Loading...
Internet Security Directory
Dark Reading: Attacks & Breaches
-
Internet Marketing in North Carolina
Home
Browse
Contribute
Submit
About Us
Contact
/
Home
/
Internet Security: Articles
/
Internet Security: Dark Reading
/Dark Reading: Attacks & Breaches
Dark Reading: Ransomware Has Evolved, And Its Name Is Doxware
Votes:19
Comments:0
The latest form of malware holds computers hostage and compromises the privacy of conversations, photos, and sensitive files. 1/4/2017 By Chris Ensey In recent years, ransomware has become a gr
READ MORE
http://www.darkreading.com/attacks-breaches/ransomware-has-evolved-and...
Dark Reading: Spammers Work Up A Hailstorm
Votes:30
Comments:0
In their constant effort to evade anti-spam filters, spammers have devised a new way to deliver junk mail to your inbox. 12/19/2016 By Jai Vijayan With the best anti-spam systems being able to
READ MORE
http://www.darkreading.com/attacks-breaches/spammers-work-up-a-hailsto...
Dark Reading: Relentless DDoS Attack Incidents Raise Alarm For Businesses
Votes:26
Comments:0
Threat actors increasingly using DDoS tactics as a smokescreen to hide other malicious activity, Neustar report shows. 10/4/2016 By Jai Vijayan If there's one thing consistent about DDoS attack
READ MORE
http://www.darkreading.com/attacks-breaches/relentless-ddos-attack-inc...
Dark Reading: Education Now Suffers The Most Ransomware Attacks
Votes:13
Comments:0
New data shows ransomware rates worldwide doubling and tripling in past 12 months. 9/21/2016 By Kelly Jackson Higgins When you think ransomware victim, most likely your first thought is a hospi
READ MORE
http://www.darkreading.com/attacks-breaches/education-now-suffers-the-...
Dark Reading: Hit-And-Run Tactics Fuel Growth In DDoS Attacks
Votes:31
Comments:0
A majority of organizations in Imperva DDoS study suffer multiple consecutive attacks. 8/23/2016 By Jai Vijayan Many threat actors behind distributed denial of service (DDoS) attacks against en
READ MORE
http://www.darkreading.com/attacks-breaches/hit-and-run-tactics-fuel-g...
Dark Reading: Large Botnet Comes Back To Life -- With More Malware
Votes:26
Comments:0
The Necurs botnet associated with Dridex and Locky is back after three-week haitus. 6/23/2016 By Jai Vijayan A botnet associated with the huge volumes of Dridex and Locky-laden emails in recent
READ MORE
http://www.darkreading.com/attacks-breaches/large-botnet-comes-back-to...
Dark Reading: Ransomware Now Comes With Live Chat Support
Votes:6
Comments:0
Victims of a new version of Jigsaw now have access to live chat operators to help them through the ransom payment process, Trend Micro says. 6/10/2016 By Jai Vijayan Getting hit by ransomware i
READ MORE
http://www.darkreading.com/attacks-breaches/ransomware-now-comes-with-...
Dark Reading: 2015: The Year Of 'Attacks on Trust'
Votes:27
Comments:0
Nine attacks that leveraged stolen, compromised, or unprotected cryptographic keys and digital certificates show how easy it is for cybercriminals to bypass security controls and hide their actions.
READ MORE
http://www.darkreading.com/attacks-breaches/2015-the-year-of-attacks-o...
Dark Reading: 15 Cybersecurity Lessons We Should Have Learned From 2015, But Pro...
Votes:24
Comments:0
Another infosec year is almost in the books. What did all the breaches, vulnerabilities, trends, and controversies teach us? 12/28/2015 By Sara Peters As is the case every year in the cybersecu
READ MORE
http://www.darkreading.com/attacks-breaches/15-cybersecurity-lessons-w...
Dark Reading: Deceit As A Defense Against Cyberattacks
Votes:18
Comments:0
A new generation of 'threat deception' technology takes the honeypot to a new, enterprise level. 10/1/2015 By Kelly Jackson Higgins It's not technically hacking back, but it's definitely a more
READ MORE
http://www.darkreading.com/attacks-breaches/deceit-as-a-defense-agains...
