The Cybercrime Herald

Edition list view

Technology

How Not To Be Hacked! – Social Media Matters

socialmediamatters.in - Probably the most important skill of our Digital times. Though to be safe, we need to know the dangers. Here is one of the simplest ways to Hack someone via Phishing a noun meaning: the fraudulent ...

Business

Largest NHS Trust Hit By Cyber Attack - Information Security Buzz

Shared by JavaPipe

informationsecuritybuzz.com - Reports are surfacing that the largest NHS hospital trust in England has been hit with ransomware, affecting thousands of sensitive files. Security experts from Varonis, NSFOCUS and Lastline commen...

Technology

Significant decrease in Locky ransomware attacks - Help Net Security

helpnetsecurity.com - Locky ransomware attacks have dramatically decreased during December 2016, according to Check Point. Locky, which uses massive spam campaigns as a major distribution vector, only surfaced in 2016 b...

Technology

Cybercrime: file sharing e protezione dati - ICT Security Magazine

Shared by ICT Security

ictsecuritymagazine.com - “Internet oggi è diventato la spina dorsale della comunicazione per l’intero pianeta, è una risorsa cruciale per individui, industrie e nazioni, che insieme formano la nostra moderna società global...

Business

‘I thought I’d bought my first home, but I lost £67,000 in a conveyancing scam’

theguardian.com - A charity worker buying his first home has had his £67,000 life savings stolen after fraudsters hacked into emails sent between him and his conveyancing solicitor. Howard Mollett’s case will send a...

Technology

Cyber Security e Internet of Things - ICT Security Magazine

Shared by Vincenzo

ictsecuritymagazine.com - Probabilmente negli ultimi mesi sarete stati inondati dall’enorme numero di incidenti di sicurezza pubblicati sui vari mezzi di informazione, digitali e cartacei. Abbiamo letto di attacchi mirati, ...

World

EUR-Lex - l14560 - EN - EUR-Lex

Shared by EUR-Lex

eur-lex.europa.eu - Towards a general policy on the fight against cybercrime As the internet has become part of our everyday lives, so too the internet user has become vulnerable to criminals often operating on other ...

Technology

Nuovo Ransomware Made in Brazil Vs Kaspersky Lab - ICT Security Magazine

Shared by Tommy

ictsecuritymagazine.com - Nuovo successo per il Kaspersky lab, questa volta la sfida arriva dal Brasile: un nuovo ransomware da battere. I cyber criminali brasiliani sono notoriamente esperti nella creazione di trojan banca...

Technology

USA sotto attacco hacker: quando il target è un intero Stato - ICT Security Magazine

Shared by Tommy

ictsecuritymagazine.com - Ormai è palese: nel moderno mondo del cyber crime l’arma più potente e diffusa sono i DDoS. Non sapete di cosa si tratta? Leggetelo qui. La loro tecnica d’attacco non teme rivali, tanto che proprio...

Business

80% of cybercrime unreported, complaints up after note ban - Times of India

Shared by Chinmayi

timesofindia.indiatimes.com - HYDERABAD: After the move to demonetise currency, most people may have been forced to use digital transaction, and have ended up getting duped by fraudsters, cyber experts said on Monday. Close to ...

Business

Cyber offences keep rising, lack of training hurts probe - Times of India

Shared by Chinmayi

timesofindia.indiatimes.com - MUMBAI: The city's cyber police station registered 2,444 offences between 2014 and 2016, but managed to arrest only 609 accused, revealed the latest Mumbai police report. Cyber offences increased b...

Technology

Study reveals the most common password of the year 2016 | Gadgets Now

Shared by Remi Cauchois

gadgetsnow.com - WASHINGTON: Numeric combination of '123456' was the most common password of 2016, followed by '123456789' and 'qwerty', according to researchers who reviewed over 10 million security codes that bec...

Technology

Datenbank-Erpresser: Nach MongoDB ist auch Elastic Search im Visier

Shared by Scripter

heise.de - Online-Erpresser räumten tausende Elastic-Search-Installationen leer und erpressen nun deren Betreiber: Entweder fließt Geld oder die Daten bleiben verloren. Zuvor wurden in ähnlichen Fällen inzwis...

Business

The elderly most at risk from cyber-crime, report warns

eandt.theiet.org - Almost three quarters (73 per cent) of over-45s with internet access said they had been targeted by an email scam and of these, 6 per cent said they had fallen for the trap, according to a survey b...

Business

Nasce il CERTFin per prevenire e contrastare crimine informatico

cybersecurity.startupitalia.eu - La Banca d’Italia, l’Associazione Bancaria Italiana e il Consorzio ABI Lab hanno firmato una convenzione per rafforzare la collaborazione sulla cybersecurity. L’obiettivo, si legge in una nota, è “...

