Six Indictments in $1.6M StubHub Cybertheft Case

Six people were indicted on Wednesday as part of an international ring of cyber-criminals that hijacked over 1,000 StubHub accounts and defrauded the ticketing service of approximately $1.6 million, the Manhattan district attorney said. The six suspects are accused of being part of a cybercrime ring that hijacked StubHub accounts and purchased tickets with stolen credit…

Details

Cybercriminals Successfully Bypass Two-factor Authentication at some European Banks

Cybercriminals are successfully bypassing two-factor authentication systems at some European banks and transferring funds out of victim accounts, Trend Micro said. The sophisticated attack campaign uses malicious email attachments, phishing sites, rogue DNS servers, fake SSL certificates, and malicious Android apps to steal session tokens used by banks as part of the two-factor authentication scheme,…

Details

The Security and Visibility of Critical National Infrastructure: ViaSat’s Mega-SIEM

There has been plenty of talk about the threat of cyber-attacks on critical national infrastructure (CNI). So what’s the risk, what’s involved in protecting CNI and why, to date, do attacks seem to have been limited? CNI is the utility infrastructure that we all rely on day-to-day; national networks such as electricity grids, water supply…

Details

Treasury Secretary Says Financial Firms Need to Do More to Fight Cybersecurity Threats

Financial firms need to do more to fight cybersecurity threats, Treasury Secretary Jacob Lew told attendees at a financial conference on Tuesday. Lew spoke at the 2014 Delivering Alpha conference produced by CNBC and Institutional Investor. The Department of Treasury released excerpts of his speech today. There have been more than 250 distributed denial of…

Details

TrapX Researchers Discover Attack Embedded in Logistics Devices

This series of articles and the accompanying videos are part of an ongoing project to illuminate the people, products, and vendors that make up the IT security industry. The vendors paid for the video production. Hand held bar code scanners and RFID chips have changed logistics dramatically in recent years. From manufacturing to every stage…

Details

Attackers Target Hotel Business Center Computers

Attackers are increasingly targeting computers in hotel business centers to steal sensitive information, the US Secret Service has warned. A law enforcement task force arrested members of a criminal gang who allegedly installed keylogger malware on computers in several Dallas/Fort Worth area hotels, according to an advisory obtained by security writer Brian Krebs this week.…

Details

Votiro Neutralizes Zero-Day Malware Embedded in Files to Thwart Attacks

Attackers know that if they want to compromise an organization an email with a malicious link or attachment is often the path of least resistance. Armed with a wealth of information freely shared online, attackers use social engineering as a means to entice employees into opening the message, and if the malware is successful, the…

Details

Started by Teenager, Anti-Malware Startup Malwarebytes, Raises $30 Million in Series A Funding

Malwarebytes, started ten years ago by then 14-year-old Marcin Kleczynski, has raised $30 million in its first round of funding, the anti-malware company announced on Thursday. The company said the funding from Highland Capital Partners would be used to increase the global footprint of California-headquartered Malwarebytes, which has over 60 million quarterly active users. Launched…

Details

Security Culture – It’s a Business Decision

Everyday businesses make decisions. The saying, “it’s a business decision,” is loathed by some in the security industry and largely because security was not involved in the decision. Many of these decisions should involve the security team. However, this assumes security’s embedded into the business and not on the outside looking in. Anyone who’s been…

Details

Getting your AppSec program ready for DevOps

You know the illustration The March of Progress?  The name itself might not ring a bell for everyone, but more than likely you’ve seen it: it’s the illustration showing human evolution from the earliest primate ancestors on the far left, throughout various phases of evolutionary development, to modern humans ultimately taking their place on the…

Details