Some spend their money like legitimate earners typically do, but others tend to blow it on fast cars, hookers and drugs.
Cybercriminals Earn Millions, And Spend It Wildly
Some spend their money like legitimate earners typically do, but others tend to blow it on fast cars, hookers and drugs.
GWR Resets Passwords After Accounts Are Accessed
Around 1000 accounts affected, says UK train operator
Q1 Cyber-Attacks on UK Firms Jump 27%
ISP claims every firm experienced 600 attempts to infiltrate their network
Uber Hit with New FTC Breach Settlement
Firm will face civil penalties if it fails to disclose another breach
Defensive Security Podcast Episode 215
https://www.bankinfosecurity.com/nj-ag-smacks-practice-hefty-fine-for-vendor-breach-a-10774
https://www.bankinfosecurity.com/panera-bread-data-leak-persisted-for-eight-months-a-10760
http://www.eweek.com/security/best-buy-delta-sears-hit-by-third-party…
Nation-State Attacks Take 500% Longer to Find
In 50% of cases over the past 12 months, organizations had insufficient endpoint or network visibility to respond successfully.
Google Will Distrust Additional CAs, IT Pros Predict
Just 15% of respondents believe that Google’s decision to distrust Symantec certificates is a one-time event.
UK Launches Offensive Cyber-Weapons Against Islamic State
This marks the first time the UK has systematically and persistently attacked an adversary’s online efforts as part of a wider military campaign.
The Dark Side of APIs: Part 1, API Overview
Application Programming Interfaces (API) are a software design approach which enables software and system developers to integrate with other systems based on a defined set of communication methods. APIs serve as software building blocks and allow for s…