cybercrime
Infosec expert viewpoint: Google Play malware
Researchers routinely discover a variety of malicious apps on Google Play, some of which have been downloaded and installed on millions of devices worldwide. Here’s what …
Insights from 700M thwarted cyberattacks show how the fight against cybercrime has intensified
2017 was a record-setting year in the fight against cybercrime. Based on analysis of real world cybercrime attacks, ThreatMetrix confirmed a 100 percent increase in volume of …
The rise of ransom hacks, and the potential impact on your business
The percentage of companies reporting financially motivated cyber attacks has doubled over the past two years, with 50% of companies experiencing a cyber attack motivated by …
Internet of Things security issues bleed into 2018
In 2017 Internet of Things (IoT) devices rose to prominence as attackers have continued to target and use them to support various cyberattacks. IoT devices are almost the …
RIG EK covertly delivers cryptocurrency miners
Malware peddlers have been quick to react to the cryptocurrency boom and to take advantage of every possible way to make other people and organizations mine coins for them. …
What the rise of cyber indictments means for 2018
The growing implementation of indictments throughout 2017 was arguably the most impactful government action to counter cyber attacks, and yet received little attention. In …
Hardware wallet security is no match for scammers’ ingenuity
It is often noted that hardware cryptocurrency wallets are one of the better options for keeping one’s private keys safe: they are not affected by malware, the private …
Healthcare breaches involving ransomware increase year-over-year
2017 has been a very challenging year for healthcare institutions as these organizations remain under sustained attack by cybercriminals that continue to target their …
Why ransomware? Let’s ask the bad guys
I am involved with ransomware because it is ‘fast, easy, and safe”. This was the feedback we got when we asked the bad guys about the motivations for being involved with this …
Exploits and fileless malware drive record new malware surge
McAfee released its McAfee Labs Threat Report: December 2017, examining the growth and trends of new malware, ransomware, and other threats in Q3 2017. McAfee Labs saw malware …
1.4 billion unencrypted credentials found in interactive database on the dark web
A data dump containing over 1.4 billion email addresses and clear text credentials is offered for download in an underground community forum. What’s so special about …
An analysis of 120 mobile app stores uncovers plethora of malicious apps
RiskIQ analyzed 120 mobile app stores and more than 2 billion daily scanned resources. In listing and analyzing the app stores hosting the most malicious mobile apps and the …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader