Menu

Blogs

Showing Blog Posts: 1–10 of 139 tagged Cybercrime

  • Working With Government: Legal Authority and Law

    by Todd Inskeep on February 18, 2015

    This is the third post in a multi-part series. You can read the first and second parts here. A second major aspect of the current National Cyber Security call for action considers the legal authority to investigate and prosecute cyber-crimes. We also need to agree what would be the appropriate role for law enforcement authorities. There are differing views on whether the Computer Fraud and Abuse Act…

  • The Sorry State of Cybersecurity Threat Intelligence

    by Gib Sorebo on January 21, 2015

    During the opening montage of every Law and Order episode is the statement (by now probably burned into all our collective consciousness): “In the criminal justice systems there are two separate yet equally important groups, the police who investigate crimes and the district attorney who prosecutes the offenders. These are their stories.” What is typically left out of both the TV show and the real…

  • State of the Union Puts Cybersecurity on National Agenda

    by Fahmida Y. Rashid on January 21, 2015

    Buried among the slew of national issues such as equal pay, immigration reform, climate change and Ebola, President Barack Obama spent a few seconds talking about net neutrality and cybersecurity in his State of the Union speech Tuesday evening. While it's nice to see security on the general agenda, it's still too early to know the government's plans. The full paragraph from the State of the Union…

  • Blackhat Movie Shows Viewers What Cyber-Attacks Look Like

    by Fahmida Y. Rashid on January 19, 2015

    Cybercrime is practically on the news every day—infected computers looting individual bank accounts, distributed denial-of-service attacks, hacked social media accounts, and data breaches. So clearly the time is right for a movie about hacking, right? There are plenty of reviews already for Michael Mann’s latest action thriller Blackhat, so there is no need to repeat what they say here, here, and …

  • Cyber Crime and Cyber Terrorism Investigator's Handbook

    by Ben Rothke on January 5, 2015

    While the perpetrator of the recent Sony hack is still to be determined, it was certainly an act of either cybercrime or cyberterrorism. With that, in Cyber Crime and Cyber Terrorism Investigator's Handbook, editors Babak Akhgar, Andrew Staniforth and Francesca Bosco have assembled a team of over 25 writers to give the reader an detailed overview of the topic. The authors and contributors are all…

  • The Future of Electronic Attacks, and the End of the Network Perimeter

    by John Linkous on December 16, 2014

    JPMorgan Chase was one of the latest Fortune 500 companies to fall victim to an electronic attack in 2014. On Aug. 28, the company said it was the target of a broad-scale attack which, based on its alleged complexity and breadth, may well have been state-sponsored. Bank records were altered and deleted, potentially impacting thousands of bank customers. It also appears that up to seven different…

  • Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door.

    by Ben Rothke on December 8, 2014

    There are really two stories within Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door. The first is how Brian Krebs uncovered the Russian cybergangs that sent trillions of spam emails for years. As interesting and compelling as that part of the story is; the second storyline is much more surprising and fascinating. Along with George V. Hulme and Steve…

  • Around the Web: Backoff, Online Payments, Security

    by Fahmida Y. Rashid on October 24, 2014

    Data breaches, point-of-sale malware, and payment card security were among the hottest topics this week. Information security professionals have to sift through and absorb a lot of information throughout the week, including news reports, survey results, threat advisories, and security warnings. That's just the beginning. Don't forget breaking research, insightful blog posts from other security…

  • Official (ISC)2 Guide to the CCFP CBK

    by Ben Rothke on October 21, 2014

    The Certified Cyber Forensics Professional (CCFP) is the latest certification from ISC 2 , creators of the CISSP certification. The CCFP, like the CISSP, is built around a common body of knowledge (CBK) that includes established forensics disciplines as well as newer challenges, such as mobile forensics, cloud forensics, anti-forensics, and more. For those looking for reference guide, the Official…

  • Hate Crimes in Cyberspace

    by Ben Rothke on October 14, 2014

    It’s said that criminal lawyers see bad people at their best, and divorce lawyers see good people at their worst. At times, the Internet seems to bring out the bad in all types of people. In Hate Crimes in Cyberspace, a fascinating book just out, author Danielle Keats Citron details many incidents where unsuspecting and ordinary people suddenly found themselves under direct attack in the form of…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 31 Mar 2015 16:45:24 -0400.
© 2015 EMC Corporation. All rights reserved.