalty of 47 percent of their customers at risk in the wake of a security breach? These are the stakes, according to a Nokia survey of more than 20,000 global customers. Carrier networks are at the forefront of today’s service revolution. With the expansion of cloud-based services and the emergence of the Internet of Things (IoT), carrier service offerings and network traffic are expected to grow exponentially into the future. In addition to the influx of connected devices thanks to IoT, carriers are... [Read More]
by RSS Richard Orgias  |  Sep 01, 2016  |  Filed in: Industry Trends & News
Preventing the loss of critical or sensitive data has been an issue for as long as there has been proprietary information and intellectual property. But recent developments both in regulatory requirements and in the evolution of network infrastructures, including BYOD, virtualization, sophisticated applications, shadow IT, and cloud environments, make it imperative that organizations take a new look at how they control and protect critical data. Most of the time, data loss is unintentional, attributed to employees that unknowingly violate security... [Read More]
by RSS Bill McGee  |  Apr 06, 2016  |  Filed in: Industry Trends & News
Ever since the arrival of advanced persistent threats, obfuscation technologies have existed to help cybercriminals evade security detection and tracing. It’s an ongoing evolution of technology on the bad guys’ end. It really started with antivirus evasion, years ago.  Today, we have about 500,000 virus samples coming into FortiGuard Labs every day. A lot of those are from the same virus family, but they’re polymorphic—which means they use binary packers to shift the nature of the code every few seconds to try and... [Read More]
by RSS Derek Manky  |  Mar 21, 2016  |  Filed in: Industry Trends & News
It was a morning like lots of others...I was headed to the airport for a week in our home office, so I got an early start, checked on the sheep on the way out (yes, sheep), and got on the road. Aside from being ridiculously early, the ride was uneventful until I got to my exit for the Mass Pike. That's I-90 for those of you outside Massachusetts and, when traffic is good (like at 4:30 in the morning), it's the fastest, easiest way to the airport. And the exit was closed. Well darn. I had Google Maps running, not because I didn't know... [Read More]
by RSS Chris Dawson  |  Sep 28, 2015  |  Filed in: Industry Trends & News
(Author's disclaimer: I originally pitched this as a humor piece, but the more I wrote, despite the light-hearted tone, the more serious I realized this is/was/will be.)  In Chapter II of Lewis Carroll's Alice in Wonderland, Alice, having eaten a small cake labeled "Eat Me" but with no other instructions or advisories, finds herself growing so tall that she considers communicating with her feet by mail, using the address:     Alice's Right Foot, Esq.        Hearthrug,    ... [Read More]
by RSS Daniel Dern  |  Sep 24, 2015  |  Filed in: Behind the Firewall
There was an intriguing post over at KrebsOnSecurity last week that involved the site tracking down the Russia-based author of a tool designed to help cyberthieves evade fraud detection systems. (Yes, such tools certainly have legitimate IT purposes, but that's not how this tool was being positioned and sold.) The point of the Krebs piece was how relatively easy it was to find this guy, despite the targeted one doing a decent job of keeping quiet. But there's a much more frightening point for security and IT people in general: Cyberthieves... [Read More]
by RSS Evan Schuman  |  Apr 03, 2015  |  Filed in: Industry Trends & News
[Read More]
by RSS Michael Perna  |  Oct 17, 2014  |  Filed in: Industry Trends & News
Earlier this week, the United States Computer Emergency Readiness Team (US-CERT) released an advisory regarding the GameOver Zeus P2P Malware. Along with that advisory was a national press release from the US Department of Justice and the FBI that announced a multi-national effort against the GameOver Zeus botnet. GameOver Zeus, a.ka. P2P Zeus, is a sophisticated type of malware that is used by cybercriminals to steal infected hosts' banking information, install other malware, and perform DDoS attacks and other cybercrime-related activities.... [Read More]
by RSS Margarette Joven  |  Jun 06, 2014  |  Filed in: Industry Trends & News