World

Australian government officials victims of Yahoo data hack

Shared by Integersec

news.com.au - THOUSANDS of Australian government officials, including federal ministers and senior defence officials, are among the victims of the massive Yahoo data hack. Social Services Minister Christian Port...

Business

How to fight cybercrime in the construction industry

Shared by The CAD Room

meconstructionnews.com - Virtual crime has become an unpleasant reality of our times, leaving not even the field of construction equipment untouched Cybercrime comes with significant cost. It was been estimated that the gl...

Technology

Hacker held open MongoDB databases for ransom

securityaffairs.co - It seems that the hacker is focusing on open MongoDB installations, likely using a search engine like Shodan. On December 27, Gevers discovered a MongoDB server that was left accessible without aut...

Technology

India Today Investigation: Jamtara emerges as the biggest den of digital crime

Shared by Chinmayi

indiatoday.intoday.in - Do you get calls inquiring about the passwords of your bank accounts, insurance, credit cards and so forth? If you do, there's a great chance they may be originating from the jungles of Jamtara, a ...

Technology

New Gmail phishing technique fools even tech-savvy users - Help Net Security

Shared by Neira Jones

helpnetsecurity.com - An effective new phishing attack is hitting Gmail users and tricking many into inputing their credentials into a fake login page. The phishers start by compromising a Gmail account, then they rifle...

Business

£2 billion - The total value of reported fraud | Beavis Morgan

beavismorgan.com - The recent Fraudtrack analysis report shows that fraud in 2016 hit a five-year high, increasing 31.5 per cent to £2 billion. Whilst the volume of cases fell, the total cost of fraud rose 35.4 per c...

Technology

DDoS attacks to continue in 2017, financial infrastructure at great risk: Sophos

Shared by Pascal Steyer

bgr.in - Cybercriminals will use distributed denial of service (DDoS) attacks in 2017 to extend their reach as there are now several Internet of Things (IoT) devices containing outdated codes and operating ...

Business

Most companies don't monitor their networks

Shared by ARISTI

itproportal.com - Internet disruptions, in its biggest part, are taking place outside a company’s network, a new report by Dyn claims. The report also says having poor visibility beyond ‘company walls’ makes it hard...

Business

IoT, Foreign Actors, Insider Threats Shape 2017 Risk Management

Shared by ECS Cyber

darkreading.com - A new year means new and evolving security threats are shaping businesses' risk management strategies. In 2017, corporate security concerns will come from insider threats, hostile nation-states, an...

Technology

Researchers Expose Fake Android Apps Stealing Instagram Passwords

Shared by Consfearacy

hackread.com - Instagram undoubtedly is a very popular social networking platform, which is the main reason why it attracts the attention of cyber-criminals, hackers and scammers so frequently. According to lates...

Technology

Cyber Security and Its Role in Government

Shared by Steve Morgan

careersincybersecurity.com - Cyber security is vitally important for government organizations. Discover how government data can be exposed and learn what’s being done to combat cyber threats. Government organizations are under...

Business

Crisis Management: How To Handle A Cyber Security Incident

huffingtonpost.co.uk - When a cyber security incident happens, more often than not people in the organisation will turn to the IT department to fix it. Without a doubt the IT department has a part to play and yes, its ty...

Technology

Lessons to Learn from the Tesco bank Cyber Attack | CBS IT

Shared by CBSIT

cbsit.co.uk - In early November, Tesco was the victim of a cyber attack in which over £2.5million was stolen from approximately 9,000 of its customers’ accounts. As a result, Tesco has been forced to repay the s...

Technology

Hacking-Top-15: Die größten Cyberangriffe auf Unternehmen

computerwoche.de - Leider gibt es auch für Unternehmen keinen hundertprozentigen Schutz vor Cyberattacken und Hackerangriffen. Dazu kommt allerdings, dass viele Firmen die Gefahr aus den Untiefen des Netzes unterschä...

Technology

Emails of senior politicians compromised in Yahoo hack

Shared by Integersec

abc.net.au - Thousands of Australian Government officials, including high-profile politicians and senior Defence officials, are among the 1 billion victims of the massive Yahoo data breach, according a secret d...

Technology

Malvertising and How it's Being Used to Launch Cyber Attacks

Shared by Security News

blog.finjan.com - Trust and ignorance can work hand in hand to produce favorable results – from a cybercriminal’s point of view. That’s why perpetrators are turning to a disturbing new strategy for porting malware o...

Technology

The State of Malware on the Mac

Shared by Security News

cyberisk.biz - We often hear horror stories about the vulnerabilities and security shortcomings of Windows and its operating platforms across the board, but the same can’t be said about the Macintosh brand – unti...

Science

Why AI could be the key to turning the tide in the fight against cybercrime | ZDNet

Shared by WealRo A.I.

zdnet.com - It's not unreasonable to suggest the cybersecurity battle is being lost - and on more than one front. Not only are more efficient and organised cybercriminals winning the security arms race against...