Dark Reading: 4 Unsolved Mysteries About Duqu 2.0
Votes:11
Comments:0
Several key questions remain surrounding the nation-state attack targeting intel at Kaspersky Lab, international participants at the Iranian nuclear negotiations, and other organizations. 6/11/2015
READ MORE
http://www.darkreading.com/attacks-breaches/4-unsolved-mysteries-about...
Dark Reading: Hackers Breaking New Ground With Ransomware
Votes:38
Comments:0
The tools and tactics being used to go after victims reveal growing sophistication, and gamers need to look out, security researchers say. 3/13/2015 By Jai Vijayan The enormous success which ha
READ MORE
http://www.darkreading.com/attacks-breaches/hackers-breaking-new-groun...
Dark Reading: Long-Running Cyberattacks Become The Norm
Votes:12
Comments:0
Many companies are so focused on the perimeter that they have little idea what's going on inside the network. 1/2/2015 By Jai Vijayan One thing that the depressing string of data breaches this
READ MORE
http://www.darkreading.com/attacks-breaches/long-running-cyberattacks-...
Dark Reading: Expired Antivirus Software No. 1 Cause Of Unprotected Windows 8 PC...
Votes:37
Comments:0
New data from Microsoft shows that nearly 10% of Windows 8 users are running expired AV software on their systems, making them four times more likely to get infected. 11/13/2014 By Jai Vijayan
READ MORE
http://www.darkreading.com/attacks-breaches/expired-antivirus-software...
Dark Reading: POS Malware Continues To Evolve
Votes:15
Comments:0
New report out today details three prevalent families. 11/11/2014 By Ericka Chickowski With a little over two weeks until the holiday shopping season kicks off in earnest, a picture of the evol
READ MORE
http://www.darkreading.com/attacks-breaches/pos-malware-continues-to-e...
Dark Reading: Stuxnet 'Patient Zero' Attack Targets Revealed
Votes:39
Comments:0
Researchers name five Iranian industrial control systems companies attacked in 2009-2010, and they question whether USB sticks were really the method of infection. 11/11/2014 By Sara Peters Res
READ MORE
http://www.darkreading.com/stuxnet-patient-zero-attack-targets-reveale...
Dark Reading: From Malware To Breach
Votes:26
Comments:0
New report maps attack behavior after the initial exploit gets dropped on a machine in a victim organization. 11/6/2014 By Kelly Jackson Higgins Got malware? More than likely you do, but don't
READ MORE
http://www.darkreading.com/attacks-breaches/from-malware-to-breach/d/d...
Dark Reading: Backoff PoS Malware Boomed In Q3
Votes:39
Comments:0
The security firm Damballa detected a 57% increase in infections of the notorious Backoff malware from August to September. 10/24/2014 By Brian Prince Try as they might, retailers don't seem to
READ MORE
http://www.darkreading.com/attacks-breaches/backoff-pos-malware-boomed...
Dark Reading: Stuxnet Exploits Still Alive & Well
Votes:37
Comments:0
Exploits continue abusing a four-year-old bug used in the Stuxnet attack, Kaspersky Lab says. 8/14/2014 By Kelly Jackson Higgins One of the main vulnerabilities used in the infamous Stuxnet att
READ MORE
http://www.darkreading.com/attacks-breaches/stuxnet-exploits-still-ali...
Dark Reading: Ram Scraper Malware: Why PCI DSS Can't Fix Retail
Votes:17
Comments:0
There is a gaping hole in the pre-eminent industry security standard aimed at protecting customers, credit card and personal data 7/23/2014 By Brian Riley Target, Neiman Marcus, Michael's, and
READ MORE
http://www.darkreading.com/attacks-breaches/ram-scraper-malware-why-pc...
Dark Reading: Stop Targeted Attackers
Votes:30
Comments:0
All cyber-attackers aren't equal. Focus more attention on exploits made just for you By Ericka Chickowski March 20, 2014 Not so long ago, the main threats in cyber-security were random: viruses
READ MORE
http://www.darkreading.com/attacks-breaches/stop-targeted-attackers/24...
Dark Reading: Point-Of-Sale System Attack Campaign Hits More Than 40 Retailers
Votes:40
Comments:0
Tor-camouflaged 'ChewBacca' payment card-stealing Trojan doesn't appear to be related to Target, RSA researchers say By Kelly Jackson Higgins January 30, 2014 Another day, another point-of-sale
READ MORE
http://www.darkreading.com/attacks-breaches/point-of-sale-system-attac...
