Blog Posts Tagged with "cybercrime"

0a1751b23118a107c6c19cf551c34dca

Security of IIoT Devices: Time to Operate in Tandem with the Drive for Productivity?

December 22, 2016 Added by:Jalal Bouhdada

Manufacturers are increasingly adopting IIoT technology with the goal of boosting manufacturing productivity, but are security practices falling by the wayside?

Comments  (0)

76accef69a60a94bb14766fe8bc324ef

The Home of Cyber Security Best Practice: Public or Private Sector?

December 15, 2016 Added by:Bernard Parsons

There are areas where private and public sector can take a leaf out of each other’s books, as the security challenges facing both continue to escalate.

Comments  (0)

E1dfbe313b63976d1d9cdf7c31b343f3

SCADA Systems Offered for Sale in the Underground Economy

June 22, 2015 Added by:Idan Aharoni

Access to such compromised SCADA systems that control various real-world equipment is being sold in the underground economy.

Comments  (0)

37d5f81e2277051bc17116221040d51c

Can Hackers Use FraudFox VM to Defeat Your Fraud Prevention?

January 22, 2015 Added by:Robert Siciliano

So how worried should your business—and customers—be about FraudFox VM ? I sat down with Scott Waddell the Chief Technology Officer of iovation, the fraud prevention experts, to find out what the reality is behind the media headlines.

Comments  (5)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Using Global Intelligence Data to Prevent Online Fraud and Cybercrime

December 12, 2014 Added by:InfosecIsland News

Please join ThreatMetrix and SecurityWeek on Thursday, Dec. 18th, 2014 at 1PM ET for a Live Webcast.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Cybercriminals Use Patriotic Russians to Revive Kelihos Botnet

August 30, 2014 Added by:Eduard Kovacs

Cybercriminals seem to be well aware that many Russian nationals are unhappy with the sanctions imposed by foreign governments against their country, so they're relying on them to revive the Kelihos (Waledac) botnet

Comments  (0)

B1c4090e84dcfac820a2b8ebe6eee82b

New Insights into Email Spam Operations

June 01, 2014 Added by:Gianluca Stringhini

Recently, we have been working on gaining a better understanding of spam operations and of the actors involved in this underground economy. We believe that shedding light on these topics can help researchers develop novel mitigation techniques, and identifying which of the already-existing techniques are particularly effective in crippling spam operations, and should therefore be widely deployed.

Comments  (0)

F2792196079f2c16cd02be6e9ff5b3da

Why are Cybercrimes NOT Always White-collar Crimes?

June 17, 2013 Added by:DHANANJAY ROKDE

A generic definition of a crime would be an act that is in violation of the applicable laws.

Comments  (0)

Cb9aade927a0abf5b0bbdd2a4aaf8716

Don’t Let Your Guard Down: Tragedies Pave Way for Phishing Attacks

April 16, 2013 Added by:Jake Garlie

Tragic events such as what happened during the Boston Marathon creates an opportunity for attackers in the digital world as well. With everyone scrambling for more information, the success rate of a phishing attack at this time can skyrocket.

Comments  (37)

37d5f81e2277051bc17116221040d51c

Just One of Many Internet Scams

March 05, 2013 Added by:Robert Siciliano

A good friend of mine called me recently to ask what I knew about scams from online sales. He had placed an ad on CraigsList for something he was trying to sell and had asked for $150 for the item. He had received a call from a woman and she offered to send him a check for the item....

Comments  (0)

F29746c6cb299c1755e4087e6126a816

What ‘Identity Thief’ The Movie Gets Wrong

February 13, 2013 Added by:Kelly Colgan

The movie “Identity Thief” opened nationwide last weekend, and while we love a good laugh, this flick comes at a cost: the truth. Here are five major plot points that do a disservice to an often-misunderstood crime...

Comments  (1)


Most Liked