Cyber Security

Ransomware Gives Free Encryption Keys to Victims Who Infect Others (Threat Post)

Researchers say they have uncovered ransomware still under development that comes with a novel and nasty twist. Infected victims of the ransomware known as Popcorn Time, have the ... More

The Cybercrime Business Model’s Value Chain (We Live Security)

The security landscape has evolved to a point where most IT threats occur with the intention of generating financial gain for their creators and financiers. Based on this premise, ... More

Piracy Spikes with Millions of Offers, Threatening Pay TV (Info Security)

There are more than 2.7 million advertisements on e-commerce websites, including Amazon, eBay and Alibaba for illicit streaming devices—indicating that content theft by pirates h... More

DDoS, IoT Top Cybersecurity Priorities for 45th President (Krebs on Security)

Addressing distributed denial-of-service (DDoS) attacks designed to knock Web services offline and security concerns introduced by the so-called “Internet of Things” (IoT... More

U.S. Tech Firms Promise Terror Content Crackdown (Bank Info Security)

Facebook, Google, Microsoft and Twitter have promised to better identify and remove terror-related videos and imagery that get posted to their online properties by sharing informat... More

Researchers Find Fresh Fodder for IoT Attack Cannons (Krebs on Security)

New research published this week could provide plenty of fresh fodder for Mirai, a malware strain that enslaves poorly-secured Internet of Things (IoT) devices for use in power... More

Weekend Vulnerability and Patch, Dec. 11, 2016 (Citadel Information Group)

Important Security Updates Google Drive: Google has released version 1.32.4066.7445 of its Google Drive. Updates are available from Google’s website. LastPass: LastPass ... More

Hollywood Preps for Dec. 7 CDSA Content Protection Summit

Every year, the CDSA Content Protection Summit (CPS_ brings together Hollywood’s top cybersecurity, content protection and anti-piracy experts, with a full-day program featuring ... More

Is Ransomware Creeping Into Facebook, LinkedIn? (Bank Info Security)

Facebook is disputing recent reports that the file-encrypting ransomware known as Locky spread through its instant messaging platform. The company's response comes as security f... More

65% of Social Engineering Attacks Compromised Employee Credentials (HelpNet Security)

Social engineering is having a notable impact on organizations across a range of industrial sectors in the U.S. In fact, 60% of surveyed security leaders say their organization... More

2016: A Reflection of the Year in Cybercrime (CSO Online)

First of all it’s that time of year to reflect and be thankful. I want to thank this publication for this blog, for all of my readers and followers on Twitter and LinkedIn, I’m... More

Cybersecurity Profession Has a Clear Career Path … Just Kidding (ITSP)

Do you know what your career path as a cybersecurity professional is? Have you ever really thought about that?  Most don’t, as was reported in a recent study jointly pub... More

How the Private Sector Can Actively Defend Against Cyber Threats (Alston & Bird)

Earlier this year, the Center for Cyber & Homeland Security at the George Washington University (“Center”) announced a new project on active defense against cyber threats... More

‘Avalanche’ Global Fraud Ring Dismantled (Krebs on Security)

In what’s being billed as an unprecedented global law enforcement response to cybercrime, federal investigators in the United States, United Kingdom and Europe today say they... More

International Cybersecurity Policing Tackled at Dec. 7 Content Protection Summit

The U.S.-based International Association of Chiefs of Police (IACP) — the worldwide professional association for law enforcement — has spent 120-plus years being the collective... More

What to Expect in an Online Cybersecurity Degree Program (U.S. News)

Between a full-time job as a software engineer and raising a young child, Carlos Villegas knew that pursuing a master's degree in cybersecurity wouldn't be easy. Tha... More

What Could The Next Ransomware Note Say? Let’s Learn from 2016 (ITSP Magazine)

While ransomware threats are mostly an unknown entity to everyday consumers and Internet users, the widespread havoc these types of attacks have waged on healthcare organizations d... More

Information Security Role Moving Beyond Tech Expertise (Tech Target)

At the recent ISSA International Conference in Dallas, SearchCompliance editor Ben Cole met with conference speakers to discuss the changing data threat landscapeand how it is inf... More

Fortium CEO at European Content Protection Summit: Accidental Distribution Causes Leaks, Piracy (MESA Europe)

Fortium presented at the European Content Protection Summit in London on the Nov. 16, alongside other key speakers from the Entertainment industry such as ITV, BBC, MPA and Cisco.... More

Poison .JPG Spreading Ransomware Through Facebook Messenger (The Register)

Checkpoint has found an image obfuscation trick it thinks may be behind a recent massive phishing campaign on Facebook that's distributing the dangerous Locky ransomware. The se... More