Symantec Innovates Toward The Future of IoT
Having all of our useful belongings connected to the Internet could have great potential to make our lives easier; however, it also leaves us more vulnerable to security issues. Here's how Symantec is...
View ArticleCriminal Motives Are Simple but Tactics are Crafty
The Underground Economy, Pt. 1 As underground hacking business booms, most of us have little to no visibility into what drives this black market in the cyber world. With this series, Symantec explores...
View ArticleApathy or Denial? Google Claims Security Unnecessary on Android Devices,...
Google's lead engineer for Android security recently announced that the majority of Android users don't need to install mobile security or antivirus, but Symantec and other security organizations have...
View ArticleCyber Shakedowns: A Hacker's New Payday
The Underground Economy, Pt. 2 Cyber extortion and ransomware are among the fastest growing criminal tactics. Sometimes the threats are real, and sometimes they are just a trick to get businesses and...
View ArticleHow Many People Profit From Stolen Credit Cards?
The Underground Economy, Pt. 3 We all know that a common form of information gained in data breaches from individuals and organizations is credit card numbers and verification credentials, but what...
View ArticleHacking as a Service: How Much Does it Cost to Hack an Account?
The Underground Economy, Pt. 4 How much does hiring an underground hacker cost these days? Symantec takes a closer look at Hacking as a Service (HaaS), and why the number of hackers has boomed in...
View ArticleBeyond the Nigerian Prince: Modern 419 Scams
The Underground Economy, Pt. 5 Email scams that prey on people's sympathies are often called, "419 Scams", and have continued to be an easy and inexpensive way for cyber criminals to make money. We...
View ArticleHacking for Bitcoins
The Underground Economy, Pt. 6 While Bitcoins have been a popular cryptocurrency used to protect user identity in various transactions, hackers have found ways to exploit it, through mining...
View ArticlePhishing Post Mega Breach: How The Loss of PII is Only the Start of Your...
The Underground Economy Series, Pt. 7 2013 was declared "The Year of The Mega Breach" by Symantec researchers, but what happens to personal information once it's stolen, and how can users protect...
View ArticleRenting a Zombie Farm: Botnets and the Hacker Economy
The Underground Economy, Pt. 8 The most recent major data breach stealing 1.2 billion usernames and passwords was orchestrated using a botnet, a robot network of "zombie" computers, which, by being...
View ArticleMobile Attacks: Cybercriminals' New Cash Cow
The Underground Economy, Pt. 9 With more connected devices out there, hackers can reach people's information anyplace, anywhere. We look into the various schemes and techniques the cyber criminals use...
View ArticleThe Market for Online Credentials
The Underground Economy, Pt. 10 Online credentials are a hot ticket in the underground economy. 1.2 billion were stolen just this month by a Russian crime ring. So, how do these hackers cash in on...
View ArticleProtecting Your Virtual Network
Virtual data centers are helping businesses become more productive and agile in today's changing world, but they are susceptible to cyber attacks. What is the best course of action to protect and...
View ArticleWhat’s New in the Spam Market?
The Underground Economy, Pt. 11 Spam has been around for years, clogging up email folders with "junk" mail with links that lead to scam websites, or a download of malicious code. But the spam market...
View ArticleBackoff Trojan Is Back: Protect Your Business From The Next POS Breach
The Point of Sale malware, trojan.backoff has been reported to have affected more businesses than was originally determined by the Department of Homeland Security. Find out the best way to protect your...
View ArticleU.S. Banks Breached in Cyberattack: What Bankers Should Do To Stay Protected
At least five U.S. banks have been targeted in a sophisticated cyberattack this month. New York Times reported that hackers breached the network and stole gigabytes of sensitive information, including...
View ArticleBancos en Estados Unidos Afectados por Ciberataques: ¿Qué deben hacer para...
Por lo menos cinco bancos en Estados Unidos han sido blanco de una ola de sofisticados ciberataques en agosto. El periódico New York Times ha reportado que los criminales entraron a sus redes bancarias...
View ArticleHow To Prevent Your Data From Getting Shellshocked
Solutions To Protect Your Data Centers From The Bash Bug "An ounce of prevention is worth a pound of cure." - Ben Franklin. The Shellshock "Bash Bug", a vulnerability discovered last week affecting...
View ArticleDropbox User Credentials Stolen: A Reminder To Increase Awareness In House
Over seven million Dropbox users could have had their credentials stolen by an anonymous hacker. Data breaches and online thefts like this one are happening at alarming rates. How can businesses keep...
View ArticleLos cinco virus más temibles, que aterrorizan computadoras en todo el mundo
¡Feliz Halloween! Te desea el equipo editorial de Symantec ¡Llegó Halloween! Esta época del año cuando fantasmas y monstruos salen a espantarnos aprovechando la oscuridad. Sin embargo a diferencia de...
View Article
More Pages to Explore .....