Menu

Blogs

Showing Blog Posts: 1–10 of 176 tagged Cybercrime

  • Dark Web Globetrotters: A Look at Underground Markets Around the World

    by Jennifer Lawinski on July 25, 2016

    How do cybercriminals operate in the world’s underground markets? Each country has its own distinct markets and own flavor, according to Ryan R. Flores, senior threat research manager at Trend Micro. In his session at RSA Conference APJ 2016 in Singapore, Flores discussed the ways the world’s largest underground markets function, revealing the ways hackers make money off of the data they steal. …

  • Cybersecurity: What Are the Stakes?

    by Jennifer Lawinski on July 18, 2016

    What are the consequences of getting cybersecurity wrong? According to Bryce Boland, CTO for Asia Pacfic of Fire-eye, not having strong defenses isn’t just a question of hurting your brand or your reputation—or even a matter of harming your customers. It’s a question of life or death, and he says cybersecurity teams and business leaders need to pay attention. “They don’t understand the…

  • The War on Leakers: National Security and American Democracy, from Eugene V. Debs to Edward Snowden

    by Ben Rothke on June 22, 2016

    When it comes to Edward Snowden, the question has often been posed as: is he a patriot or a traitor? In The War on Leakers: National Security and American Democracy, from Eugene V. Debs to Edward Snowden (The New Press 1620970635), author Lloyd Gardner, professor emeritus of history at Rutgers University, has written a fascinating work showing that the question of leakers and whistleblowers is…

  • Hadoop Security: Protecting Your Big Data Platform

    by Ben Rothke on May 2, 2016

    As the recent RSA Conference, there were scores of vendors offering various endpoint solutions to protect laptops, desktop and mobile devices. These software solutions are clearly needed given the value of the data on these devices. When it comes to Hadoop, firms are storing massive amounts of data (massive as in petabytes and more); often without the same level of security they have on a laptop. …

  • Avoid Ransomware Attacks by Removing Attack Vectors

    by Rook Security on April 29, 2016

    To date, there are around about 54 different versions of ransomware, and each one has multiple variants. Every day there is a new ransomware victim, and unlike other malware that has come before, ransomware isn’t looking to steal your information or gain unauthorized access. It just wants your money. Should I pay? Can my files be decrypted? How did this happen? These questions get asked a lot…

  • Hacking for Dummies: Fifth Edition

    by Ben Rothke on April 26, 2016

    I’ve enjoyed Kevin Beaver’s Hacking for Dummies series for over a decade. The first edition came out in 2004 and I reviewed the four th edition here. Now in its fif th edition, the books 22 chapters progress from the basics of security to the hardening of an operating system, to the hacking of Web applications and more. The new edition covers Windows 10 and Linux, and includes a number of more…

  • Executive Hotel Rooms Are a Hacker’s Treasure Chest

    by Dale "Woody" Wooden on April 15, 2016

    The flight was long, and all you want to do now is get to your room, have a drink, and go to sleep. You sit down at the desk in your room, log onto the hotel’s Wi-Fi and log into your email. This is about the time your phone beeps. It’s almost dead. Luckily, your room has a charging station right on the desk… How convenient! The iPod needs to be charged too, so it is slipped into the hotel’s…

  • Dark Territory: The Secret History of Cyber War

    by Ben Rothke on April 13, 2016

    With a catchy title of Dark Territory: The Secret History of Cyber War, (Simon & Schuster ISBN 9781476763255), this new book by Pulitzer Prize winning author Fred Kaplan looked to be a winner. Not that it’s not a good book; but for anyone who’s been involved with information security and cyberwarfare, most of the stories are already known and have long been covered. The book gets it title based on…

  • How to Use Anonymized Global Digital Identities to Fight Cybercrime

    by Alisdair Faulkner on April 8, 2016

    At the 2016 RSA Conference, there was a lot of buzz surrounding the importance of global threat intelligence sharing. In fact, of the more than 500 exhibitors at the annual conference, 79 companies include threat intelligence sharing as part of their business model. However, such information sharing only works when done right—in an anonymized way that takes into account each user’s full digital…

  • The Car Hacker's Handbook: A Guide for the Penetration Tester

    by Ben Rothke on March 26, 2016

    The history of technology is replete with instances of security researchers finding a flaw in a product. The vendors then discount the issue and mock the findings; saying it’s only a theoretical vulnerability. They may even resort to suing the researchers. When the vulnerability becomes widespread, these vendors then run to patch their insecure product. We are in that situation now with…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from https://www.rsaconference.com/blogs on Fri, 29 Jul 2016 10:01:31 -0400.
© 2016 EMC Corporation. All rights reserved.