Dark Reading: Tech Insight: Defending Point-Of-Sale Systems
Votes:4
Comments:0
US-CERT publishes advice on defending POS systems against attacks like those against Target, Neiman Marcus By John H. Sawyer January 24, 2014 Major hacks at retailers that include Target and Ne
READ MORE
http://www.darkreading.com/attacks-breaches/tech-insight-defending-poi...
Dark Reading: 'Mystery' Malware Files Often Missed In Cleanup
Votes:33
Comments:0
Some malware infections leave stealthy beachhead files behind after the main malware is detected and removed By Kelly Jackson Higgins December 10, 2013 The newly disrupted ZeroAccess botnet was
READ MORE
http://www.darkreading.com/attacks-breaches/mystery-malware-files-ofte...
Dark Reading: Businesses Suffer An Average Of 9 Targeted Attacks Per Year
Votes:9
Comments:0
New study reveals breadth -- and apparent success -- of the typical advanced persistent threat (APT)-type attack By Kelly Jackson Higgins December 03, 2013 Advanced persistent threat (APT)-styl
READ MORE
http://www.darkreading.com/attacks-breaches/businesses-suffer-an-avera...
Dark Reading: Stuxnet's Earlier Version Much More Powerful And Dangerous, New An...
Votes:21
Comments:0
ICS/SCADA expert Ralph Langner analyzes how Stuxnet shifted from super-stealthy to simpler, and dispels common misconceptions about the infamous Stuxnet attack on Iran's nuclear facility -- including
READ MORE
http://www.darkreading.com/attacks-breaches/stuxnets-earlier-version-m...
Dark Reading: Chinese APT Campaigns May Be More Connected Than Previously Though...
Votes:22
Comments:0
Researchers discover malware 'arms dealer' layer that supports multiple cyberespionage attacks By Kelly Jackson Higgins November 12, 2013 Chinese cyberespionage actors have been discovered shar
READ MORE
http://www.darkreading.com/attacks-breaches/chinese-apt-campaigns-may-...
Dark Reading: Distributing Malware Through Future App Stores
Votes:22
Comments:0
Difficult times ahead for app markets as professional malware developers ramp their evasion techniques By Gunter Ollmann October 07, 2013 As corporate networks continue to succumb to the bleati
READ MORE
http://www.darkreading.com/attacks-breaches/distributing-malware-throu...
Dark Reading: 5 Lessons From Real-World Attacks
Votes:9
Comments:0
Tales from the trenches show that even small organizations are in the bull's eye By Kelly Jackson Higgins October 03, 2013 INTEROP -- New York City -- Take it from Harry Sverdlove, CTO of secur
READ MORE
http://www.darkreading.com/attacks-breaches/5-lessons-from-real-world-...
Dark Reading: Rise Of The 'Hit-And-Run' APT
Votes:31
Comments:0
A new model of cyberespionage is emerging that relies on cybermercenaries hired to break in, steal information, and then leave -- with specific targeted information By Kelly Jackson Higgins Septem
READ MORE
http://www.darkreading.com/attacks-breaches/rise-of-the-hit-and-run-ap...
Dark Reading: The Changing Face Of Advanced Persistent Threats
Votes:8
Comments:0
APTs and targeted attacks are becoming more mainstream. Is your enterprise ready? By Robert Lemos August 19, 2013 Earlier this year, a small aerospace company asked AccessData, a forensics and
READ MORE
http://www.darkreading.com/attacks-breaches/the-changing-face-of-advan...
Dark Reading: The Increasing Failure Of Malware Sandboxing
Votes:12
Comments:0
Virtualization limits of sandboxes impede threat detection By Gunter Ollmann August 14, 2013 The past three years have seen many organizations adopt and deploy in-house dynamic sandboxing techn
READ MORE
http://www.darkreading.com/attacks-breaches/the-increasing-failure-of-...
Dark Reading: 'Hangover' Persists, More Mac Malware Found
Votes:7
Comments:0
Attackers behind the Operation Hangover cyberspying campaign out of India found dropping OS X malware, covering their tracks online By Kelly Jackson Higgins July 18, 2013 Researchers who this s
READ MORE
http://www.darkreading.com/attacks-breaches/hangover-persists-more-mac...
Dark Reading: Free 'Active Defense' Tools Emerge
Votes:18
Comments:0
Ammunition for fighting back against cyberattackers in subtle yet disruptive ways is becoming available in open source By Kelly Jackson Higgins July 11, 2013 A wave of open-source tools for tur
READ MORE
http://www.darkreading.com/attacks-breaches/free-active-defense-tools-...
Dark Reading: NSA Leak Ushers In New Era Of The Insider Threat
Votes:28
Comments:0
A determined user or contractor hell-bent on leaking data can't be stopped, but businesses should revisit their user access policies and protections By Kelly Jackson Higgins June 12, 2013 If th
READ MORE
http://www.darkreading.com/attacks-breaches/nsa-leak-ushers-in-new-era...
Dark Reading: The Network And The Malware
Votes:16
Comments:0
This is the first installment of a two-part series in which Mike Rothman and Wendy Nather will tackle how to use the network for detection, monitoring, and forensics of advanced malware By Mike Rot
READ MORE
http://www.darkreading.com/attacks-breaches/the-network-and-the-malwar...
Dark Reading: Chinese Cyberespionage: Brazen, Prolific, And Persistent
Votes:29
Comments:0
New research from multiple sources illustrates dominant role of China in cyberespionage By Kelly Jackson Higgins April 30, 2013 China, China, China: New data and intelligence is shedding more l
READ MORE
http://www.darkreading.com/attacks-breaches/chinese-cyberespionage-bra...
Dark Reading: Security Vendors In The Aftermath Of Targeted Attacks
Votes:40
Comments:0
RSA, Microsoft, and Bit9 executives share insights on how the high-profile targeted breaches they suffered have shaped things By Kelly Jackson Higgins April 24, 2013 It has been months now sinc
READ MORE
http://www.darkreading.com/attacks-breaches/security-vendors-in-the-af...
Dark Reading: Botnet Business Booming
Votes:4
Comments:0
Some dismantled botnets rank in the top ten most prevalent as old bot malware gets repurposed, according to new Fortinet report Mar 19, 2013 By Kelly Jackson Higgins If there's one thing we've
READ MORE
http://www.darkreading.com/attacks-breaches/botnet-business-booming/d/...
Dark Reading: Stuxnet's Earlier Version Much More Powerful And Dangerous, New An...
Votes:10
Comments:0
ICS/SCADA expert Ralph Langner analyzes how Stuxnet shifted from super-stealthy to simpler, and dispels common misconceptions about the infamous Stuxnet attack on Iran's nuclear facility -- including
READ MORE
http://www.darkreading.com/attacks-breaches/stuxnets-earlier-version-m...
Dark Reading: How To Detect Zero-Day Malware And Limit Its Impact
Votes:25
Comments:0
An increasing percentage of malware has never been seen before. Here are some tips for stopping it Nov 08, 2012 [Excerpted from "How to Detect Zero-Day Malware and Limit Its Impact," a new, free
READ MORE
http://www.darkreading.com/attacks-breaches/how-to-detect-zero-day-mal...
Dark Reading: Scope Of APTs More Widespread Than Thought
Votes:24
Comments:0
Researcher uncovers hundreds of different custom malware families used by cyberspies -- and discovers an Asian security company conducting cyberespionage Aug 02, 2012 By Kelly Jackson Higgins T
READ MORE
http://www.darkreading.com/attacks-breaches/scope-of-apts-more-widespr...
Dark Reading: Madi Malware: Advanced Persistent Threat Or Just A Threat?
Votes:28
Comments:0
Security researchers are calling Madi an example of an advanced persistent threat, but what makes an APT an APT? Jul 19, 2012 By Brian Prince Earlier this week, security researchers at Kaspersk
READ MORE
http://www.darkreading.com/attacks-breaches/madi-malware--advanced-per...
Dark Reading: Stuxnet, Duqu, Flame Targeted Illegal Windows Systems In Iran
Votes:27
Comments:0
Pirated software the norm in the region Jun 19, 2012 By Kelly Jackson Higgins An oft-overlooked detail about Stuxnet, Duqu, and Flame is that the attacks all targeted Windows machines in Iran e
READ MORE
http://www.darkreading.com/attacks-breaches/stuxnet-duqu-flame-targete...
Dark Reading: 'Conclusive' Link Found Between Stuxnet And Flame
Votes:15
Comments:0
Researchers say Flame predates Stuxnet and shares some source code with first-generation version of Stuxnet Jun 11, 2012 By Kelly Jackson Higgins A new twist in the mystery that is Stuxnet/Duqu
READ MORE
http://www.darkreading.com/attacks-breaches/conclusive-link-found-betw...
Dark Reading: How Flame Hid In Plain Sight For Years
Votes:7
Comments:0
Easy-to-crack encryption likely helped keep Flame alive, as well as its resemblance to conventional software May 31, 2012 By Kelly Jackson Higgins One of the most striking aspects about the new
READ MORE
http://www.darkreading.com/attacks-breaches/how-flame-hid-in-plain-sig...
Dark Reading: 'Flame' Fans Notion Of More Weapons Yet To Be Found
Votes:25
Comments:0
Targeted attack looks a lot like conventional spyware, but with some major twists -- and questions about links to Stuxnet, Duqu May 29, 2012 By Kelly Jackson Higgins It's big -- 20 times the si
READ MORE
http://www.darkreading.com/attacks-breaches/flame-fans-notion-of-more-...
Dark Reading: Advanced Attacks Call For New Defenses
Votes:18
Comments:0
With conventional wisdom now that 'advanced attacks happen,' has the time come to create the next-generation sandbox or other containment method? Apr 30, 2012 By Kelly Jackson Higgins This is t
READ MORE
http://www.darkreading.com/attacks-breaches/advanced-attacks-call-for-...
Dark Reading: Malware Mania: Badware And Botnets Explode
Votes:11
Comments:0
McAfee's new threat report for Q1 shows bots and PC and mobile malware on the rise May 24, 2012 By Kelly Jackson Higgins Malware was on roll during the first quarter of this year as the number
READ MORE
http://www.darkreading.com/attacks-breaches/malware-mania-badware-and-...
Dark Reading: How To Detect And Root Out Sophisticated Malware
Votes:16
Comments:0
New report offers insights on excising that hard-to-detect malware May 24, 2012 By John H. Sawyer [Excerpted from "Rooting Out Sophisticated Malware," a new report posted this week on Dark Read
READ MORE
http://www.darkreading.com/attacks-breaches/how-to-detect-and-root-out...
Dark Reading: Hunting Botnets In The Cloud
Votes:29
Comments:0
Combining cloud, crowdsourcing, and big data to find and quash botnets on a larger scale Nov 07, 2012 By Kelly Jackson Higgins Comparing botnet command-and-control (C&C) traffic or malware with
READ MORE
http://www.darkreading.com/attacks-breaches/hunting-botnets-in-the-clo...
Dark Reading: APT-Type Attack A Moving Target
Votes:7
Comments:0
Malware just a small piece of the puzzle in advanced attacks, and traditional cybercriminals are also getting more 'persistent' Mar 13, 2012 By Kelly Jackson Higgins Targeted attacks are evolvi
READ MORE
http://www.darkreading.com/attacks-breaches/apt-type-attack-a-moving-t...
Dark Reading: Damage Mitigation As The New Defense
Votes:31
Comments:0
Containing the attacker in today's persistent threat environment Apr 05, 2012 By Kelly Jackson Higgins This is the second installment in an occasional series on security's new reality. Any D
READ MORE
http://www.darkreading.com/attacks-breaches/damage-mitigation-as-the-n...
Dark Reading: How To Detect And Defend Against Advanced Persistent Threats
Votes:18
Comments:0
There are no silver bullets for APTs, but there are steps your organization can take. Here's a look at what you can do Mar 16, 2012 By Michael Cobb [Excerpted from "Detecting and Defending Agai
READ MORE
http://www.darkreading.com/attacks-breaches/how-to-detect-and-defend-a...
Dark Reading: Security's New Reality: Assume The Worst
Votes:4
Comments:0
A more fatalistic view that attackers have already infiltrated the organization presents a different way of looking at -- and marketing -- security Mar 15, 2012 By Kelly Jackson Higgins First i
READ MORE
http://www.darkreading.com/attacks-breaches/securitys-new-reality-assu...
