Blog Posts Tagged with "Cyber Crime"
Fraud Files: Pay Later, Pilfer Now
December 18, 2012 Added by:Kelly Colgan
Services such as BillMeLater, a PayPal company that allows customers to make purchases on credit after a simple sign-up process and credit check, have created an identity theft trend and left victims fighting to clear their names...
Comments (0)
Group-IB: Banking trojan «Carberp» sales were reborn with bootkit module
December 17, 2012 Added by:Pierluigi Paganini
During the last week introduced you the excellent work done by the Group-IB, a security firm resident of the Moscow-based Skolkovo Foundation that has received a grant in the amount of 30m rubles (approximately $966,000) for the development of a global counter-cybercrime system named the CyberCop...
Comments (0)
European Commission supports research on Cyber security
November 28, 2012 Added by:Pierluigi Paganini
Cyber security is considered a primary target for every governments, the increase of cyber criminal activities, state-sponsored operations and the rise of hacktivism requires the use of additional resources to counteract these phenomena...
Comments (0)
Russian Underground is just part of a global criminal network
November 01, 2012 Added by:Pierluigi Paganini
Programming services and software sales was the most common service in the criminal market, where it is possible to buy customized malware agents and any kind of applications to conduct a cyber attack such as spammers, brute-force tools and DDoS bots and exploit toolkits...
Comments (0)
Social Media Security Risks for Small Business
October 21, 2012 Added by:Robert Siciliano
For more than a decade, cyber criminals have launched countless attacks on banks’ online infrastructure, successfully one-upping security professionals and their clients by creating viruses that bypass existing security measures. In response, computer security companies have continuously updated their technologies...
Comments (1)
Dutch Govt Expresses Intent To Draft New Cybercrime Legislation
October 17, 2012 Added by:Matthijs R. Koot
On October 15th 2012, the Dutch Minister of Security & Justice (Ivo Opstelten) sent this letter to the Dutch parliament expressing intentions to draft new cybercrime legislation in the Netherlands. Here is my Dutch-to-English translation of the entire letter...
Comments (0)
CleanIT Project: concerns for a Global Surveillance Project
September 23, 2012 Added by:Pierluigi Paganini
I just returned from the Cyber Threat Summit in Dublin, The event revealed an alarming scenario on cyber threats, no matter if it is cybercrime, hacktivism, cyber terrorism or cyber warfare, all those share a worrying growth of attacks that are influencing our digital lives...
Comments (1)
Death Match: Peter the Great Versus Sun Tzu
September 21, 2012 Added by:Infosec Island Admin
The paper, “Peter the Great Versus Sun Tzu” alleges that a comparison can be made between the varying actors in malware creation. They have broken this down into a battle royal between the “Asians” and the “Eastern Europeans” which is just patently stupid...
Comments (1)
As BYOD Trend Grows So Do Malware Attacks
September 06, 2012 Added by:Bill Gerneglia
The report found that the majority of employee’s devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions...
Comments (0)
2012 Norton Cybercrime Report Presents a Worrisome Scenario
September 06, 2012 Added by:Pierluigi Paganini
With 556 million of victims per year, 2 of 3 adults have been victims of online crime in their lifetime, with a total economic loss of 110 Billion and an average cost per victim of $197. The trend demonstrates the need to put in place a massive awareness campaign...
Comments (0)
Cyberheists: Biggest Threat Facing American Businesses
August 28, 2012 Added by:Ben Rothke
It is no myth that there is plenty of money and digital assets on networks worldwide. Those that want to secure those assets need to safeguard them. This book is written specifically for smaller to medium size businesses that often lack the staff and budget necessary to ensure effective information security...
Comments (0)
Three Domains Seized for Distributing Pirated Android Apps
August 27, 2012 Added by:Headlines
“Software apps have become an increasingly essential part of our nation’s economy and creative culture, and the Criminal Division is committed to working with our law enforcement partners to protect the creators of these apps and other forms of intellectual property from those who seek to steal it..."
Comments (0)
Traveling the Silk Road: A Study of the Online Black Market
August 10, 2012 Added by:Pierluigi Paganini
I've found some interesting research conducted by Carnegie Mellon computer security professor Nicolas Christin on the earnings of one of the most famous black markets in the Deep Web, the Silk Road. It seems to be able to realize $22 Million in annual revenues related to the drug market...
Comments (0)
The Bad Guys Know You’re an Olympics Addict
August 08, 2012 Added by:Kelly Colgan
The emerging theme from these Summer Games: There’s a general lack of awareness among consumers and end users about possible threats when they’re online. Even with corporate security professionals on high alert, it is ultimately end users and consumers who will make the choice that infects the system...
Comments (0)
Student Pleads Guilty to Counterfeiting Coupons on the Internet
August 07, 2012 Added by:Headlines
In addition to creating and disseminating fake coupons, Henderson also wrote tutorials and created templates he posted online and that provided instructions for creating counterfeit coupons using their own computers. Henderson’s scheme caused retailers and manufacturers to lose approximately $900,000....
Comments (1)
Facebook, the Poisoned Network: 83 Million Questionable Profiles
August 03, 2012 Added by:Pierluigi Paganini
There are bots creating a significant number of fake profiles, which are managed by machines capable of interacting with each other and with real users, thus changing the "sentiment" and "conversation" on a large-scale, as well as altering the social graph to preclude meaningful correlations of data...
Comments (2)
- Trump Administration Starts the Ball Rolling with the National Cyber Strategy
- A Call to Structure
- What CEOs Need to Know About the Future of Cybersecurity
- Who’s Responsible for Your Cyber-Security?
- CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
- Mozilla Concerned of Facebook’s Lack of Transparency
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Magento Patches Command Execution, Local File Read Flaws
- The Biggest Security Hurdles in Your Business, and How to Overcome Them
- Four Technologies that will Increase Cybersecurity Risk in 2019