Threats

Stay informed on the latest cybersecurity threats and news to better protect your data, networks, applications, and devices. Our coverage includes emerging vulnerabilities, evolving attack techniques, and the latest security breaches to help you understand and mitigate risks.

  • The Black Hat Kaminsky DNS Flaw: Eight Years Later

      In the summer of 2008, my Black Hat USA experience was dominated by a single topic, from a single speaker, Dan Kaminsky and his big DNS flaw. On July 8, 2008, Kaminsky made a big splash announcing that he had found a huge flaw in the internet and that he had brought together the…


  • 32 Charged with $100 Million Hack of Newswire Services

    The U.S. Securities and Exchange Commission (SEC) has charged 32 people with involvement in a scheme to hack into the newswire services Marketwired, PR Newswire and Business Wire in order to steal hundreds of corporate earnings announcements before they were publicly released. Two Ukrainian men, Ivan Turchynov and Oleksandr Ieremenko, have been charged with hacking…


  • Cybercriminals Use Man-in-the-Middle Attacks to Steal 6 Million Euros

    Europol recently announced that a joint international operation had successfully dismantled a cybercriminal group active in Belgium, Georgia, Italy, Poland, Spain and the U.K., which had been responsible for international fraud totaling 6 million Euros over a very short period of time. “The modus operandi used by this criminal group is the so-called man-in-the-middle and…


  • OneStopParking Hacked

    According to investigative reporter Brian Krebs, the same cybercriminals thought to have been behind the credit card breaches at Target and Home Depot appear to have recently breached the U.S. airport parking service OneStopParking.com. The Rescator cybercrime shop, which was the first to sell payment cards stolen from Target and Home Depot, recently began selling…


  • 5 Tips for Fighting Email Security Threats

    By Fred Touchette, AppRiver In today’s security landscape, email threats are one of the most common strategies utilized among cyber criminals. Much of the early spam traffic was annoying and essentially amounted to junk mail that consumed you and your company’s time. However, it wasn’t long before cyber criminals began using such messages to deliver…


  • Japan Airlines Breach Exposes 750,000 People’s Personal Data

    Japan Airlines (JAL) recently acknowledged that the personal information of as many as 750,000 members of its JAL Mileage Bank (JMB) frequent flyer club may have been stolen when hackers breached the airline’s Customer Information Management System after installing malware on computers that had access to the system. The data potentially accessed includes names, birthdates,…


  • What Does Whitelisting Mean?

    The rising popularity of whitelisting boils down to simple math. With a relatively small number of malware items, it made sense to compile known virus signatures to detect and prevent infection. But with a huge increase in the volume of viruses and other forms of intrusion, it isn’t easy to keep virus signatures up to…


  • 9 Resources to Stay Current on Security Threats

      In the world of IT security, threats are constantly evolving and shifting. It’s critical to stay abreast of the current (and hopefully future) threat landscape. If you’re not staying current, then you’ve already lost. Keeping up to date with security threats will help you mount more effective defenses and also help you educate your…


  • DefCon: Advice on Evading Black Helicopters

    In the modern post-Snowden world, the idea that we’re all constantly being watched is not as farfetched as it once was. But how does an individual who thinks they are being watched all the time avoid being watched? Speaking at last week’s Defcon security conference, Philip Polstra, associate professor of Digital Forensics at Bloomsburg University…


  • Hacker Imprisoned for Trying to Change MCAT Scores

    Bosung Shim, 24, of Rockville, Md., was recently sentenced to three months in prison, followed by seven months in community confinement and three years of supervised release, for hacking into medical school application computers (h/t Softpedia). He was also required to pay $31,653.24 in restitution, and was ordered to forfeit the computer equipment he used…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies