The Cybercrime Herald

Edition list view

Business

History and Statistics of Ransomware

Shared by Joe Stevens

securityweek.com - Ransomware is not new - it has been around in one form or another for more than 20 years. It comes in two main varieties: 'blockers' that simply block the users' access to files, and 'encryptors' t...

Science

Exploit kit traffic drops by 96% since April, what is happening?

securityaffairs.co - As highlighted by security experts the threat landscape is in continuous evolution, despite the criminal underground was monopolized by Angler and Nuclear exploit kits for several years other EKs r...

Technology

How your staff's LinkedIn habits are exposing you to cyber crime

Shared by Ben Butler

cityam.com - Staff's poor handling of privacy on LinkedIn risks exposing bosses to cyber security threats, research released today has found. A survey of 2,000 people by Intel Security discovered that almost a ...

Technology

Sixgill claims to crawl the Dark Web to detect future cybercrime

techcrunch.com - Sixgill, a self-proclaimed ‘cyber intelligence’ SaaS startup that analyses the Dark Web, is launching publicly today and announcing that it has closed a $5 million funding round led by Elron, an Is...

Business

The Growing Threat From Emerging Cybercrime Markets

Shared by IBM Security

securityintelligence.com - David is an award-winning writer, speaker, editor, video blogger, and online communications professional who also advises numerous startup and well-established technology ventures.... It may be dif...

Technology

Hackers steal frequent-flyer miles worth Rs 1.6 million from Air India

mashable.com - Your frequent-flyer miles may be more valuable than you think. Unidentified hackers broke into at least 20 accounts in Air India's frequent-flyer programme and redeemed miles worth Rs 1.6 million (...

World

Brexit Referendum: 5 Cybersecurity Implications

Shared by FP7_COuRAGE

bankinfosecurity.com - See Also: Unlocking Software Innovation with Secure Data as a Service On June 23, British voters go to the polls to decide if Britain should exit - or "Brexit" - the European Union. In recent weeks...

Science

Necurs Botnet Stumbles, Dridex and Locky Feel It

securityintelligence.com - Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor... Proofpoint re...

Business

Will Brexit affect the cybersecurity space in the UK?

Shared by AnonWar

ibtimes.co.uk - Britain's European Union referendum polling day is here and it has the tech industry worried, particularly cybersecurity firms. While the voters' decision to either remain or leave the EU is to be ...

Technology

Microsoft Launches Cyber Security Engagement Center in India

news.microsoft.com - New Delhi, June 7, 2016: Deepening its commitment to enhancing cybersecurity, Microsoft has announced the opening of its Cyber Security Engagement Center (CSEC) in Gurgaon, India. The CSEC aims to ...

Business

GozNym Trojan turns its sight on business accounts at major US banks

csoonline.com - A hybrid Trojan program created for financial fraud has started redirecting users of four large U.S. banks to rogue websites in order to hijack their accounts. GozNym is a relatively new threat, fi...

Technology

Three security myths that could jeopardize your small business - Microsoft Enterprise

enterprise.microsoft.com - One of the biggest myths that I hear from our customers is that small businesses aren’t as susceptible to security breaches as large enterprises. The truth is, just because you’re small doesn’t mea...

Environment

The Panamanian Shell Game: Cybercriminals With Offshore Bank Accounts? - TrendLabs Security Intelligence Blog

Shared by MaxJack

blog.trendmicro.com - You may have heard about the Panama Papers—documents from a Panamanian law firm that revealed politicians, businessmen, and prominent individuals from countries all over the world were using offsho...

Business

Biggest Cyber Security Risk Is Finding The Right People by Olsi Selfo - eForensics

Shared by Fuzbolero.XV

eforensicsmag.com - Tim Varkalis is a senior penetration tester I respect greatly and here he talks about a day in a life of cyber security professional. Companies in Australia rely on having top talent to run their s...

Science

Worldwide Worry: New National Exposure Index Ranks Most Hackable Countries

securityintelligence.com - A freelance writer for three years, Doug Bonderud is a Western Canadian with expertise in the fields of technology and innovation. In addition to working for the IBM Midsize... Nothing is truly saf...

Science

Cognitive Security Helps Defend Against Cybercrime

securityintelligence.com - Marc van Zadelhoff is the General Manager for IBM Security, the fastest-growing enterprise security company in the world. ... On any given day, cybersecurity analysts investigate ongoing incidents ...

Technology

Look out! Hackers Are Preying on Smaller Firms as Big Banks Get Tough

Shared by Gary Davis

fortune.com - A tech startup in the New York area was flying high after a big funding round. The cash landed in the company’s bank account, but then disaster struck: Cyber criminals had heard about the funding r...

Science

Intrusion Detection and Prevention for Networks

blog.finjan.com - Being able to trust your corporate network to deliver information, services and support to whoever needs them is not only crucial to keeping your operations going – it’s a vital element in maintain...

World

Law of virtual behaviour by Christian Berg - eForensics

eforensicsmag.com - The Internet has nearly always been an unrestricted space where people can present themselves with any identity. Anonymity online is either considered as a blessing or a curse, it is protective but...

Technology

Top 5 Items for Sale on the Dark Web, and What Businesses Can Learn From Them

Shared by Dave Giblin

blog.surfwatchlabs.com - In April 2016, the dark web market Nucleus went offline. Before its disappearance, Nucleus had become the number two most popular market on the dark web, hosting tens of thousands of listings for a...

Science

7 Megatrends of global data breaches – IT Governance Blog

Shared by IT Governance

itgovernance.co.uk - Ponemon Institute’s 2016 Cost of Data Breach Study: Global Analysis has revealed the following seven megatrends that are shaping the global breach landscape: 1. The average cost of a data breach ha...

Technology

Crooks can clone payments cards with a hi-tech contactless device

Shared by Evident.io

securityaffairs.co - The British Daily Mail published an interesting article on a new gadget used by crooks to clone up to 15 contactless bank cards a second from victims, and it can do it by just standing nearby. The ...

Technology

Big stories for small businesses

secdata.com - In April this year news started to trickle through about an alleged security compromise in which the SWIFT payment communications network was exploited to steal US $81 million from the Bangladesh c...

Technology

Acer to notify customers of online store data breach

grahamcluley.com - Taiwanese hardware and electronics company Acer will soon begin notifying customers of a data breach on its e-commerce website. A sample breach notification letter warns that a third-party might ha...

Science

China develops the World's Most Powerful Supercomputer without US chips

thehackernews.com - China beats its own record with the World's fastest supercomputer. Sunway TaihuLight, a newly built supercomputer from China, now ranks as the world's most powerful machine. During the Internationa...

Sports

Has the Lizard Squad returned to ruin your day again?

Shared by NullByter

nakedsecurity.sophos.com - It seems that those annoying cyberyobs that call themselves the Lizard Squad might have struck again. Sigh! It looks like they’ve run a DDoS (Distributed Denial of Service) attack against Blizzard’...

Technology

Geldards LLP - The Cyber-Security Horse Has Already Bolted?

Shared by Geldards

geldards.com - At a recent conference, a security expert showed that a lot of our personal data has already been stolen and is already available for sale on the dark web*. He showed a sample of the personal data ...

World

Net Politics » California’s Gangs Go Digital and Global

blogs.cfr.org - Robert Muggah is co-founder and research director of the SecDev Foundation and the Igarapé Institute. He is co-editor of a new volume entitled Open Empowerment: From Digital Protest to Cyberwar tha...

Business

Cost of data breaches hits record high – IT Governance USA Blog

Shared by IT Governance

itgovernanceusa.com - The cost of data breaches has reached a record global high, according to the 2016 Ponemon Cost of Data Breach Study, with an average cost of $221 per breached record, which is a 7% increase on the ...

Technology

New cyber security law in the offing for Singapore

computerweekly.com - Singapore’s minister for communications and information Yaacob Ibrahim told lawmakers that the country needs updated cyber laws, and that a new Cyber Security Bill will be tabled in Parliament in 2...

Technology

Interpol: AI will change cyber security landscape in a few years

Shared by CIOs of India

enterpriseinnovation.net - Artificial intelligence (AI) is expected to be a major ally of IT security professionals in the fight against cyber crime in a few years. “It will change the cyber security landscape,” said Singapo...

Business

Cyber crime costs NI businesses £2m a year

Shared by CIOs of India

itv.com - Northern Ireland businesses have lost over £2m as result of online crime, in the last year alone. A total of 247 cases were reported between March 2015 and March 2016, adding up to a combined loss ...

Technology

Industries Perspective: Should the Internet be Treated Like Water – as a Utility?

Shared by OXITS

blog.fortinet.com - Internet use is ubiquitous in the age of IoT. The role of and access to the Internet in our lives is top of mind. Tyson Macaulay shares some thoughts given the recent government ruling around net n...

Science

Telegraaf, 11 februari 2016: "Vrees voor hacken auto op snelweg"

privacyfirst.nl - "Boordcomputers gemakkelijk te kraken. Tweede Kamer bespreekt wetsvoorstel. Auto's dreigen speelbal te worden van cybercriminelen en de politie. Dat komt omdat de computersystemen aan boord kinderl...

