SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Cybercrime stories - Page 12

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Story image
Skyscanner opens up bug bounty for interested hackers
Thu, 31st Jan 2019
#
cybersecurity
#
open bug bounty
#
cybercrime
Skyscanner launches a public bug bounty program, offering up to USD $2,000 per vulnerability, via Bugcrowd to enhance its website, API, and mobile app security.
Story image
4 Reasons why CISOs should adopt threat intelligence
Thu, 31st Jan 2019
#
cybersecurity
#
cybercrime
#
threat intelligence
ThreatQuotient’s Anthony Perridge believes the answer to security teams falling behind criminals is to deploy threat intelligence platforms.
Story image
New report uncovers US$1.7b cryptocurrency cybercrime market
Thu, 31st Jan 2019
#
cryptocurrency
#
blockchain
#
email security
There was a staggering rise in criminal activity within the cryptocurrency market last year, despite the decline in the market.
Story image
5 tips for protection against surging number of scam apps
Wed, 30th Jan 2019
#
malware
#
email security
#
cybersecurity
We all love them and our lives are effectively run by them, but research has revealed apps are increasingly growing deceitful with ulterior motives.
Story image
AI in cybersecurity stamping out menacing fileless attacks
Wed, 30th Jan 2019
#
ai
#
cybersecurity
#
industry experts
Artificial intelligence is revolutionising cybersecurity by effectively combating fileless attacks, which evade traditional antivirus software.
Story image
Cryptomining affected 37% of businesses last year
Fri, 25th Jan 2019
#
ddos
#
cryptocurrency
#
malware
A Check Point report reveals 37% of global businesses suffered cryptomining attacks in 2018, highlighting a surge in stealthy cybercrime techniques.
Story image
Cybercrime could cost NZ$8 trillion over next five years
Tue, 22nd Jan 2019
#
cybersecurity
#
accenture
#
cybercrime
Cybercrime may cost businesses worldwide NZD $8 trillion over five years, as firms struggle to secure increasingly complex digital systems, warns Accenture.
Story image
AU businesses less cybersecurity confident than global peers
Sat, 19th Jan 2019
#
uc
#
cybersecurity
#
online safety
A new report reveals companies around the world could incur US$5.2 trillion in additional costs and lost revenue over the next five years due to cybercrime.
Story image
Palo Alto says supply chain is cybersecurity’s weakest link
Fri, 18th Jan 2019
#
malware
#
firewalls
#
network infrastructure
Palo Alto Networks warns that supply chains are the weakest link in cybersecurity, urging firms to evaluate partners' defences to prevent breaches.
Story image
Carbon Black: What does cybersecurity have in store for 2019?
Wed, 16th Jan 2019
#
cybersecurity
#
carbon black
#
cybercrime
As geopolitical tensions rise, Carbon Black forecasts an increase in destructive cyber attacks, sophisticated counter-detection, and extortion tactics in 2019.
Story image
IoT breaches: Nearly half of businesses still can’t detect them
Wed, 16th Jan 2019
#
blockchain
#
iot
#
cybersecurity
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.
Story image
A photo still enough to defeat face unlock of many phones
Sat, 12th Jan 2019
#
surveillance
#
smartphones
#
biometrics
A new study by Consumentenbond reveals that 42 out of 110 smartphones tested can be unlocked using just a photo, challenging manufacturers' security claims.
Story image
Twitter suspects state-sponsored ties to support forum breach
Wed, 19th Dec 2018
#
breach prevention
#
cybersecurity
#
cybercrime
One of Twitter’s support forums was hit by a data breach that may have ties to a state-sponsored attack, however users' personal data was exposed.
Story image
Is Supermicro innocent? 3rd party test finds no malicious hardware
Thu, 13th Dec 2018
#
datacentre infrastructure
#
hyperscale
#
dc
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
Story image
Cyber crisis continues unabated – is ATP the answer?
Thu, 15th Nov 2018
#
firewalls
#
network security
#
advanced persistent threat protection
Statistics on cybercrime certainly makes for grim reading, and that is set to continue unless businesses take measures to stack the odds better in their favour.
Story image
Exclusive: Why Australian enterprises are prime targets for malware attacks
Wed, 14th Nov 2018
#
it training
#
ransomware
#
phishing
Australian businesses need to take cybersecurity more seriously as their attitudes and awareness don't match up to evolving threats.
Story image
Supermicro to test for spy chips, Apple & AWS call for retraction
Tue, 23rd Oct 2018
#
datacentre infrastructure
#
hyperscale
#
public cloud
Supermicro vows to test its motherboards for alleged spy chips amid strong denials from Apple and AWS, who demand Bloomberg retract its claims.
Story image
Credential theft industry booming in US, declining in Asia & EU
Wed, 10th Oct 2018
#
iam
#
cybersecurity
#
micro-credentials
New research reveals the US is ripe for harvest, but Blueliv says the declines in EU and Asia are almost definitely only temporary.
Story image
Chinese espionage: Sweating Apple insists breach allegations are ‘not true’
Tue, 9th Oct 2018
#
hyperscale
#
dc
#
supply chain systems
The dust still hasn't settled on the report that caused Supermicro's stocks to collapse, and now Apple is stressing its innocence.
Story image
Huge vulnerabilities in software supply chain being exploited
Thu, 4th Oct 2018
#
devops
#
apm
#
open source
A very exposing report has revealed breaches are rising and response times are falling, largely due to shoddy software development practices.