Cybercriminals, whose attacks cost organizations millions of dollars a year, do extensive research on their targets. They gather organizational and personal information before deciding which vulnerabilities to exploit.
SurfWatch Labs, a security consultancy, has released a report on research resources cybercriminals use. The purpose of the report is to provide organizations a tool to prevent cyber attacks. The report includes an overview of information resources cybercriminals use to target the victims. Knowing about these resources can help organizations defend against cyber attacks.
The majority of threat awareness training is [...]
A report from cybersecurity firm Trend Micro reveals that the cybercriminal underground in Japan is still only finding its feet despite its potential for tremendous havoc.
Japan may find itself at the crossroads. It faces a growing threat posed by its cybercriminal underground that is still finding its feet and less prolific compared to cybercriminals around the world. It’s a tricky challenge, as law enforcement might also be cornering Japan’s organized crime syndicates do not delve into the darknet to engage in cybercrime.
The entire report titled “The Japanese Underground” by Akira Urano can be found here. [PDF]
In a strikingly similar OPM-like breach, the [...]
The Tor Project has learned that there may be an attempt to incapacitate our network in the next few days through the seizure of specialized servers in the network called directory authorities.
These words were the introduction to Possible upcoming attempts to disable the Tor network, an announcement made early Friday evening, Massachusetts time, where the Tor Project headquarters is located.
The fourth quarter of 2014 has been rough for Tor. First Operation Onymous caught a few darknet market operators, and everyone involved got trolled by European Cyber Crime Commission head Troels Oerting. Then a nasty spat erupted between Pando writer Yasha Levine (@YashaLevine) and [...]