April 12, 2016 Study Shows Dark Web Isn’t as Large or Illegal as Previously Thought 2 min read - While the Dark Web has a poor reputation, a recent study from security researchers found it may not be as expansive or as criminal as many believe.
February 19, 2016 Taking the Bait: Leaked Data Grabs Attackers’ Attention 2 min read - A recent study highlighted how quickly cybercriminals go after leaked data as well as what they do with that information after it's been compromised.
Software Vulnerabilities January 19, 2016 Blind SQL Injection: The Last Handkerchief Up the Attacker’s Sleeve 2 min read - Blind SQL injections are still being leveraged by actors to steal information. Here's what users need to know about these persistent attacks.
January 11, 2016 In Bad Taste? EU Cookie Law Exploited by Clickjackers 2 min read - The EU's Cookie Law is intended to increase user privacy, but some cybercriminals have found a way to use it for their own gain.
January 7, 2016 How Can I Hack You Today? Cybercriminals Drum Up Business With Solid Customer Support 2 min read - Today's cybercriminals are tasked with providing exemplary customer service and support to go along with their malware offerings.
December 17, 2015 No-Xbox Xmas? Anonymous Hackers Threaten Gaming Network Takedowns 2 min read - Anonymous hackers are threatening to take down gaming networks during the week of Christmas — again. But how real are these threats?
Advanced Threats December 9, 2015 Eight Crazy Hacks: The Worst and Weirdest Data Breaches of 2015 4 min read - 2015 was a big year for cybercriminals. Here's a look at eight of the biggest hacks from the past 11 months and what we can learn from them.
CISO December 7, 2015 Economic Espionage: The Perfect Storm 3 min read - A culture of economic espionage may thrive in places where corruption and organized crime reigns supreme. What should companies know about this threat?
Threat Intelligence December 2, 2015 Researching the Psychology of Hackers 3 min read - Mary Aiken, the director of the CyberPsychology Research Center (CPRC) in Dublin, is leading the charge in the study of the psychology of hackers.
November 13, 2015 Cherry Picker Malware Leaves Without a Trace After Attacking POS Systems 2 min read - A new POS malware known as Cherry Picker has shown the ability to erase itself from a machine, making it incredibly difficult to detect.