Search Results
2,019 results
Your search is now limited to «Cybercrime and Cybercriminals» expert search.
Information Security Buzz 03/22/2019 19:27
Corin Imai, Senior Security Advisor at DomainTools: “Unfortunately, aside from investing in an efficient email filtering software, there is little that organisations and private individuals can do to keep phishing emails out of their inbox.
More from Information Security Buzz:
CNN (United States) 03/22/2019 13:20
Russian hackers target European governments before elections, security firm warns.
More from CNN (United States):
HealthITSecurity 03/22/2019 13:10
A recent Barracuda report found that hackers are exploiting urgency and personalization in phishing attacks: 70 percent of phishing attacks attempt to establish rapport with victims.
More from HealthITSecurity:
SecurityWeek 03/22/2019 13:08
Hackers believed to be sponsored by the Russian government are targeting European governments for cyber-espionage purposes ahead of the upcoming European elections, FireEye reports.
More from SecurityWeek:
SC Magazine 03/22/2019 13:04
The Oregon DHS said an external digital forensics firm is actively investigating to determine the number of and identities of affected Oregonians.
More from SC Magazine:
Tech-Wreck InfoSec Blog 03/22/2019 10:04
Attackers Abuse Legacy Protocols, Credential Dumps to Breach Cloud Accounts (03/19/2019) In a six-month study of major cloud service tenants, Proofpoint researchers observed massive attacks leveraging legacy protocols and credential dumps to increase the speed and effectiveness of brute-force account compromises at scale.
More from Tech-Wreck InfoSec Blog:
Kaiser Health News 03/22/2019 08:30
A report warns that artificial intelligence can be easily duped with tiny pieces of data. The authors say bad actors could hack into records and make it seem like there's an illness there that isn't. But more likely is that doctors, hospitals and other organizations could manipulate the A.I. in billing or insurance software in an effort to maximize the money coming their way. In other health technology news: a day of reckoning is coming for digital health, the FDA calls for tighter security of electronic health records following a KHN report, and data breaches from the states.
CNET News 03/22/2019 08:12
Social media makes researching potential victims easy, and phishing software is so robust that cyberattackers can quickly create graphic design and text precisely tailored for specific targets.
More from CNET News:
Cyber Defense Magazine 03/22/2019 08:00
Google white hat hacker found new bug class in Windows – Cyber Defense Magazine.
More from Cyber Defense Magazine:
Softpedia 03/22/2019 03:31
A security vulnerability in Google’s Chromium allows hackers to reach personal data stored on Android devices.
More from Softpedia:
Dark Reading 03/21/2019 18:50
The group now employs a new administrative interface for managing its campaigns, as well as documents that link to SQL databases for downloading its code.
More from Dark Reading:
Malwarebytes Unpacked 03/21/2019 11:00
Cybercriminals have also been targeting cloud-based accounts by leveraging Internet Message Access Protocol (IMAP) for password-spray attacks, according to Proofpoint.
More from Malwarebytes Unpacked:
ZDNet - Blogs 03/21/2019 09:46
Attacks didn't stop, though, but they continued throughout the week, with hackers trying to take over as many sites as they could before site owners applied the patch.
More from ZDNet - Blogs:
E Hacking News 03/21/2019 09:31
As stated in a report by Imperva, the hacker can keep a record of the queries which have been already asked and resume the process from there on upon your next visit onto any of his infectious websites.
More from E Hacking News:
Engadget 03/21/2019 09:03
Russian hackers are targeting government systems ahead of the EU parliament election, according to cybersecurity company FireEye. The firm says that two state-sponsored hacking groups -- APT28 (aka Fancy Bear) and Sandworm -- have been sending out au...
More from Engadget:

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded

Analysts

Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities

Sources

Strategic Scenarios

Trends

Hints:

On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 


  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications