Cybersecurity

Sponsored
by

Cybersecurity / Most Viewed

U.S. Issues Cyber Incident Coordination Policy

White House has issued new directive spelling out how the Federal government will coordinate its incident response activities in the event of a large-scale cyber incident. more

Black Hat Conference: Security Experts Discussing Latest Malware, Rootkits and Hacker Tricks

IT security pros, analysts and researchers are coming together for the meeting of the minds that is Black Hat 2008. The popular security conference officially kicked off Aug. 2 in Las Vegas with a series of training sessions that wrap up Aug. 5. However, the real buzz for many attendees will be the technical briefings Aug. 6-7 at Caesars Palace. The activities Aug. 6 will begin with some words from Black Hat founder Jeff Moss and a keynote from author and London School of Economics professor Ian Angell. From there, the conference launches into two days of briefings on several different tracks such as reverse engineering and rootkits. There is already hype around a number of the sessions, including the much-talked about DNS flaw discovered by security researcher Dan Kaminsky. more

Antispam Confab Looks Beyond Filters

The fight against spam, phishing and e-mail fraud should focus on economic incentives and aiding law enforcement, according to attendees at a conference examining the problem this week.

Speakers at MIT's 2006 Spam Conference were notably cognizant of the recent proposals of white lists and AOL's Goodmail, a pay per e-mail service offering preferential treatment in e-mail delivery for marketers. It is also one year since the implementation of Can-Spam, the federal law that sets e-mail marketing standards and makes it less complicated for law enforcement to go after John Doe spammers. more

We Must Avoid Cyber Crisis Equivalent to Current Financial Crisis, Urge Experts

Cybercrime is likely to wreak as much havoc as the credit crisis in the coming years if international regulation is not improved, some of the world's top crime experts said on Wednesday. Damage caused by cybercrime is estimated at $100 billion annually, said Kilian Strauss, of the Organization for Security and Cooperation in Europe (OSCE). more

22,000 New Malware Samples Detected Every Day in 2008, Says New Report

Security firm PandaLabs reports today that it received more malware in the first eight months of 2008 than in the previous 17 years combined -- Trojans being the leading cause of malware infections. In 2008, Panda Security's malware analysis and detection laboratory states that it found an average of 35,000 malware samples each day, 22,000 of which were new infections. By the year's end, the total count of malware threats detected exceeded 15 million. more

Direct Correlation Between Economic Cybercrime and Stock Market Declines, Reveals Security Group

Security researchers and PandaLabs have issued a security alert today revealing a direct correlation between the recent stock market volatility and the growth of new threats. According to firm, the two are tied together much more closely than previously thought and recent stock market instability has accelerated the volume of targeted cyber attacks and their relative impact on the economy over the last month and a half. In addition, analysts believe the recent spike in malware could be related to cybercriminals now having fewer possible targets as a result of consolidation within the banking industry. more

Data Breaches Up Almost 50 Percent in 2008 as Compared to 2007

Businesses, governments and educational institutions reported nearly 50 percent more data breaches last year than in 2007, exposing the personal records of at least 35.7 million Americans, according to a nonprofit group that works to prevent identity fraud. Identity Theft Resource Center of San Diego is set to announce today that some 656 breaches were reported in 2008, up from 446 in the previous year. Nearly 37 percent of the breaches occurred at businesses, while schools accounted for roughly 20 percent of the reported incidents. more

Defense Science Board: Cyber Security the Achilles' Heel of US Military Might

Robert O'Harrow of the Washington Post reporting: "Everybody knows by now that cyber security is something of an annoyance, if not a big deal... What most of us fail to appreciate is how big a deal all this really is. That's one of the subtexts of a new report from congressional researchers [PDF] that came Government Inc.'s way. Going by the dry title 'Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations,' the report underscores in a compelling way the fact that the nation's cyber vulnerabilities continue to grow, and fast." more

France Preparing for Future Cyberwars, Says President

French President Nicolas Sarkozy announced major military reforms involving an in-depth change in strategic priorities and is gradually preparing France for the fights of future. Plans include expanding the range of weapons arsenal in terms of computer warfare, said the president in his announcement this week. France is not alone to be deeply worried about the issue of crippling cyber attacks. In mid-May, the Atlantic Alliance, which brings together dozens of Northern America, Western and Eastern European countries, launched what has come to be known as the "NATO Excellence Center for Cybernetics Defense" in Tallinn, Estonia. more

Malware Authors, Distributors Increasingly Using Social Networks

Security experts warn the "clickjacking" attack on Twitter service last week is part of growing trend of social engineering attacks via social networks. VP of security firm RSA, Sam Curry, calls the social networking attacks "orthogonal attacks." As users have become aware of phishing attacks and other efforts to get at their personal data, hackers have turned to social networks and "brand attacks," like the recent CNN.com-spoofing Cease-Fire Trojan to spread malware that goes after the same information once installed on the victim's computer. more

Study Ranks Riskiest Online Cities in US

A recent study by Symantec Norton and Sperling's Best Places has ranked 50 cities in the United States by "Riskiest Online Cities". The study included investigation of a number of factors including... more

Engaging Consumers in Cyber Security: It's Up to You

In a perfect world, consumers recognize authentic emails from fake, update their operating system, browser and anti-virus software, and have a healthy skepticism about the safety of the Internet. The bad guys hate perfect, so we should be working with consumers to stop them. ... Organizations like mine are joining forces to recruit consumers -- who are also your customers and employees -- in the fight against cybercrime. more

Policy Review: Botnets are eWMD, electronic Weapons of Mass Destruction

The latest issue of Policy Review from the Hoover Institution, a public policy research center -- focused on advanced study of politics, economics, and political economy -- has an essay titled eWMDs – electronic weapons of mass destruction. The Policiy Review readers are warned that botnets should be considered a serious security problem and that "cyber attacks present a grave new security vulnerability for all nations and must be urgently addressed." more

Cyberattacks Listed as High-Impact Threat to North American Electric Grid

In a report released today by The North American Electric Reliability Corporation (NERC) and the U.S. Department of Energy (DOE), cyber attacks are among the top high-impact risks -- "with potential to significantly affect the reliability of the North American bulk power system." Certain protections and mitigations are already in place to address these risks, and this study has been released to help public utility commissions, and the federal government to further prepare for these potential risks. more

Data on Nearly 200 Million Potential Voters in U.S. Found Fully Exposed

According to reports released today, databases containing information on close to 200 million potential U.S. voters were found unsecured and exposed to the Internet, allowing anyone to download it without a password. more

Industry Updates

Enriching IP Blacklists Using a Reverse IP/DNS Database

Mergers and Acquisitions: Taking Care of Digital Brands During Entity Consolidation

CSC's Research on Election-Related Domains Aligns with Recent FBI and CISA Warning

Beefing Up Third-Party Risk Management with Reverse DNS Search

Strengthening Brand Protection with Subdomain Lookups: A Short Study

Attack Surface Monitoring: Two Ways to Detect Phishing Subdomains

Not All VPN Users Are Worth Trusting, a Lesson for Cloud Service Providers

Gathering Context Around Emotet, Trickbot, and Dridex C&C Servers with Bulk IP Geolocation

Rise in Domain Name Registrations Highlights the Need for Continued Vigilance

Augmenting Digital Risk Protection with Threat Intelligence Sources

Threat Intelligence Feeds in the Fight against Insurance-Themed Cyber Attacks

WHOIS History Footprint Tells Us More about the Man Behind the Biggest BLM Scam

The DNS Ecosystem, Its Vulnerabilities, and Threat Mitigations

100K+ List of Disposable Email Domains Under Security Analysis

Detecting Possible Domain Generation Algorithm-Related Threats Using Typosquatting Data Feed