Menu

Blogs

Showing Blog Posts: 21–30 of 172 tagged Cybercrime

  • How to Stay Safe on Cyber Monday

    by Jennifer Lawinski on November 30, 2015

    Tis the season for online fraud. And this year's Cyber Monday is expected to give cybercriminals more potential victims than ever before. Adobe expects online shoppers will spend more than $3 billion online today, and that's just the tip of the iceberg. More than 270 million shoppers are expected to spend more than $83 billion throughout the holiday season, and more than half of those purchases…

  • Cyberattacks on Industry in the Middle East

    by RSAC Contributor on November 24, 2015

    This post comes from Joe Shenouda, CYBERPOL / ECIPS Liaison Officer. He reflects on the cybersecurity space in the Middle East. The Middle East critical infrastructure market is huge and at risk. It will hit 12 billion Euro in revenue by 2018, and it is the victim of a rising and ongoing aggressive cyberwar that barely makes the news. The Middle East's oil industry is huge and has 80 percent of…

  • State of Cybercrime in the Middle East

    by RSAC Contributor on November 2, 2015

    This post comes from Joe Shenouda, CYBERPOL / ECIPS Liaison Officer, on the eve of the RSA Conference 2015 Abu Dhabi. The Middle Eastern cyber security market is around $35 billion at the moment. The cost worldwide of cybercrime is estimated at more than $113 billion per year... It is clear that something needs to be done against the second most common economic crime in the Middle east. Cyber…

  • Protecting your Family Against Threats Associated with the Internet of Toys

    by RSAC Contributor on October 26, 2015

    This post comes from Ed Skoudis, a member of the RSA Conference Advisory Board Remember the Island of Misfit Toys from the enduring holiday classic, Rudolph the Red-Nosed Reindeer? Outcast toys just woefully waiting around for Santa to aid them, hoping to find a suitable home so that they could leave their tear-stained island. Well, those toys wouldn’t have the same problems today—they could be…

  • Network Attacks and Exploitation: A Framework

    by Ben Rothke on October 2, 2015

    The phrase think like a hacker is bandied about incessantly. For most people, they can’t think like a hacker any more than they could think like a podiatrist or a CPA. With that, in Network Attacks and Exploitation: A Framework, (Wiley 978-1118987124), author Matthew Monte has written a great guide that while it won’t help you think like a hacker; it will provide you with the knowledge of how to…

  • Introduction to Social Media Investigation

    by Ben Rothke on August 28, 2015

    Had you Googled social media investigation a decade ago, you would have gotten a handful of responses. Today, it has become a key part of law enforcement, family law and more. Social media played predominantly in the terrible murder last week of journalists Alison Parker and Adam Ward. Law enforcement poured over the social media profiles of the perpetrator. In Introduction to Social Media…

  • How Not To Be Hacked: The Definitive Guide for Regular People

    by Ben Rothke on July 30, 2015

    The Advanced Encryption Standard (AES), also known as Rijndael, is susceptible to brute forces attacks. Mohit Arora of Freescale Semiconductor wrote in 2012 that it would take 1 billion billion years to crack the 128-bit AES key using brute force attack. No one ever said brute force had to be quick. For those that don’t have a billion billion years, the alternative is to bypass the cryptography…

  • Don’t Make the Mistake of Being the Low-Hanging Fruit

    by Tony Bradley on July 17, 2015

    Attackers are typically lazy and many attacks are automated. If you’re an easy target, you will inevitably get breached. You’ve probably heard somebody say something to the effect that they don’t worry too much about security because they don’t have any data of value or interest. Maybe you’ve even said that your business. Unfortunately, that isn’t how attacker logic works. The mistake in this…

  • There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage For Cyberwar

    by Ben Rothke on June 23, 2015

    A point Richard Stiennon makes a number of times in There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage For Cyberwar; is that cyber Pearl Harbor is the wrong metaphor. He feels a more appropriate metaphor is cyber 9/11. At 135 pages, the book is a quick and enthralling read. And at the end you are left wondering if just perhaps, there has already been a cyber 9/11. …

  • How We Foiled Ransomware and Got the Files Back

    by RSAC Contributor on June 5, 2015

    Derek Soeder is a senior threat researcher at Cylance. In this post, Soeder discusses how he and his team reverse engineered ransomware to recover the password used to encrypt client files. In the interest of length, some of the technical steps the team took have been omitted from this story, but the original is now available on the Cylance website. Read on to find out just what Soeder had to do to…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 01 May 2016 23:39:31 -0400.
© 2016 EMC Corporation. All rights reserved.