SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Cybercrime stories - Page 39

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Screen shot 2017 09 12 at 10

Expert spells out how businesses can 'block the spears'

Tue, 12th Sep 2017
#
malware
#
email security
#
cybersecurity
There is no doubt about it, but spear-phishing is big business in 2017 - Menlo Security's Jason Steer explains how businesses can protect themselves.
Thinkstockphotos 506181336

EU to invest more into cybersecurity – expert says it's not enough

Mon, 11th Sep 2017
#
cybersecurity
#
fujitsu
#
cybercrime
Rob Norris says further investment in cyber security technology is an unsurprising but welcome move by the European Commission - but more is needed.
Screen shot 2017 09 07 at 8

Cybercriminals caught targeting gamers with sneaky malware

Fri, 8th Sep 2017
#
malware
#
gaming
#
ddos
Spread via hacked games on unofficial websites, the malware can download and install virtually any other malicious code on the victim's computer.
Phone stealing

What's up with Your mobile apps? Identifying and mitigating digital risk

Thu, 7th Sep 2017
#
cybersecurity
#
apps
#
cloud services
I'll venture to guess you're using a mobile device to read this - while mobile apps offer a host of new opportunities, they also introduce risk.
Criminal underworld

Once prominent infection method now declining - short blip or for good?

Wed, 30th Aug 2017
#
malware
#
cybersecurity
#
software development
An expert from Digital Shadows dissects the once prominent method of infection known as exploit kits and whether they remain a threat.
Security wall breach

BT says investing in all the latest cybersecurity is no silver bullet

Tue, 29th Aug 2017
#
malware
#
ransomware
#
cybersecurity
Throwing money at cybersecurity is a mistake that can make firms a target not just for cyber criminals but also for over-zealous IT salespeople.
Thinkstockphotos 641382150

Survey reveals digital transformation playing into cybercriminals' hands

Thu, 24th Aug 2017
#
digital transformation
#
cybersecurity
#
cybercrime
Digital transformation has many positives but it also benefits cybercrime as organisations are trying to walk before they can crawl.
Thinkstockphotos 87660809

New report reveals hackers weaponising old vulnerabilities

Wed, 23rd Aug 2017
#
malware
#
ddos
#
cybersecurity
Akamai's Q2 2017 report shows a 28% increase in DDoS attacks, with the PBot malware being a major contributor.
Data breached by hacker

Two dark web markets shut down but expert says 'one door closes, a window opens'

Tue, 22nd Aug 2017
#
cybersecurity
#
market
#
dark web
The recent shutdown of AlphaBay and Hansa has left dark web marketplaces on shaky ground, says Digital Shadows CEO Alastair Paterson.
Cyber tool kit

Global cybersecurity spending to reach USD$93b in 2018 – GDPR a main driver

Wed, 16th Aug 2017
#
devops
#
dlp
#
apm
Gartner's latest findings reveal a burgeoning cybersecurity market that is in line with growing awareness and the imminent GDPR.
Bug painting red

FireEye uncovers Russian cybercriminal group targeting EMEA hotels

Mon, 14th Aug 2017
#
malware
#
breach prevention
#
wireless networks
The hospitality sector is a frequently attacked target by cybercriminals - one of the most prominent has been attributed to a Russian group.
Mountain documents

Comodo opens up threat library to public – almost 100m incidents in Q217 alone

Fri, 11th Aug 2017
#
advanced persistent threat protection
#
cybersecurity
#
cyber threat
​Comodo has opened its 'library' to university, governmental, and non-profit educators and researchers in an industry-first.
Data out the backdoor

HBO breach: Centrify says 'winter is coming' for passwords

Thu, 10th Aug 2017
#
cybersecurity
#
hbo
#
centrify
HBO's soft underbelly was laid bare to the world after hackers stole 1.5 TB of data from its systems - Centrify says passwords' days are limited.
Targeting cyber threats

Cybercrime: What to expect for the rest of 2017 and how to prepare

Wed, 9th Aug 2017
#
malware
#
ddos
#
vpns
​So far this year we have already borne witness to a multitude of serious cybercrime. NordVPN has provided insights for what the second half may hold.
Hand data

Want to cause chaos? ICIT says hacking elections is easy

Mon, 7th Aug 2017
#
ddos
#
cybersecurity
#
elections
Hackers at DEFCON were able to exploit vulnerabilities in voting machines in a matter of minutes - ICIT breaks down just how easy it is.
Cyber criminal

UK SMBs estimate average cost of cyberattack more than £730,000

Wed, 2nd Aug 2017
#
malware
#
ransomware
#
phishing
UK SMBs estimated the average cost of a cyberattack where their customer records or critical business data were stolen at an eye-watering £737,677.
Treasure trove

HBO's Game of Thrones treasure chest ransacked by hackers

Tue, 1st Aug 2017
#
malware
#
ransomware
#
cybersecurity
​It would seem winter has come for HBO after hackers have stormed the company's servers and looted the jewels within to leak data online.
Security wrong man

New report details exploits of notorious cyberespionage group with EMEA targets

Mon, 31st Jul 2017
#
malware
#
cybersecurity
#
government
Known as CopyKittens, the group is politically-motivated and has increasingly been active in pursuing foreign espionage on strategic targets.
Email scam

Nearly a quarter of 'unsafe' emails getting through to user inboxes

Fri, 28th Jul 2017
#
malware
#
ransomware
#
cybersecurity
There is a continuous challenge of securing organisations from malicious attachments, dangerous files type, impersonation attacks as well as spam.
Trojan virus

Malware found prowling within every app of alternative Android store

Thu, 27th Jul 2017
#
malware
#
cybersecurity
#
apps
Malware researcher at ESET, Lukáš Štefanko says this is the first time he has ever seen an entire Android market infected like that.