Cyber Crime

Cyber Crime coverage at Computerworld


sequence 01.00 29 58 30.still001
video

Ready for the EU's GDPR compliance deadline? Many companies aren't | Salted Hash Ep 16

CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline.

sequence 01.00 37 12 47.still001
video

The people you call when you've had a breach | Salted Hash Ep 15

Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.

sequence 01.00 10 50 27.still002
video

Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14

Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.

cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

Salted Hash, Steve and Michael
video

What keeps IT administrators up at night? Ransomware, for one | Salted Hash Ep 8

A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.

salted hash title card 0 00 12 20
video

Ransomware marketplaces and the future of malware | Salted Hash Ep 6

Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.

Apple iPhone passcode ID

Easy way to bypass passcode lock screens on iPhones, iPads running iOS 11

Apple still has not patched the hole allowing you to bypass the iPhone lock screen. As of iOS 11.0.2, you can still trick Siri into getting into a person’s iPhone.

pt 2 image
video

U.S. Cyber Command gains status | Salted Hash Ep 1, Pt 2

Reporters Steve Ragan and Fahmida Rashid discuss the implications of the U.S. Cyber Command's recent elevation in status, putting it on the same level as the military’s other functional combatant commands.

sequence 01.00 00 56 43.still001
video

Kaspersky Lab, U.S. Cyber Command, Hollywood hacking and ransomware | Salted Hash Ep 1

Reporters Steve Ragan and Fahmida Rashid unpack the hottest topics in the security realm: Kaspersky Lab's Russia connection, the new status for the U.S. Cyber Command, Hollywood's hacking woes and ransomware.

cwtt 002 ep2 pt3 img
video

GPS spoofing, jamming and real-world threats | Tech Talk Ep 1, Pt 3

The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.

lawsuit judge law court decision sued gavel

Can Microsoft lawyers defeat Putin’s most notorious spy-hackers?

The courtroom tactic should at least slow Fancy Bear down.

cybersecurity

Former NSA chief weighs in on cybersecurity, cyberespionage at ZertoCon

Retired Gen. Michael Hayden held nothing back when addressing cybersecurity pros at the ZertoCon conference in Boston.

05 malware

Wikileaks reveals potent Windows malware from the CIA

It could take over a machine, delete files and upload more malicious code.

Windows Defender does not defend Windows 7 against WannaCry

A number of articles about Wannacry/WannaCrypt point out that Microsoft updated Windows Defender to detect it. But, that's not the whole story for Windows 7 users.

wannacry ransom screenshot

The ransomware epidemic: How to prep for a shakedown

In the wake of the WannaCry ransomware attacks, Dan Larson, technical director at CrowdStrike, offers advice on why organizations should take threats seriously and how to build a strong defense.

windows.firewall.3x2

The Windows firewall is the overlooked defense against WannaCry and Adylkuzz

For defending a Windows PC from LAN side attacks, the built-in firewall gets no respect. It can block TCP port 445 and prevent infection by both the WannaCry ransomware and the Adylkuzz cryptocurrency miner. An XP machine with all...

tech scam sweep Federal Trade Commission (FTC)

FTC to crack down on bogus ‘tech support’ lines

Bogus sites claiming to be Microsoft are the new Nigerian scammers.

idrive pirates

Hackers reportedly hold Disney's newest Pirates of the Caribbean film for ransom

Hackers have reportedly threatened to release 'Pirates of the Caribbean: Dead Men Tell No Tales' if Disney won't pay the ransom.

Load More
Recommended for You