Technology

CYBERCRIME: THE LAST DEFENCE! | News | CSE Ltd

Shared by CSE ltd

cse-ltd.co.uk - Cybercrime experts are warning business owners that: “It is no longer a question of if – but a question of when!” Many business owners that we have spoken to in the Sussex area are often left shock...

Business

SMEs bearing the brunt of cyber crime (via Passle)

Shared by Gavin Bluett

thoughtleadership.leman.ie - A UK report from the Federation of Small Businesses states that smaller firms in the United Kingdom suffer in excess of 7 million combined attacks annually at a cost of UK£5.3bn to the UK economy. ...

World

Need for special unit to tackle Dark Web

Shared by FP7_COuRAGE

freemalaysiatoday.com - Criminologist Akhbar Satar also suggests the Government come up with a National Plan to Fight Cybercrime. KUALA LUMPUR: The Government has been urged to establish a dedicated cybercrime unit to tac...

Technology

Cybersecurity spending outlook: $1 trillion from 2017 to 2021

csoonline.com - DISCLOSURE: Steve Morgan is founder and CEO at Cybersecurity Ventures, and Editor-In-Chief of the Cybersecurity Market Report.  Worldwide spending on cybersecurity is predicted to top $1 trillion f...

Technology

Tech-Talk with… Saahil Mehta, managing director, Resnet World | Hotel News ME

Shared by Hotel News ME

hotelnewsme.com - Saahil Mehta, managing director, Resnet World gives his insights on how hoteliers can up their game to secure more direct bookings online through clever marketing and good apps.  What steps can hot...

Technology

What you should do if your business is the victim of cybercrime

theguardian.com - Considering what they would do if their business was attacked by a hacker is probably the last thing an entrepreneur wants to ponder, especially with so many other pressing business issues to atten...

Business

GozNym Banking Trojan Hits the US with Redirection Attacks

news.softpedia.com - GozNym, a banking trojan discovered only two months back, has added a new trick to its arsenal and is using it to target high-level business banking services in the US. IBM's X-Force security team ...

Technology

Tech support scammers impersonate victims' ISP - Help Net Security

Shared by SenseCy

helpnetsecurity.com - Tech support scammers have switched from cold calls to pop-ups ambushing users online, seemingly coming from the victims’ ISP. In the US and Canada, Verizon, AT&T and TimeWarner users are being act...

Business

AGCS: Thailand second worst for cybercrime

Shared by LogRhythm

bangkokpost.com - The Technology Crime Suppression Division and a web developer have jointly opened a new website called cleanweb-Thailand.com to compile and share information about internet scam artists. (Bangkok P...

Technology

Android-Malware verschafft sich Superuser-Rechte

Shared by SECbuddy

security-insider.de - Mobilegeräte mit Android 5.1 Lollipop und älteren Versionen des Google-Betriebssystems lassen sich per Malware rooten. Der Godless-Trojaner bringe den Superuser-Zugriff mit, warnen die Antivirus-Ex...

Business

Think like attackers, says HPE cyber security strategist

Shared by MIR3, Inc.

computerweekly.com - In the light of all these factors, Grieveson said organisations have to adopt a more comprehensive and co-ordinated approach to security across the whole enterprise. According to him, there are fiv...

Technology

Uber Hack lets anyone find Unlimited Promo Codes for Free Uber Rides

Shared by SECbuddy

thehackernews.com - An Independent Security Researcher from Egypt has discovered a critical vulnerability in Uber app that could allow an attacker to brute force Uber promo code value and get valid codes with the high...

Technology

Kaspersky Lab Exposes xDedic Cybercrime Market Selling 70,000 Hacked Servers for 6 USD - BrandedIQ| All about Brands

brandediq.com - A major underground black market just like an eBay for cyber criminals called xDedic is selling access to more than 70,000 hacked servers thus allowing the buyers to execute widespread cyber-attack...

World

Corruption Currents: Congressman Convicted on Corruption Charges

Shared by ACL

blogs.wsj.com - A daily roundup of corruption news from across the web. We also provide a daily roundup of important risk & compliance stories via our daily newsletter, The Morning Risk Report, which readers can s...

Technology

Large Botnet Comes Back To Life -- With More Malware

darkreading.com - A botnet associated with the huge volumes of Dridex and Locky-laden emails in recent months has resumed operations after mysteriously going dark for three weeks. Researchers from multiple firms rep...

Business

Cyber crime: how to spot and stop it

theguardian.com - The increasing threat of cyber crime is a concern for all small businesses, regardless of sector. According to recent findings from PwC, 55% of UK organisations have been the victim of economic cri...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →