Threats

The latest cybersecurity threats and news to help you protect your data, networks, applications, and devices.

  • How to Hire an Ethical Hacker

    By Ryan O’Leary, WhiteHat Security If your company develops web applications, I hope you aren’t the nervous sort when I tell you that your website is most likely being targeted for hacking as you read this. If you’re a security manager, it really shouldn’t come as a surprise, though. Web apps are the most exploited…


  • How to Hide Malware with a Digitally Signed Executable

    Validating the integrity and authenticity of code in Microsoft applications is important given their near-ubiquity in the enterprise. One mechanism for doing so is a digitally signed file that is supposed to help Windows operating systems run validated code from known good developers. One problem: The mechanism can potentially be bypassed and an attacker can…


  • Hacking Hotel Keys and Point of Sale Systems at DEFCON

    LAS VEGAS. Guests in hotels around the world make use of magnetic stripe-based key cards to gain access to their rooms. According to Weston Hecker, senior security engineer and pentester at Rapid7, all of those cards pose a security risk as there are weaknesses that could enable an attacker to modify cards for malicious purposes.…


  • The Black Hat Kaminsky DNS Flaw: Eight Years Later

      In the summer of 2008, my Black Hat USA experience was dominated by a single topic, from a single speaker, Dan Kaminsky and his big DNS flaw. On July 8, 2008, Kaminsky made a big splash announcing that he had found a huge flaw in the internet and that he had brought together the…


  • 32 Charged with $100 Million Hack of Newswire Services

    The U.S. Securities and Exchange Commission (SEC) has charged 32 people with involvement in a scheme to hack into the newswire services Marketwired, PR Newswire and Business Wire in order to steal hundreds of corporate earnings announcements before they were publicly released. Two Ukrainian men, Ivan Turchynov and Oleksandr Ieremenko, have been charged with hacking…


  • Cybercriminals Use Man-in-the-Middle Attacks to Steal 6 Million Euros

    Europol recently announced that a joint international operation had successfully dismantled a cybercriminal group active in Belgium, Georgia, Italy, Poland, Spain and the U.K., which had been responsible for international fraud totaling 6 million Euros over a very short period of time. “The modus operandi used by this criminal group is the so-called man-in-the-middle and…


  • OneStopParking Hacked

    According to investigative reporter Brian Krebs, the same cybercriminals thought to have been behind the credit card breaches at Target and Home Depot appear to have recently breached the U.S. airport parking service OneStopParking.com. The Rescator cybercrime shop, which was the first to sell payment cards stolen from Target and Home Depot, recently began selling…


  • 5 Tips for Fighting Email Security Threats

    By Fred Touchette, AppRiver In today’s security landscape, email threats are one of the most common strategies utilized among cyber criminals. Much of the early spam traffic was annoying and essentially amounted to junk mail that consumed you and your company’s time. However, it wasn’t long before cyber criminals began using such messages to deliver…


  • Japan Airlines Breach Exposes 750,000 People’s Personal Data

    Japan Airlines (JAL) recently acknowledged that the personal information of as many as 750,000 members of its JAL Mileage Bank (JMB) frequent flyer club may have been stolen when hackers breached the airline’s Customer Information Management System after installing malware on computers that had access to the system. The data potentially accessed includes names, birthdates,…


  • What Does Whitelisting Mean?

    The rising popularity of whitelisting boils down to simple math. With a relatively small number of malware items, it made sense to compile known virus signatures to detect and prevent infection. But with a huge increase in the volume of viruses and other forms of intrusion, it isn’t easy to keep virus signatures up to…


Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis