Cybercrime stories - Page 22
Any use of network connected electronic devices such as computers or smartphones for criminal activity
is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as
‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers
and other malware, the download and use of malware produced by others, social engineering tactics
such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer
systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with
cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also
occasionally seeking to disrupt, embarrass or shame their targets.
'Leaker' behind massive NSA breach possibly still working at agency
Wed, 15th Nov 2017
#
breach prevention
#
cybersecurity
#
nsa
A cybersecurity expert has said it is a 'stunning admission' by the former CIA director about the NSA breach that is being touted as catastrophic.
How North Korea's nuclear aggression masks a deeper threat
Mon, 9th Oct 2017
#
malware
#
ransomware
#
cybersecurity
According to Carbon Black's national security strategist, the rogue nation has been carrying out a stealth campaign that threatens even worse mayhem.
2017 Equifax breach: Impact and lessons learned
Mon, 2nd Oct 2017
#
breach prevention
#
cybersecurity
#
security breaches
Digital Shadows VP, Rick Holland discusses the recent breach, its impact to Equifax and what other organisations can learn from it.
New report details exploits of notorious cyberespionage group with EMEA targets
Mon, 31st Jul 2017
#
malware
#
cybersecurity
#
government
Known as CopyKittens, the group is politically-motivated and has increasingly been active in pursuing foreign espionage on strategic targets.
Arbor Networks digs deep into the Lazarus Group's DDoS attacks
Mon, 19th Jun 2017
#
ddos
#
cybersecurity
#
arbor networks
It is not clear whether the IPs listed in the report were part of a command and control infrastructure or simply bots - or both.