Quantcast
Channel: DarkmattersDarkmatters
Browsing all 43 articles
Browse latest View live

Cybercrime exploit kits are booming

In a new DNS Threat Index report from Infoblox, in the third quarter of 2015, malicious domain creation for exploit kits increased 75 percent. This indicates that the command-and-control (C&C)...

View Article



How Hard Is Cybersecurity Exactly?

Cybersecurity is tough. You are supposed to figure out how to control the uncontrollable. You are expected to guess the unguessable. Then you need to measure what you did and give it a value. And you...

View Article

Shedun Trojan goes solo

Mobile security company Lookout, warned users earlier this month about auto-rooting Android malware when they detected over 20,000 samples of trojanized adware featuring Shuanet, ShiftyBug, and Shedun....

View Article

China, Japan, South Korea Talk Cyber Issues

In mid-October, China, Japan, and South Korea convened for the second time in order to discuss potential cooperation on cyber issues such as international rules governing cyberspace, and cooperation...

View Article

Image may be NSFW.
Clik here to view.

Cable modem remote backdoor, inside a backdoor

A backdoor inside a backdoor. Sounds ominous doesn't it? The bad guys simply love it Your Internet Service Provider (ISP) can be your weakest link, in the realm of cable modem security. Some ISP's rank...

View Article


Luxury hotel chain hit with malware

If you stayed at the Starwood Luxury hotel chain between November 2014 and October 2015—payment systems at 54 of its hotels in North America was infected with malware. Customers who did not use the...

View Article

Hacking — Why Jonnie Can't Hack

Hacking is the closest thing the general public knows to be an unknown, unexplained power that some people possess — like magic. Therefore Hacker is a powerful word for the general public. It means a...

View Article

Security and the holiday shopping season

The shopping season is about to erupt in full swing beginning on Black Friday. Many retailers are even extending their Cyber Monday sales to be cyber week sales. This is the time when consumers should...

View Article


Image may be NSFW.
Clik here to view.

How to Get the C-Suite Fired in the 21st Century

C-Suite mergers and acquisitions   Hola readers! (Being in Panama, I need to improve my Española) Hoping everyone had a safe and joyous Thanksgiving. Before launching my own company in July, I worked...

View Article


Cyber Monday shopping requires elevated cyber-vigilance

According to the National Retail Federation's (NRF) consumer sentiment survey, 121 million (49.5%) shoppers plan to shop online on Cyber Monday. “Unlike ten years ago, we live in a world in which you...

View Article

Image may be NSFW.
Clik here to view.

Locked iPhone or iPad held for ransom? It's a quick fix

One of the latest scams that the Better Business Bureau (BBB) has on their radar this holiday season involves malware that locks a victims phone for ransom. This scam is currently limited to iPhone and...

View Article

Everything’s “Big” When It Comes To Cyberterrorism – And It Shouldn’t Be

In the aftermath of the Paris terrorist attacks, there has been increased scrutiny as to how these individuals successfully pulled off coordinated attacks without intelligence and security services...

View Article

One out of five CEO's concerned about information security

According to a recent KPMG 2015 CEO Outlook Study of more than 1200 global CEO's from Australia, China, France, Germany,India, Italy, Japan, Spain, UK and the US—one out of five CEO's indicated that...

View Article


Vulnerable OS? Pony-up with CryptoWall 4.0

There is a new string of windows drive-by-campaigns that is spreading the Angler Exploit Kit via injection of malicious code into compromised web pages. This new "cocktail" of malware steals windows...

View Article

Tighten up your cybersecurity strategies now

While there are many security offerings to help an organization better protect itself from the onslaught of cyber threats knocking on its perimeter, no one solution is enough to reduce risk in this...

View Article


UK Pub chain data breach

UK Pub chain JD Wetherspoon announced today that their company has suffered a data breach of customer and staff information that was accessed illegally by a third-party. No financial data or customer...

View Article

China and the United States to Hold Senior-Level Cybersecurity Talks

In December 2015, China and the United States began their first ministerial-level discussions on cybersecurity. According to a news report, the Director of the Department of Homeland Security and the...

View Article


Image may be NSFW.
Clik here to view.

Security Intelligence—Know your enemy

According to a recent KPMG 2015 CEO Outlook Study organizations need to invest in the right tools and the right people. The study found that organizations need visibility first in order to know if they...

View Article

It could be a BackStab—if your backup is not encrypted

Palo Alto Networks recently released a new report that depicts an attack technique called BackStab. This attack has the ability to steal backup data from Mac and windows infected computers. Though...

View Article

Image may be NSFW.
Clik here to view.

Threats to Defense Contractors—it’s no longer just Ones and Zeros

Today, I would like to bring to your attention another threat that specifically creates a threat to the Government Defense Contractor community. Is it a new zero day? Nope Is it information regarding a...

View Article
Browsing all 43 articles
Browse latest View live




Latest Images