cybercrime - News, Features, and Slideshows

cybercrime in pictures

  • In Pictures: 7 steps to protect your business from cybercrime

    In Pictures: 7 steps to protect your business from cybercrime

    As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattacks.

News about cybercrime
Features about cybercrime
  • 13 IT security myths debunked

    They're security myths, oft-repeated and generally accepted notions about IT security that ... simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them.

  • The RSA Hack FAQ

    In the aftermath of RSA saying that its SecureID two-factor authentication tokens may have been compromised in a data breach of the company's network, here are some key questions and answers about the situation.

  • Three years undercover with the identity thieves

    Salesmen and parents know the technique well. It's called the takeaway, and as far as Keith Mularski is concerned, it's the reason he kept his job as administrator of online fraud site DarkMarket.

Whitepapers about cybercrime

  • Getting Started with DMARC

    The cost of Business Email Compromise (BEC), and Impostor email has risen to $5.3B and is impacting employees, business partners and customers of organisations around the world. In order to protect all the groups that are targeted by BEC requires deep visibility into email, and the expertise to build and deploy email authentication policy. Proofpoint Email Fraud Defense (EFD) is designed to block criminals that spoof your trusted domains to trick victims, both inside and outside of your organisation, into sending money and other sensitive information to the attacker. The DMARC (Domain-based Message Authentication Reporting & Conformance) standard is the most powerful weapon to date in the fight against phishing and spoofing. In this guide, you will learn: What DMARC is and how it works The benefits of DMARC Key stats and success stories Step-by-step implementation instructions

  • Business Email Compromise Survival Infographic

  • Why Technology Supply Chain Resiliency Matters

  • Advanced endpoint protection for dummies