Researchers believe that a team of hackers that attacked the Democratic National Committee is now using leaked National Security Agency hacking tools. Fancy Bear, who is associated with Russia's foreign intelligence agency, the GRU, appears to be using a now-patched Windows networking vulnerability nicknamed EternalBlue to distribute malware, according to
Topic: Cyber Crime
The threat is what might be called "weaponized metadata," and the risks are detailed extensively in a new report, Metadata: The Most Potent Weapon in this Cyberwar, recently published by the Institute for Critical Infrastructure Technology (ICIT), a Washington, D.C.-based cybersecurity think tank. ICIT produces many publications annually, but the 28-page
An actor managed to hack the CoinDash official website during the company's ICO (Initial Coin Offering) and diverted over $7 million worth of Ethereum by replacing the official wallet address with their own. The incident took place on Monday, just minutes after the company launched its ICO in an attempt to raise funds in the form of Ethereum
The audit report, which was submitted to the regulator last week, brings out an uncomfortable truth that most Indian banks and corporates will now have to deal with: anti-virus and anti-malware devices they have installed are no match for targeted cyber attacks.
New research suggests that an elaborate cybercrime ring is responsible for stealing between $3 million and $5 million worth of revenue from online publishers and video advertising networks each day.
The explosive growth in the use of instant messaging (IM) communication in both personal and professional environments has resulted in an increased risk to proprietary, sensitive, and personal information and safety due to the influx of IM-assisted cybercrimes, such as phishing, social engineering, threatening, cyber bullying, hate speech and crimes, child
If you protect a luscious, valuable, amazingly tempting data object, the probability of its being stolen is 1. It’s as sure as death and taxes. It’s only a matter of an attacker’s time and resources before it's gone; these are no obstacles to determined adversaries like nation states and organized crime. So why don’t our corporate leaders ‘get’ this
This issue looks at the attempts to apply game theory to various aspects of security situations. Also, the explosive growth in the use of instant messaging has resulted in an increased risk to sensitive and personal information and safety due to the influx of cybercrimes. Cyber forensic techniques are needed to assist cybercrime decision support tools in