Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Category: Trends

Cybercrime dominates federal caseload, Hickton says

Posted on April 21, 2013December 30, 2021 by admini

And Hickton said cybercrime investigators last year solved a string of bomb threats at the University of Pittsburgh and its related hospitals, a case that many thought would go unsolved, but culminated with the arrest of a suspect in Ireland.

The drug trade in western Pennsylvania has been traced to illegal narcotics kingpins in Newark, N.J., Cleveland and Detroit, Hickton said, but his office is seeing a major, deadly new trend emerge: the abuse of prescription pills facilitated by doctors and pharmacists in the region. “A lot of people sit back and say, ‘This is not in my community,’ but Washington County had more than 50 basically synthetic heroin deaths through pill abuse last year.

Attorney’s office has prosecuted some well-publicized cases in Indiana County in recent years, including the guilty pleas and sentencing of three men who admitted burning a cross on the lawn of a multirace family’s home in Robinson, West Wheatfield Township, and the current investigation of the embezzlement of millions of dollars from Falcon Drilling Company in Indiana.

“It will be a large organization of community leaders that’s working on crime prevention councils … beginning with a partnership with the United Way called Be One in a Million, a mentoring program that spins off an existing program called Be a Sixth Grade mentor,” Hickton said.

The components with jobs and with cyber are a part of that, it’s understanding that there may be a connection to make western Pennsylvania the go-to place for cyber like it is a go-to place for Marcellus shale right now,” Hickton explained.

“I have my responsibilities to bring the cases and enforce the law, but in my view, to do this job correctly, you have a broader mission and that is to ensure freedom and justice, by enforcing the law and protecting the public welfare,” he said. And what good do I do, really, if all I do is just hammer criminals and bring drug prosecutions if I don’t recognize that maybe we need to go and find out who are the church leaders and how can they help, who are the dedicated community activists?

Link: http://www.indianagazette.com/news/indiana-news/cybercrime-dominates-federal-caseload-hickton-says,17070503/

Read more

Symantec: Industrial espionage on the rise, SMBs a target

Posted on April 17, 2013December 30, 2021 by admini

Simply put, a “watering hole” attack uses a trusted website as a base to divert visitors to an unsafe, malicious website, where malware can then take advantage of vulnerabilities within a PC system to steal data.

The report suggests that industrial espionage is on the rise, and manufacturing is now the most attractive target for those looking to steal valuable data, accounting for 24 percent of targeted attacks.

As social media spam rises, traditional spam has declined slightly from 75 percent of all email sent in 2011 to 69 percent last year — although 30 billion are still sent every day.

“This year’s ISTR shows that cybercriminals aren’t slowing down, and they continue to devise new ways to steal information from organizations of all sizes,” said Stephen Trilling, chief technology officer of Symantec.

Link: http://www.zdnet.com/symantec-industrial-espionage-on-the-rise-smbs-a-target-7000014061/

Read more

Microsoft Says Worm Infections Declining, but Web Attacks Rising

Posted on April 17, 2013December 30, 2021 by admini

Conficker, a worm that started spreading among enterprise desktop systems in 2008, continues to wriggle through corporate networks. But the total number of infected systems shrank during 2012, according to the latest Security Intelligence Report released by Microsoft on April 17.

“In the last quarter of 2012, a person in the enterprise was more likely to encounter attacks through the Web than any of the network worms,” Holly Stewart, senior program manager with the Microsoft Malware Protection Center, told eWEEK.

Link: http://www.eweek.com/security/microsoft-says-worm-infections-declining-but-web-attacks-rising/

Read more

Cloud-based security services still in high demand

Posted on April 15, 2013December 30, 2021 by admini

The services are also driving changes in the market landscape, particularly around a number of key security technology areas, such as secure email and secure Web gateways, remote vulnerability assessment, and Identity and Access Management (IAM).

“Demand remains high from buyers looking to cloud-based security services to address a lack of staff or skills, reduce costs, or comply with security regulations quickly,” said Eric Ahlm, research director at Gartner. “This shift in buying behavior from the more traditional on-premises equipment toward cloud-based delivery models offers good opportunities for technology and service providers with cloud delivery capabilities, but those without such capabilities need to act quickly to adapt to this competitive threat.”

Security buyers from the U.S. and Europe, representing a cross section of industries and company sizes, stated that they plan to increase the consumption of several common cloud services during the next 12 months.

Gartner believes regulatory compliance measures to comply with the Payment Card Industry Data Security Standard (PCI DSS), for example, are driving much of the growth of interest in tokenization as a service.

Much of the interest is attributed to regulatory compliance concerns and security buyers’ need to reduce costs in the area of log management, compliance reporting and security event monitoring. However, many customers in the enterprise segment will remain cautious about sending sensitive log information to cloud services, and this will continue to be an important aspect for security-as-a-service providers to address.

“The customer demand for a brokerage becomes apparent as organizations move more assets to the cloud and require multiple security services to span multiple clouds and/or mixtures of clouds and on-premises.”

Gartner is advising value-added resellers (VARs) to supplement product implementations with cloud-based alternatives that offer large customers reduced operational cost and thereby increase the likelihood of customer retention in this market segment.

Link: http://www.net-security.org/secworld.php?id=14748

Read more

Mobile users in Middle East victims of cyber crime: Study

Posted on April 7, 2013December 30, 2021 by admini

“People are relying more and more on their mobile phones and tablets to navigate, share, socialize and shop in today’s constantly-connected world,” said Tamim Taufiq, head of consumer sales MENA for Symantec.

“What many consumers may not realise is exactly how much of their personal and private information is up for grabs should these devices be compromised, lost or stolen.”

Yet as people expand their online lives through mobile devices, many are not taking steps to secure their device and the content it contains.

Nearly one in four mobile device users in the MENA admit to not always downloading applications from trustworthy sources – Close to three in 10 (29 percent) indicated that they do not use secure payment methods when making purchases from their mobile device, leaving their sensitive information such as credit card details vulnerable.

Link: http://www.sify.com/news/mobile-users-in-middle-east-victims-of-cyber-crime-study-news-international-nehcuceehfb.html

Read more

Malware attacks occur every three minutes

Posted on April 5, 2013December 30, 2021 by admini

When sending spear phishing emails, attackers opt for file names with common business terms to lure unsuspecting users into opening the malware and initiating the attack. These terms fall into three general categories: shipping and delivery, finance, and general business.

Instances of malware are uncovered that execute only when users move a mouse, a tactic which could dupe current sandbox detection systems since the malware doesn’t generate any activity.

By avoiding the more common .exe file type, attackers leverage DLL files to prolong infections. Ashar Aziz, FireEye founder and CTO said: “As cybercriminals invest more in advanced malware and innovations to better evade detection, enterprises must rethink their security infrastructure and reinforce their traditional defenses with a new layer of security that is able to detect these dynamic, unknown threats in real time.”

Link: http://www.net-security.org/malware_news.php?id=2455

Read more

Posts navigation

  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • …
  • 52
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme