Items Tagged with "Cyber Crime"
October 01, 2010 Added by:Brent Huston
What if we, as security folks, made a serious endeavor to reduce the earning capability of those who create crimeware, spyware and other malware? What if we did to them exactly what the gaming companies and MPAA have been saying is killing their business?
September 20, 2010 Added by:Dan Dieterle
Chinese hackers attack foreign civilian and military facilities alike to gain finances and also classified military information. While China’s attacks against America and Britain are well known, we are not their only target. Chinese hackers have also targeted India, and Japan...
September 20, 2010 Added by:Eli Talmor
Securing identity solutions against misuse is paramount. Security ensures confidentiality, integrity, and availability of identity solutions: Strong cryptography, use of open and well-vetted security standards, and the presence of auditable security processes are critical...
September 17, 2010 Added by:Robert Siciliano
Global web mobs are tearing up corporations’ and financial institutions’ networks. According to a new Verizon report, a staggering 900 million records have been compromised in the past six years. Up to 85 percent of the breaches were blamed on organized criminals...
September 06, 2010 Added by:Robert Siciliano
Organized crime rings recruit or place insiders to embezzle or skim monetary assets and data, the smaller end of these schemes often target cashiers at retail and hospitality establishments while the upper end are more prone to involve bank employees...
August 22, 2010 Added by:Robert Siciliano
The term spy conjures ideas about foreign operatives, moles and James Bond. You might envision forged IDs, fake passports and fraudulently issued government sponsored papers. The eleven Russian spies recently nabbed used the same equipment that you and I use today, including laptops, flash memory cards, and cell phones, but with a twist...
August 14, 2010 Added by:Theresa Payton
This is a wake-up call for small businesses, who are the easy targets for cybercriminals who want more than money - the criminals are also interested in your intellectual property which they can pawn elsewhere in order to gain financially....
August 06, 2010 Added by:Simon Heron
It’s quite rare to have the opportunity to highlight a great example of international co-operation, but according to V3.co.uk, a hacker responsible for one of the largest botnets ever created has been arrested thanks to an international effort...
July 25, 2010 Added by:Robert Siciliano
It is no surprise that cybercriminals are taking advantage of the Internet and the people who use it. Any parent with an ounce of sensibility should recognize that when your child is on the wild wild web, they are at the risk...
July 20, 2010 Added by:Nathaniel Markowitz
One of the central challenges for cyber-criminals is how to communicate with their customers while also maintaining their anonymity. There are three main types of communication utilized by Bulletproof Hosts (BPHs)...
July 16, 2010 Added by:Robert Siciliano
SWAT is Special Weapons and Tactics. Those are the guys and gals in all black with the headgear and big guns. Caller ID spoofing technologies are used as a tool to disguise the caller and send law enforcement officers on bogus calls...
June 23, 2010 Added by:Simon Heron
Last week’s Talinn conference was the latest in a series of international gatherings to discuss cybercrime. Unfortunately, although international cooperation is an essential element in defeating cybercrime, these discussions have so far been unable to find an actionable agreement.