Please turn on your JavaScript for this page to function normally.
abstract
Rudimentary attacks pose the greatest risk to midsized organizations

Rudimentary attacks, such as intrusion attempts, information gathering, and policy violations pose the greatest risk to midsized organizations, according to eSentire. Attacks …

hand
What motivates youngsters to get into cybercrime?

A UK National Crime Agency report, which is based on debriefs with offenders and those on the fringes of criminality, explores why young people assessed as unlikely to commit …

healthcare
Cyber criminals targeting healthcare orgs’ FTP servers

FBI’s Cyber Division has sent out another notification to healthcare organizations, alerting them to the danger of cyber criminals using their FTP servers for various …

Cyber espionage topping the list of largest security concerns

20 percent of global organizations rank cyber espionage as the most serious threat to their business, with 26 percent struggling to keep up with the rapidly evolving threat …

fish phishing
Clever spear-phishing emails hit employees involved in SEC filings

FireEye has flagged a sophisticated spear-phishing campaign hitting US-based businesses with emails purportedly coming from the US Securities and Exchange Commission (SEC). …

MySQL
Cyber extortionists hold MySQL databases for ransom

Ransomware has become cyber crooks’ favorite attack methodology for hitting businesses, but not all cyber extortion attempts are effected with this particular type of …

Deutsche Telekom
Suspected Deutsche Telekom router hacker arrested

A 29-year-old British national, believed to be the mastermind behind last November’s unsuccessful hijacking attempt of Deutsche Telekom users’ routers, was …

ransomware
Russian-speaking cybercriminals created over 75% of all crypto ransomware

According to the Kaspersky Lab’s telemetry, in 2016 more than 1,445,000 users (including businesses) around the globe were attacked by 54 thousand modifications of 60+ …

data
Metadata: The secret data trail

Every phone call, text message, even activated cell phones, leaves a trail of data across a network. In many cases this data is aggregated with other data and metadata …

Nigeria
Nigerian scammers: Then and now

The image that the expression “Nigerian scammer” conjures up in most people’s heads is still that of the confidence man behind the keyboard, convincing …

arrows
Hackers changing tactics, techniques and procedures

Organizations need to conduct better penetration testing to combat continual changes in hackers’ tactics, techniques and procedures (TTPs), according to NTT Security. “Our Q3 …

deep web
How cybercriminals attack homes, and how to stop them

At a recent Home Hacker Lab event, an ethical hacker revealed how cybercriminals attack, and what consumers can do to protect themselves. The October 13 workshop in New York …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools