During the past year alone, we've witnessed a number of devastating cyber attacks, from the massive Equifax breach to the seemingly never-ending Yahoo! breach.
The 2nd annual Inside the Mind of a Hacker report was created to shed light on the makeup of the bug hunting community and gain insight and understanding into...
Defending against tomorrow's mobile attacks is a moving target; but new technologies and strategies, including behavioral biometrics and machine-learning-based analytics, are allowing financial institutions to reduce their fraud losses while enhancing their customer experience.
Based on the latest results of ISMG's...
The dark web is notorious for dangerous content which dominates discussions in popular media. In order to understand the dark web beyond the myths and the industry hype, it is necessary to understand the content of the system as well as how the websites, users and activities on the dark web are connected to each...
The dark web has become a very effective resource for purchasing sinister educational materials. How-to guides are for sale on major dark web markets such as Hansa and AlphaBay and offer step-by-step instructions for drug trafficking, hacking, social engineering and many other cyber crimes.
Fraud guides, a subset...
Dark web vendors offer a wide range of technological crime. From distributed denial of service (DDoS) attacks to pre-recorded phone calls, there is a myriad of knowledge and listings for hacking & exploits.
In addition to materials for sale, the dark web is also home to a variety of forums designed to build...
Cybercrime is a global and systemic problem that's growing exponentially. High-profile attacks can be committed with less sophistication because of services for hire readily available on criminal forums. This has resulted in making the methodology and attack vectors mainstream. The impact of new types of crime, as...
The ISMG Security Report leads with views on a novel way to fund the growth of the United States military's Cyber Command by seizing assets such as digital currencies from hackers and other criminals. Also, we offer tips on how to recruit scarce IT security pros.
Employees are still falling for phishing scams leading to major breaches, including those related to ransomware attacks, say federal regulators, who are urging healthcare entities to step up their workforce training and awareness of email schemes.
Most large organizations at least pay lip service to breach preparedness. But when it comes to proper policies, planning and practice, far too many still fall short, says Stuart Mort of the Australian telecommunications firm Optus. Here's what they are overlooking.
Ransomware attacks are increasingly using multiple proven techniques to spread quickly and achieve the maximum impact before being thwarted. They are going to get bigger and target other platforms in the future, warns Justin Peters at Sophos APAC.
Sixty-five percent of security leaders consider their organizations' security postures to be above average or superior, as compared to peers in their sectors.
Yet, only 29 percent say that they are very confident in the effectiveness of their security controls, and nearly half say that they have gaps in detecting...
Publicis Groupe CISO Thom Langford discusses how best to measure your organization's true risk appetite and the business value of blending storytelling techniques into your security awareness programs.
A settlement between the state of New York and a company that provides support services to the healthcare sector serves as a reminder about timely breach notification, including in circumstances when law enforcement agencies are investigating an incident.
Former U.S. CISO Gregory Touhill says the federal government must rethink how it hardens its workforce to prevent cyberattackers from succeeding. Organizations, he says, should regularly conduct cybersecurity exercises to help build their cyber defense.
Bad security habits of consumers whose use of apps is skyrocketing is leading to increased risks for businesses as they ramp up their use of apps as well, says Neil Wu Becker, a global vice president at A10 networks, who emphasizes the need to enforce best practices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.