The Cybercrime Herald

Edition list view

World

Sextortion, Cyber Stalking: U.S. Embassy Official Facing 4 Years in Prison

Shared by cybersecurite

hackread.com - An employee of the U.S. State Department involved in a huge sex racket at the U.S. Embassy in London. It all began one fine day, by a young victim’s complaint, who was from Kentucky and went on to ...

Technology

Cyberattacken auf Autos: Der Feind fährt mit - SPIEGEL ONLINE

Shared by SECbuddy

spiegel.de - Wenn sich Autos untereinander absprechen, passieren weniger Unfälle: Davon träumt die Fahrzeugindustrie und setzt große Hoffnungen auf die totale Vernetzung ihrer Produkte. Wird gar die Vision vom ...

Technology

Video: How machine learning and visualisation keep you safe.

Shared by BT Let's Talk

letstalk.globalservices.bt.com - We’re data-hungry — find out how our data lake and the work we do with world-class, smaller vendors keeps us one step ahead of cyber criminals. The key to effective cyber security is threat intelli...

Technology

Finance bods SWIFT to update after Bangladesh hack

Shared by Tom Gilheany

theregister.co.uk - Security vendors are pushing for a more comprehensive revamp of the SWIFT international inter-bank financial transaction messaging system beyond a update prompted by an $81m hack against Bangladesh...

Politics

Lagos to establish mobile courts, adopts strategies to combat cybercrime

Shared by Techislet

techislet.com - The Lagos State Government has made known its plan to establish functional mobile courts in the state to facilitate prompt trial of violators of the law, especially environmental and traffic offenc...

Technology

Kaspersky Lab, Gabonese Government to Cooperate on IT

Shared by cybersecurite

simmyideas.com - Kaspersky Lab has signed a memorandum of understanding with the National Agency of Digital Infrastructures and Frequencies (ANINF) in Libreville, Gabon. ANINF is the Gabonese government agency resp...

Technology

Kasperky: Fast alle Geldautomaten unsicher

Shared by Scripter

heise.de - Vor allem wegen Windows XP – aber auch aufgrund anderer Sicherheitsmängel sind laut einer Analyse von Kaspersky Lab fast alle Geldautomaten anfällig für Angriffe, an deren Ende das Leeren des Barge...

Business

Retail: The New Big Target for Cybercrime | Payment Week

paymentweek.com - An episode of The Simpsons once noted that Springfield was to be considered NWB, or Nuclear Whipping Boy. In the event of a nuclear attack, all allied countries would fire into Springfield first to...

Education

Un grupo de cibercriminales consiguió USD 100 000 con amenazas falsas

elcomercio.com - Extorsionar a empresas bajo la amenaza de lanzar ataques de Denegación de Servicio Distribuido (o DDoS, por Distributed Denial-of-Service) contra sus propiedades en línea ha demostrado ser lucrativ...

Technology

Schwarzmarkt: Preis für mobile Malware zieht an

Shared by cybersecurite

heise.de - Sicherheitsforschern zufolge floriert der Handel mit mobiler Malware. Der Anbieter des Android-Trojaners GM Bot zieht indes die Preise auf Malware-Marktplätzen spürbar an. Möchten Kriminelle aktuel...

Technology

Don’t get hacked off. Take Irwin Mitchell’s cybersecurity quiz.

irwinmitchell.com - | Is your business safe from cyber crime? Take our quiz now... Run Program The program has encountered an error. Please choose another answer. Try Again No business is immune from hackers when the ...

Technology

Researchers patrolling dark web uncover trojan plot targeting web hosting service

Shared by jhon smith

scmagazine.com - Web hosting provider Invision Power Services (IPS) this month was saved from a systems compromise that could have potentially damaged its clients, after researchers gathered intelligence on a cyber...

World

N2016-040 / 2016 / News / News and media / Internet / Home - INTERPOL

interpol.int - SAN JOSE, Costa Rica – Coordinating regional law enforcement efforts to combat cybercrime globally was the focus of the INTERPOL working group for heads of units in the Americas. Although increasin...

Technology

What’s The Art of War got to do with cybercrime? Quite a bit, actually.

blogs.microsoft.com - Sun Tzu wrote that mastery in the art of war is about subduing one’s enemy without having to fight. As the modern world contends with increasingly sophisticated cyberattacks from both criminal and ...

Business

The resurgence of banking malware

Shared by marcel_lucht

worldofanalytics.be - We know it is coming. And yet, we aren't ready. It's already there. But we're not seeing it. Banking malware is big business and there's only one way to arm ourselves... Of course we saw a decline ...

Technology

How To Find And Kill A Remote Connecting Malware On Windows 10

fossbytes.com - We have already covered a topic regarding tips to remove virus from USB or any drive using CMD, and now is the time to uncover malware which runs in the background. So, when a malware is running in...

Science

APT represents a fundamental shift in cyber-attack models

infosecurity-magazine.com - We often hear news about emerging cyber security threats and attacks impacting every industry. With advanced malwares, zero day exploits and persistent threats, cyber-attacks are now becoming very ...

Science

RansomWhere, the free ransomware detection tool for Mac OS X

securityaffairs.co - The number of Ransomware-based attacks has risen in a dramatic way, every week the criminal underground community is presenting new threats with improved features that are causing significant econo...

Education

How to Really Pass CISSP - Guest post by Cecilia McGuire - eForensics

eforensicsmag.com - Other Study Tips Don’t Cram! Don’t memorize! Do- Know the Concepts. AIC! (Availability, Integrity and Confidentiality). Mneumonics are a great tool for remembering acronyms Cramming a couple of wee...

Technology

Ran$umBin a dark web service dedicated to ransomware

Shared by chiraag aval

securityaffairs.co - These days Ransomware are quite common and it is widespread and heavily used by cyber criminals as common tools to steal data as well as extort their owners. Few days back we had seen a new type of...

Technology

How the Pwnedlist Got Pwned — Krebs on Security

krebsonsecurity.com - Last week, I learned about a vulnerability that exposed all 866 million account credentials harvested by pwnedlist.com, a service designed to help companies track public password breaches that may ...

Technology

(Video) What is managed web filtering? -

rniconsulting.com.au - Roger Smith, CEO at R & I ICT Consulting Services Pty Ltd and Amazon #1 author on Cybercrime discusses managed web filtering Hello, my name is Roger. What is managed web filtering? Well, we all kno...

Politics

India and the Budapest Convention: To sign or not? Considerations for Indian stakeholders – The Internet Democracy Project

internetdemocracy.in - In 2001, the Convention on Cybercrime of the Council of Europe, also known as the Cybercrime Convention or the Budapest Convention, became the first binding international instrument to foster a com...

Business

Over 300 attempts to hack admissions site

Shared by Crime Line

itweb.co.za - Lesufi made the comments this week, as he delivered an update on the online learner admissions process, which has been the subject of much frustration for Gauteng parents. According to Lesufi, the ...

Technology

(video) How to increase Cyber Awareness within an SME -

Shared by Relative ID

rniconsulting.com.au - Roger Smith, CEO at R & I ICT Consulting Services Pty Ltd, Amazon #1 author on Cybercrime and founder of the SME Security Framework | Speaker | Consultant | Trainer discusses –  How to increase Cyb...

World

Eurocops get new cyber powers to hunt down terrorists, criminals

arstechnica.com - Europe’s police agency Europol has been given enhanced cyber powers to track down terrorists and other criminals. The new governance rules were approved by the European Parliament’s civil liberties...

World

U.S. Supreme Court allows the FBI to Hack any Computer in the World

thehackernews.com - In Brief The US Supreme Court has approved amendments to Rule 41, which now gives judges the authority to issue search warrants, not only for computers located in their jurisdiction but also outsid...

Science

Malware Attacks More Frequent, Harder To Fight - InformationWeek

Shared by Evident.io

informationweek.com - The frequency and severity of malware attacks has increased "dramatically" since 2011, according to an April 19 State of the Endpoint Report from the Ponemon Institute, sponsored by CounterTack, a ...

Technology

The latest cybersecurity risk? Our homes and offices

jllrealviews.com - Intelligent buildings mean the opportunity for cyber-attacks in the real estate industry has grown. High-profile corporate attacks have hit the headlines in recent months, exposing the ways in whic...

Technology

India becomes hot spot for cyber-criminals: Symantec Report

enterpriseinnovation.net - India has become the third most favourite destination for financial Trojan infections globally. Global software company Symantec’s Internet Security Threat Report suggests that Indian enterprises w...

Technology

Utilitário Auxilia Vítimas de Ataques de Malware a Identificar Cepas Maliciosas

Shared by Camilla Lemke

crimespelainternet.com.br - As infecções causadas por malware não são nem um pouco agradáveis e as pessoas sempre querem arrumar um jeito de evitar serem pegas por essas pragas. Porém, o ransomware é particularmente desagradá...

Technology

5 malware attacks revealed: how they get you and how to protect your business

Shared by it-soft GmbH

cbronline.com - According to a report by AppRiver, the levels of spam and malware email traffic recorded during Q1 2016 have already surpassed the total levels documented during the whole of 2015. This totalled 2....

Technology

On Demand Webinar - Building a secure framework around your business using available technology -

Shared by Roger Smith

rniconsulting.com.au - Building a secure framework around your business using available technology —anti-virus on any system that is connecting to the internet. And this is why we need it, because the viruses that are ou...