Dark Reading: Smarter, Stealthier, Sneakier Malware
Votes:26
Comments:0
From Stuxnet to Duqu to new incarnations of Zeus, sophisticated attacks are becoming more numerous -- and harder to stop Feb 08, 2012 By Tim Wilson Stuxnet. Duqu. Advanced persistent threats. E
READ MORE
http://www.darkreading.com/attacks-breaches/smarter-stealthier-sneakie...
Dark Reading: Why Small Businesses Are Vulnerable To Cybercrime -- And What They...
Votes:5
Comments:0
SMBs have more valuable data than consumers and fewer defenses than large enterprises. Have they become the sweet spot for the bad guys? Jun 14, 2011 By Neil Roiter [Excerpted from "Small Busin
READ MORE
http://www.darkreading.com/attacks-breaches/why-small-businesses-are-v...
Dark Reading: Verizon Data Breach Report: Bad Guys Target Low-Hanging Fruit
Votes:4
Comments:0
Cybercriminals steering away from big caches of data, using simpler tactics to crack smaller enterprises Apr 19, 2011 By Tim Wilson Cybercriminals are making a leap from the big score to easy m
READ MORE
http://www.darkreading.com/attacks-breaches/verizon-data-breach-report...
Dark Reading: An Advanced Persistent Threat Reality Check
Votes:4
Comments:0
Prevention is often futile, so how you manage the aftermath of discovering an intrusion can make all the difference in proper remediation Jan 27, 2011 By Kelly Jackson Higgins Most victims of t
READ MORE
http://www.darkreading.com/attacks-breaches/an-advanced-persistent-thr...
Dark Reading: Crimeware Toolkits Driving Most Online Malware
Votes:28
Comments:0
Symantec report connects the dots in rise in malware and easy-to-use crimeware kits Jan 20, 2011 By Kelly Jackson Higgins DIY crimeware kits are all the rage -- more than 60 percent of maliciou
READ MORE
http://www.darkreading.com/attacks-breaches/crimeware-toolkits-driving...
Dark Reading: Stuxnet: How It Happened And How Your Enterprise Can Avoid Similar...
Votes:24
Comments:0
A look back at one of the industry's most complex attacks -- and the lessons it teaches May 17, 2011 By Michael Davis [Excerpted from "Stuxnet Reality Check: Are You Prepared For A Similar Atta
READ MORE
http://www.darkreading.com/attacks-and-breaches/stuxnet-how-it-happene...
Dark Reading: The Curious Case Of Unpatchable Vulnerabilities
Votes:37
Comments:0
Verizon's annual breach investigations reports have consistently shown that fewer -- and in the most recent edition, only five of 381 -- attacks exploit vulnerabilities that could have been patched. S
READ MORE
http://www.darkreading.com/the-curious-case-of-unpatchable-vulnerabili...
Dark Reading: Five Security Tools Every Small Business Must Have
Votes:25
Comments:0
Small businesses often are short on security skills, staffing and budget. Here are five tools that can help Jan 08, 2013 By Michael Cobb Excerpted from "Five Security Tools Every Small Business
READ MORE
http://www.darkreading.com/attacks-breaches/five-security-tools-every-...
Dark Reading: Microsoft Studies 10 Years Of Malware And Threats
Votes:12
Comments:0
Special report maps malware evolution, and how the least-infected regions keep botnets, other threats at bay Mar 05, 2012 By Kelly Jackson Higgins RSA CONFERENCE 2012 -- San Francisco, Calif. -
READ MORE
http://www.darkreading.com/attacks-breaches/microsoft-studies-10-years...
Dark Reading attacks and breaches articles
Internet Marketing in Tennessee
,
Internet Marketing in Connecticut
Sites of Interest
Internet Marketing in Pennsylvania
New Items
Dark Reading: Ransomware Has E
Dark Reading: Newly Discovered
CIO: 4 information security th
CSO: Remain paranoid, err vigi
CSO: Ransomworm: the next leve
InfoWorld - Security Adviser:
PCWorld: The year ransomware b
PC Magazine: The Best Encrypti
InfoWorld - Security Adviser:
Dark Reading: Spammers Work Up
-
Subscribe
Internet Marketing in California
Internet Marketing in Washington
Search
Search
Search
Search
Login
Privacy Policy