Items Tagged with "Cyber Crime"


E313765e3bec84b2852c1c758f7244b6

Using Piracy as a Crimeware Defense

October 01, 2010 Added by:Brent Huston

What if we, as security folks, made a serious endeavor to reduce the earning capability of those who create crimeware, spyware and other malware? What if we did to them exactly what the gaming companies and MPAA have been saying is killing their business?

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

China – Cyber Pirates Off the Electronic Coast?

September 20, 2010 Added by:Dan Dieterle

Chinese hackers attack foreign civilian and military facilities alike to gain finances and also classified military information. While China’s attacks against America and Britain are well known, we are not their only target. Chinese hackers have also targeted India, and Japan...

Comments  (1)

7af56c65866a442699d6dd1dfb02b528

Cybercrime Victims Feel Ripped Off

September 20, 2010 Added by:Eli Talmor

Securing identity solutions against misuse is paramount. Security ensures confidentiality, integrity, and availability of identity solutions: Strong cryptography, use of open and well-vetted security standards, and the presence of auditable security processes are critical...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Organized Crime Responsible For Most Breaches

September 17, 2010 Added by:Robert Siciliano

Global web mobs are tearing up corporations’ and financial institutions’ networks. According to a new Verizon report, a staggering 900 million records have been compromised in the past six years. Up to 85 percent of the breaches were blamed on organized criminals...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Organized Web Mobsters Getting Jobs Inside

September 06, 2010 Added by:Robert Siciliano

Organized crime rings recruit or place insiders to embezzle or skim monetary assets and data, the smaller end of these schemes often target cashiers at retail and hospitality establishments while the upper end are more prone to involve bank employees...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Spies Among Us

August 22, 2010 Added by:Robert Siciliano

The term spy conjures ideas about foreign operatives, moles and James Bond. You might envision forged IDs, fake passports and fraudulently issued government sponsored papers. The eleven Russian spies recently nabbed used the same equipment that you and I use today, including laptops, flash memory cards, and cell phones, but with a twist...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Small Businesses Hammered By Cybercrime

August 14, 2010 Added by:Theresa Payton

This is a wake-up call for small businesses, who are the easy targets for cybercriminals who want more than money - the criminals are also interested in your intellectual property which they can pawn elsewhere in order to gain financially....

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Mariposa Botnet Arrest via International Co-operation

August 06, 2010 Added by:Simon Heron

It’s quite rare to have the opportunity to highlight a great example of international co-operation, but according to V3.co.uk, a hacker responsible for one of the largest botnets ever created has been arrested thanks to an international effort...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Keeping Kids Safe Online

July 25, 2010 Added by:Robert Siciliano

It is no surprise that cybercriminals are taking advantage of the Internet and the people who use it. Any parent with an ounce of sensibility should recognize that when your child is on the wild wild web, they are at the risk...

Comments  (2)

63b96d79afc327c98a13c614670feca0

Criminal Communication Infrastructure

July 20, 2010 Added by:Nathaniel Markowitz

One of the central challenges for cyber-criminals is how to communicate with their customers while also maintaining their anonymity. There are three main types of communication utilized by Bulletproof Hosts (BPHs)...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What is “Swatting” And How Do I Protect My Family

July 16, 2010 Added by:Robert Siciliano

SWAT is Special Weapons and Tactics. Those are the guys and gals in all black with the headgear and big guns. Caller ID spoofing technologies are used as a tool to disguise the caller and send law enforcement officers on bogus calls...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

State of International Cooperation on Cybercrime

June 23, 2010 Added by:Simon Heron

Last week’s Talinn conference was the latest in a series of international gatherings to discuss cybercrime. Unfortunately, although international cooperation is an essential element in defeating cybercrime, these discussions have so far been unable to find an actionable agreement.

Comments  (0)

Page « < 12 - 13 - 14 - 15 - 16 > »