Technology

Ransomware's next target: Anything that's connected

Shared by ReSec Tech

cbsnews.com - "Ransomware" has turned into a lucrative business for scammers, but it could jump from a troubling annoyance to life-threatening attacks. The hack is typically targeted at computers, with scammers ...

Environment

As Variadas Faces e Métodos de Ataque do Cripto-ransomware "Jigsaw"

Shared by Camilla Lemke

under-linux.org - As Variadas Faces e Métodos de Ataque do Cripto-ransomware "Jigsaw" O cripto-ransomware "Jigsaw", que recebe o nome do vilão principal do popular filme de terror da franquia Saw, como a sua nota in...

Technology

Decryption Tool Released for CryptXXX Ransomware

Shared by nCoded

tripwire.com - Researchers have developed a utility that allows victims affected by CryptXXX ransomware to decrypt their files for free. CryptXXX is one the newest crypto-ransomware samples to be observed in the ...

Technology

Aktuelle Maßnahmen schützen kaum vor Angriffen - silicon.de

Shared by SECbuddy

silicon.de - Wussten Sie, dass 70 Prozent der IT-Sicherheits-Budgets von Unternehmen nach wie vor in Netzwerk-Sicherheit fließt, dass aber 80 Prozent der Angriffe auf Anwendungen zielen? Mittlerweile findet ein...

Technology

The economics of hacking: Change your thinking - Help Net Security

Shared by Venyu

helpnetsecurity.com - If you saw the film Wall Street, you undoubtedly recall the iconic character Gordon Gekko famously stating, “what’s worth doing is worth doing for money.” This perspective is increasingly making it...

Science

Big Data: A Great Way to Ensure Strong Authentication | TheTechNews

Shared by cybersecurite

thetechnews.com - Whether it’s a notorious hacker in Russia or a high school kid in New York filing fraudulent claims, fraudsters are everywhere. And, they are getting stronger day by day. The old school passwords y...

Technology

Commonwealth announces new app to fight cross-border crime

Shared by Weld Bessid

thecommonwealth.org - The Commonwealth announced a new project today to develop a “blockchain” app to combat cross-border crime. The app will create a secure messaging system to help law enforcement and prosecutors in d...

Business

Cyber crime is fastest growing economic crime, says PwC report

computerweekly.com - Cyber  crime is up 20% since 2014 and is the fastest growing economic crime, according to PricewaterhouseCoopers’s (PWC) latest biennial Global Economic Crime Survey. The UK has seen a double-digit...

Business

How cybercrime is a maturing marketplace

Shared by cybersecurite

bit.ly - I started working in data security so long ago that state-of-the-art data theft meant dumpster diving for blue bar behind banks. Rooting through these dumpsters was a viable means of obtaining cred...

World

Australia puts $230m towards fighting cybercrime, including 50 extra police

Shared by Matt Donazzan

theguardian.com - A $230m cyber security strategy, which includes cash for more specialist cybercrime officers in the Australian Crime Commission and the Australian federal police, has been announced by the governme...

Technology

Economics of Cybercrime - Crime is Paying Well

sera-brynn.com - As a cybersecurity firm, our focus, and thus bulk of our time, is spent helping clients prevent cyberattacks, recover from cyberattacks and meet compliance requirements such as PCI, HIPAA, SSAE-16 ...

Business

Florida Forward: Let's talk about cybercrime

Shared by cybersecurite

orlandosentinel.com - Criminals wielding and targeting computers, smartphones and other connected devices are costing victims — governments, businesses and individuals — billions of dollars a year, and the numbers keep ...

Science

Personalized governing: Understanding and empowering residents with

ibmbigdatahub.com - The ever-growing volume of information created in today's digital world opens up new opportunities for governments. Both local and federal government organizations can use data to learn more about ...

Business

PwC Report Shows That Cybercrime Is a Top C-Level Concern

Shared by Varonis

blog.varonis.com - One metric that’s difficult to gauge when it comes to cybercrimes is the economic impact felt by companies. However, PwC took on this challenge and just released the results of its 19th Global Econ...

Business

Banking & Cybersecurity: Can They Prevent the Next Terrorist Attack?

tripwire.com - The terrorist attacks in Paris, San Bernardino, and most recently, Brussels are reminders that no country or city is immune to the risk of a terrorist attack. The attacks in all of the locations re...

Technology

G L Giddings | Press Release: The Holiday Season And ID Theft: The Cycle Continues

ibosocial.com - “If we don't act now to safeguard our privacy, we could all become victims of identity theft.” Bill Nelson “There are two kinds of people in America today: those who have experienced a foreign cybe...

Technology

How cyber criminals can get key credit card details

capitalbay.news - A simple anti-virus program installed on your computer, laptop or smart device can stop criminals from stealing the CVV number on the back of your card. Fraudsters can easily purchase credit card d...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →