cybercrime - News, Features, and Slideshows
The beat goes on. In recent weeks, both JP Morgan Chase and Home Depot have been identified as the latest victims of large-scale cyberattacks.
The CTO of a Costa Rica-based payment network that U.S. prosecutors allege primarily served the cybercriminal underworld pleaded guilty on Thursday to one count of conspiring to operate an unlicensed money transmitting business.
Europol launched a cybercrime task force Monday to fight online crime in the EU and other countries.
A Chinese man has been indicted for allegedly directing two China-based hackers to infiltrate Boeing and other defense contractors to steal gigabytes of documents describing U.S. military aircraft.
Six people have been indicted on charges of running an international ring that resold tickets bought through compromised StubHub accounts for some of New York's biggest concerts and sporting events.
Leaders of the tech sector laud the Obama administration's rollout of voluntary cybersecurity guidelines, but broader private-sector adoption could remain a challenge.
It may be difficult to remember now, but not too long ago, cyberattacks rarely made headlines in mainstream news. That's not to say that these advanced persistent threats, sometimes state-sponsored or the product of organized crime, were uncommon. On the contrary, they were booming. It was just that few people liked to talk about them.
It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.
They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
Whitepapers about cybercrime
Eight breaches in 2013 provided a painful reminder that cybercrime remains prevalent. This year’s report once again covers the wide-ranging threat landscape, with data collected and analysed by security experts, while calling out seven areas that deserve special attention.
- ANZ businesses suffer 29 data-loss events every day: Check Point
- Testing Security Controls for Logic Based Attacks
- Firms must muster the will to change security as username-password combos fall
- Honda's aims for 'collision-free society' are realised with new tech
- Apple Watch under scrutiny for privacy by Connecticut attorney general
- Telstra launches communications initiatives for disabled Australians
- Australian Information Industry Association backs changes to ESOP
- Blackline appoints APAC GM to lead ambitious growth plan
- Fletcher lays down NBN strategy to address communications "equity"
- ACCAN unveils Digital Business Kit for SMBs
- Adopting mobile marketing for the masses
- Report: Consumers worry more about privacy even as they share personal info online
- Anytime Fitness looks to bring on first CMO
- Don't drop leadership intuition for data analytics, says Accenture researcher
- Optus claims world-first with Facebook trending campaign launching pre-paid offer