Please turn on your JavaScript for this page to function normally.
One in ten consumers lost money to online fraud

More than one in ten consumers globally have been victims of online fraud that cost them money, according to a recent F-Secure survey which fleshed out consumer concerns about …

Medical identity theft affects 1.84 million U.S. victims

Medical identity theft is a national healthcare issue with life-threatening and hefty financial consequences. According to the 2013 Survey on Medical Identity Theft conducted …

Timing is an influential risk-factor for cyber attacks

There are several dates throughout the year that are notorious for wreaking havoc on businesses via DDoS attacks, data breaches and even malware or botnet assaults. According …

Placing the Suspect Behind the Keyboard

There are many books addressing the subject of computer forensics out there, but this tome is one of the rare ones that approaches cybercrime investigations in a holistic …

Most security managers don’t trust their apps

Application vulnerabilities are a major factor in the cybercrime game. More than 500 CISOs and Security managers have been interviewed by Quotium about the security state of …

Hacker admits to selling access to company networks, supercomputers

A Pennsylvania man pleaded guilty today to charges stemming from his participation in a scheme to hack into computer networks and sell access to those networks. Andrew James …

There are no winners in the blame game

Every time a major security breach makes the headlines, a common reaction happens. Even before the details of the breach are known, the infosec world gets into a frenzy of …

New Zeus variant creates bogus Instagram accounts

If you are familiar with the results of a recently finished study regarding online content popularity that concluded that “likes” beget “likes”, the …

Advanced threats to drive growth in new product segment

As hackers have shifted their ultimate goals from disruption and notoriety to financial and intellectual property theft, the tactics they use have changed accordingly. The …

Lucrative business: cybercrime-as-a-service

With news of the struggling high street becoming a regular occurrence, it is not surprising that increasingly small businesses are seeking opportunities online. However …

Analyzing the Fort Disco bruteforce campaign

In recent months, several researchers have highlighted an uptick in bruteforce password guessing attacks targeting blogging and content management systems. Arbor ASERT has …

Advice on Tor use in wake of Freedom Hosting compromise

In the wake of the discovery that someone has compromised Tor hidden services hosted by Freedom Hosting and injected malicious JavaScript aimed at de-anonymizing specific …

Don't miss

Cybersecurity news