cybercrime

cybercrime - News, Features, and Slideshows

News

  • Ponemon study: Cyber attacks more frequent, severe

    Cyber attacks are becoming more frequent and severe, and the vast majority of businesses have suffered at least one <a href="http://www.networkworld.com/news/2011/032811-mcafee-underground.html">data breach</a> in the past year, a Ponemon Institute survey says.

    Tim Greene | 22 Jun | Read more

  • Northrop Grumman constantly under attack by cyber-gangs

    NATIONAL HARBOR, Md. -- About a dozen separate legions of organized hackers have been diligently attempting for years to break into aerospace and defense company Northrop Grumman to steal sensitive information, the company's chief information <a href="http://www.networkworld.com/topics/security.html">security</a> officer (CISO) said at a Gartner security conference here.

    Ellen Messmer | 22 Jun | Read more

  • DNS agility leads to botnet detection

    Online criminals have evolved their tactics to harden their botnets against takedown using a variety of tactics, including fast-flux networks and Conficker-like dynamic domain generation. Yet, such tactics can also pinpoint when such networks are being created by bot operators, according to research from the Georgia Institute of Technology.

    Robert Lemos | 22 Jun | Read more

  • LulzSec attacks gaming sites ... just for laughs

    The hacking group known as LulzSec called it Titanic Takeover Tuesday. Gamers called it by a variety of names, many of which cannot be reprinted here. But for system administrators at a handful of gaming companies, Tuesday, June 14 was a nightmare: the day their websites went down under an online attack.

    Robert McMillan | 15 Jun | Read more

  • Mobile Malware and Cyber Warfare

    Security analysts have been predicting the emergence of mobile malware for many years. In 2011, the criminals have finally come through by attacking Google's popular Android OS. Meanwhile, the sophistication of Stuxnet — anasty piece of code that infected a nuclear power facility — has alarmed researchers who believegovernments are stockpiling tools for cyberwar. Looking ahead, it seems a cataclysmic Cloud failure is just around the corner.

    CSO staff | 14 Jun | Read more

  • Is it time for RSA to open up about SecurID hack?

    For any company that makes its living selling security, it's a nightmare come true. This week, RSA Security admitted that <a href="http://www.networkworld.com/news/2011/031811-rsa-warns-securid-customers-after.html">hackers who broke into its network</a> three months ago had stolen information about its SecurID tokens and then used that information to attack a customer, Lockheed Martin.

    Robert McMillan | 11 Jun | Read more

  • IRS: Top 10 things every taxpayer should know about identity theft

    As part of a look at the impact of identity theft and the Internal Revenue Service, watchdogs at the Government Accountability Office issued the IRS' top 10 list of identity theft information everyone should be aware of. Some of the information is obvious, perhaps, but overall even the basics of security were followed in many cases the impact of identity theft could be reduced.

    Michael Cooney | 03 Jun | Read more