One year after the cybercrime underground slashed the price of a stolen identity by as much as 37 percent due to a glut in the black market, the price tag for a pilfered ID has inched upward again.
Network security would be relatively simple if it weren't for end users. But just when IT...
It’s getting a lot harder to be impressed by the latest piece of malware or cyber threat...
Area 1 Security, a security startup created by three ex-NSA agents and pros from Disney...
A new REMnux project initiative provides Docker images of Linux applications useful for malware analysis, with the goal of making it easier for investigators start using malware forensics tools that otherwise might be awkward to set up.
Two new surveys show how easy enterprises make it for attackers to steal vast quantities of data with just a few successful breaches of employee machines: Employees typically are given far more access to sensitive data than they need to get their jobs done, and enterprises don't do enough to track access behavior.
When a retailer’s credit card systems get breached by hackers, banks usually can tell which merchant got hacked soon after those card accounts become available for purchase at underground cybercrime shops.
Everyone has the right to privacy, said Troels Oerting, head of the Europol’s European Cybercrime Center (EC3), at Georgetown Law’s Cybercrime2020 conference. However, he went on, if you break your contract with society, that right can be taken away.
A new report from the U.S. Treasury Department found that a majority of bank account takeovers by cyber thieves over the past decade might have been thwarted had affected institutions known to look for and block transactions coming through Tor, a global communications network that helps users maintain anonymity by obfuscating their true location online.
Phones from low-cost, third-tier vendors in Asia and Africa have been affected, but that doesn't mean it can't happen here.
Paul Kocher, one of the country’s leading cryptographers, says he thinks the explanation for the world’s dismal state of digital security may lie in two charts.
The field of incident response, forensics, and malware analysis is full of thrilling hunts and exciting investigations where you have an opportunity to aggressively pursue the activities of adversaries. While technical acumen certainly supports these efforts, a truly successful execution requires both a well-crafted process and detailed documentation of the journey through that process.
Abuse of privileged accounts has been understood for a long time to be a major security concern, since it opens up broad access to an organization’s data and IT resources. Up to now, however, the focus has mainly been on how this applies to the so-called insider threat.
Underground cybercrime shops that sell credit and debit card accounts stolen from retailers are slashing prices and promoting their own Black Friday and Cyber Monday sales as fraudsters gear up for the busy holiday shopping season.
We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal, and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.
Yes, I understand why passwords are universally despised: the strains they put on our memory, the endless demand to update them, their sheer number. I hate them, too. But there is more to passwords than their annoyance. In our authorship of them, in the fact that we construct them so that we (and only we) will remember them, they take on secret lives.
A study of published intelligence on three major malware families used in Russia's cyberespionage operations shows a highly coordinated, targeted, and stealthy strategy.
We live in a world today where individuals’ movements and locations are being recorded in many different ways. These movements and locations are commonly being used as evidence in civil, criminal and domestic litigation. It is of paramount importance that anyone who is involved in litigation that uses cellular location evidence understands the appropriate and inappropriate use of this type of location data.
ISIS members have proven exceptionally difficult to track due a proper use of technology tools, like application for encryption, social media platforms and encrypted instant messaging platforms. Recently the media announced that ISIS has released a manual for its militants, titled “How to Tweet Safely Without Giving out Your Location to NSA," that explain how avoid surveillance.