Security Now
Security is top-of-mind, especially right here where Juniper experts share their insights on the latest security trends and breakthroughs
Latest Articles
50 Shades of Hacking: The Slippery Slope of Profiting from Stolen Information

50 Shades of Hacking: The Slippery Slope of Profiting from Stolen Information

grey.jpgIn the world of information technology, there are many kinds of markets. Black markets, where illicit products are sold. Commercial markets, which we might call white markets. And grey markets, defined as:

 

…the trade of a commodity through distribution channels which, while legal, are unofficial, unauthorized, or unintended by the original manufacturer.

 

The recent RAND Corporation report, “Markets for Cybercrime Tools and Stolen Data; Hackers’ Bazaar,” talks about the maturing cybercrime black market, which is both fascinating and disturbing, especially given the size, scope, and aggressive nature of its participants. The report also calls out the notion of a grey market, particularly for zero-days, in which a “legitimate vulnerability market” supports the buying and selling of vulnerabilities. (Spoiler alert: This is already happening and it will create a new class of millionaires.)

Read more...

Juniper Employee
One Simple Fact: It Pays to be Bad

One Simple Fact: It Pays to be Bad

We (the business world) have been too slow to associate a monitory value on digital assets in such a way that warrants protecting them. Think about it: Digital assets, or information of any sort, are not explicitly treated as assets on a balance sheet. They have no real value in the eyes of the owner. If we don’t treat information with the same care that we treat other corporate assets (buildings, equipment, cash and investments), and we can’t even articulate the value of a customer record, then naturally the cost of protecting that record will not become a point for discussion.

Read more...

Juniper Employee
The Tech Conundrum: White Hat vs. Black Hat

The Tech Conundrum: White Hat vs. Black Hat

A Q&A With Juniper Networks Security Researcher Kyle Adams

 

There is a lot of money to be made on the black market for a limited amount of effort. This has created a war over the minds and allegiances of tomorrow’s tech innovators.

Read more...

KyleAdams
  • RAND
Why Your Twitter Account May Be More Valuable Than Your Credit Card

Why Your Twitter Account May Be More Valuable Than Your Credit Card

hacktocash.jpgIn any traditional market, the yield or scarcity of a product influences its price. A recent report from Juniper Networks and The RAND Corporation looked at the economic maturity of the cyber black market – and it found product prices in this illicit market are no different.

Read more...

MichaelCallahan
  • RAND
Hackonomics: A First-of-Its-Kind Economic Analysis of the Cyber Black Markets

Hackonomics: A First-of-Its-Kind Economic Analysis of the Cyber Black Markets

The world of cybercrime is deep, complex, and, according to a new report released today from the RAND Corporation, has become a fully developed market economy.

 

While previous studies have attempted to quantify the impact of the hacker black markets in dollar amounts, the Juniper Networks -sponsored report, “Markets for Cybercrime Tools and Stolen DataHackers’ Bazaar,” provides a never-before-seen look at the hacker black market. Included is an analysis of the economic structure and maturity, and the implications thereof to business and government organizations worldwide.

Read more...

MichaelCallahan
  • RAND
Hacks of Ages

Hacks of Ages

From the click-clack of the Enigma machine that stumped so many for so long to the Anonymous “Million Mask March” on the White House to protest against corporate and government corruption, we’ve assembled an illustrative timeline of the cyber world—and the crime that’s accompanied it. What’s clear is that the black markets that are supporting hackers have rapidly grown into mature economies that are greatly increasing the threats companies face. We’ve chronicled ecosystems, attacks, and products with the hope of offering you a bit of history you may not have known or thought about recently.

Read more...

Recognized Expert Recognized Expert
Top Kudoed Authors
Latest Comments
networkingnow | 11-10-2017
Re: A look into LokiBot infostealer
networkingnow | 11-10-2017
Re: Managing Enterprise Security
networkingnow | 11-08-2017
Re: Introducing the Juniper Networks App for Splunk - Now Available in Splunkbase