Science

How IBM Is Using Artificial Intelligence to Provide Cybersecurity -- The Motley Fool

fool.com - Cybercrime is an epidemic. Consider these statistics from Checkmarx: Cybercrime is expected to cost businesses over $2 trillion annually by 2019, four times as much as 2015. In the U.S., a breach c...

Technology

Hacking Group Releases Trove of Malware Tools - Network Security on CIO Today

cio-today.com - Tobias Boelter, a PhD candidate, first reported the vulnerability to Facebook in April. A month later, he noted that Facebook said it was aware of the issue but was not actively working to make cha...

Technology

McDonald's website vulnerability puts your password at risk

thenextweb.com - You can trust McDonald’s to serve you its less than nourishing Big Macs, but you certainly shouldn’t trust its website with your password. Dutch independent software engineer Tijme Gommers has unco...

Technology

Three common tactics hackers use to compromise system administrators

Shared by Neira Jones

scmagazineuk.com - System administrators are the gatekeepers of our corporate IT networks. From managing and maintaining assets through to overseeing access to critical systems, they have the power to control entire ...

Business

Healthcare Industry Vulnerabilities Give Rise To Cyber Crime

Shared by Adam N

health-system-management.advanceweb.com - In November, at least 35 healthcare facilities in the U.S., U.K. and Canada were targeted by cybercriminals executing Business Email Compromise (BEC) campaigns. The organizations, which included ho...

Technology

Why The SMB Needs To Stop Ignoring Cyber Crime

Shared by Waytek

waytek.com - We make it a top priority to warn our clients of the dangers of cyber crimes, yet we see many SMBs becoming victims of ransomware and cyber attacks with increasing frequency. Part of this is due to...

Business

A Glitch In The Matrix

Shared by Go Legal

golegal.co.za - South Africans are defrauded in excess of ZAR2.2 billion each year through online scams and cyber related crimes, according to the South African Banking Risk Information Centre (SABRIC). SABRIC CEO...

World

Clearswift ‘through the eyes of a cyber-criminal’

Shared by Foursys

attendee.gotowebinar.com - (GMT-11:00) Midway Island, Samoa (GMT-10:00) Hawaii (GMT-09:00) Alaska (GMT-08:00) Pacific Time (US and Canada);Tijuana (GMT-07:00) Arizona (GMT-07:00) Mountain Time (US and Canada) (GMT-06:00) Mex...

Business

Companies need data and information to manage cyber risk.

ww2.cfo.com - Galvanized by recent cyber attacks against corporations, boards of directors are pushing risk managers and the insurance industry to quantify cyber risks. The demand for better predictive data on c...

Business

IT Security: Justifying the investment

Shared by Green Duck

greenduck.co.uk - Yet, despite the almost daily news reports of companies suffering a breach or attack, the task of defending IT systems can often sit way down in the list of bosses priorities.  A common belief in S...

World

LA College Hit By Ransomware: Pays $28,000 to Unlock Files

Shared by NGenCode

hackread.com - Cybercriminals are now using new techniques to infect users with ransomware in order to make easy money. That is exactly what happened with Los Angeles Valley College (LAVC) who recently had their ...

Technology

Defending against cybercrime: how to make a business cyber-resilient

weforum.org - Cyberattacks, cyber-breaches and cybercrime are not new problems and are universally acknowledged to be costly, pervasive and increasingly sophisticated. Each week new breaches become public, most ...

Business

Smaller firms set to 'face £52bn in fines' for security breaches

Shared by Proteus-Cyber

thisismoney.co.uk - British firms were each subjected to an average of almost 230,000 cyber attacks in 2016, according to analysis from business internet service provider Beaming. The average volume of attacks hitting...

Technology

Phished Gmail Accounts Immediately Accessed by Hackers

Shared by Consfearacy

securityweek.com - Cybercriminals have been using specially crafted URLs to trick even tech-savvy people into entering their Gmail credentials on a phishing website. Once an account has been compromised, the attacker...

Business

Indian banks are waking up to a new kind of cyber attack - The Economic Times

Shared by Neira Jones

economictimes.indiatimes.com - MUMBAI: Hackers recently infiltrated the systems of three government-owned banks — two headquartered in Mumbai and one in Kolkata — to create fake trade documents that may have been used to raise f...

Technology

The network perimeter has been breached – so how can you ensure digital protection in the cybercrime era? - Computer Business Review

Shared by Wallix

cbronline.com - Cybercrime is a big problem for companies in Europe and indeed around the world. Exact figures on how much it is costing British firms vary but recent research from the UK government found that eig...

Business

4 steps to protect your business against cybercrime

Shared by Martin Hunt

weforum.org - Today everything is connected, so cyber-security features high on leaders’ agendas and is a top priority in every boardroom around the world. Each business has its own web of connections, often str...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →