The Cybercrime Herald

Edition list view

Technology

Latest Snowden leak shows UK, US behind Regin malware, attacked European Union

zdnet.com

zdnet.com - Blame the British and American spy agencies for the latest state-sponsored malware attack, say reporters at The Intercept. Which nation-state is behind the sophisticated, stealthy Regin malware? Th...

Technology

Hacking RFID Payment Cards Made Possible with Android App | Security Intelligence Blog

Shared by
ArabSec

blog.trendmicro.com - We recently encountered a high-risk Android app detected as ANDROIDOS_STIP.A in Chile. This app, found distributed through forums and blogs, can be used to hack into the user’s RFID bus transit car...

Technology

November 2014 UK companies consider hiring ex-hackers

Shared by
CorpTropolis

icsa.org.uk - UK companies are considering hiring ex-hackers to tackle cyber issues, according to research by KPMG. In a bid to stay one step ahead of cyber criminals, senior IT and HR professionals have reveale...

Technology

Symantec announces Regin but Kaspersky claims to know more

Shared by
Ian Murphy

business-cloud.com - Over the last 24 hours there has been a lot of public disclosure about a new piece of malware known as Regin. What is agreed, is that Regin is probably the most advanced and complex malware ever se...

Technology

Russian Hacked Webcam Streaming: How Safe Are Your Online Habits in the Age of Cybercrime?

Shared by
IBTimes UK

ibtimes.co.uk - Emmanuel Schalit is CEO of the password and security specialists, Dashlane. Hackers just published thousands of webcam streams from individuals and businesses. By simply visiting a website someone ...

Technology

SC Magazine - European arrests highlights danger of teen cyber-crime, 21 November 2014

Shared by
CoPaCC

paconsulting.com - PA Consulting Group's Stephen Bailey, a cyber security expert, is quoted in an article about teenage cyber-crime. The article addresses the growing number of teenagers using Remote Access Trojans (...

Science

Magnitude Exploit Kit Backend Infrastructure Insight - Part II - SpiderLabs Anterior

Shared by
galadrim

blog.spiderlabs.com - This blog post is dedicated to the Magnitude Gateway server, its features and its operation. In order to get a better hold of this information, let’s examine the process of creating a new malicious...

Technology

Homeland Security Today: US Cybersecurity Practices Fail to Keep Pace with Cyber Adversaries

Shared by
HSToday

hstoday.us - As cyber criminals and nation-state actors continue to adjust their tactics to maintain advantages, businesses and government agencies are struggling to counter the increasing sophistication of cyb...

Education

Bloßgestellt im World Wide Web - KURIER.at

Shared by
ArtSeeks

kurier.at - Ein Mädchen schickt ihrem Freund freizügige Fotos von sich. Sie denkt sich nichts dabei, vertraut ihm. Doch die Beziehung geht in die Brüche. Das Mädchen hat Schluss gemacht. Die Fotos hat sie läng...

Business

Get ahead of cybercrime

Shared by
EY Performance

performance.ey.com - Most organizations (67%) are facing rising threats in their information security risk environment, but over a third (37%) have no real-time insight on cyber risks. This is one of the topline findin...

Technology

IT security 101: think like a cybercriminal

Shared by
Marcus didius falco

controlnow.com - Many of the best fictional detectives employ a strikingly similar method when it comes to tracking down the perpetrator; they get inside the head of the bad guy. Understanding how the threat landsc...

World

Europol arrests 15 for RAT use

Shared by
LogRhythm

itsecurityguru.org - Europol, authorities and the European Cybercrime Centre (EC3) have arrested 15 individuals in several European countries who were suspected of using remote access Trojans (RATs) to commit cyber cri...

World

US warns of Chinese cyberwar again

Shared by
Connect Express

channeleye.co.uk - The head of the NSA told politicians at the House of Representatives Intelligence Committee on cyber threats that China could invade and close down vital American computer systems. Admiral Michael ...

Business

Robert Kientz Blog | Caveat Emptor! Cyber Crime Threatens To Derail The Growing Digital Economy

Shared by
TalkMarkets Recap

talkmarkets.com - Securing computer networks has become paramount in the new digital age. Computer and network security, most often referred to as cyber security, involves safeguarding Americans private information,...

Technology

Securezoo Articles

Shared by
Browsingprivacy

securezoo.com - The threat: According to an IBM X-Force Research team report, another vulnerability (CVE-2014-6332) dubbed by some as "Unicorn like" was fixed by MS14-064 in the most recent Microsoft Patch Tuesday...

Technology

Sony Pictures hacked, entire computer system re...

Shared by
Browsingprivacy

scoop.it - Reports that Sony Pictures has been hacked have been trickling in this morning, after a thread appeared on Reddit claiming all computers at the company were offline due to a hack.… Learn more: - ht...

Technology

10 Easy Ways to Protect Your Data in the Cloud - 1

Shared by
Marc Wilczek

wisebread.com - While movies have portrayed hackers as both good (The Girl with the Dragon Tattoo) and evil (Live Free or Die Hard), the one thing that is clear is that they can do a good deal of damage. Several f...

Business

Hackers to probe cyber crime defences at British banks - Yahoo News

Shared by
Antonio González

finance.yahoo.com - LONDON (Reuters) - In the next few months hackers will try to penetrate the cyber defences of Britain's major banks and steal information about millions of customers. But for once they'll be welcom...

Technology

Why Malvertising Is Cybercriminals’ Latest Sweet Spot

Shared by
Amanda Sparling

wired.com - Of all the cyber threats driving headlines, malvertising – seeding malicious code in online advertisements to infect unsuspecting users – might be the most jarring and difficult for many Web surfer...

World

Smart Phones, Smart Cars: The Dangers of a Smar...

Shared by
Ken Feltman

scoop.it - With a smart phone acting as a master key, a hacker can easily gain access to someone’s home or car in hours, if not minutes. Technology is progressing at full speed, becoming so inseparably weaved...

Technology

Foreign state suspected of breaching US Postal Service

Shared by
Security Affairs

securityaffairs.co - The U.S. Postal Service has suffered a major data breach that may have exposed the personal information of more than 800,000 employees, including data on customers who contacted Postal Service Cust...

Technology

Intel and Europol Partners in Cybercrime — Security Gladiators

Shared by
Security Affairs

securitygladiators.com - An MOU between Intel Security Firm and Europol, will see the two combine resources and Expertise in combating cybercrime, in an already porous battle line. As cybercriminals advance their technique...

Business

Five arrested in UK for using RATs - SC Magazine

Shared by
cedricpernet

scmagazine.com - Authorities have arrested five people in the U.K. suspected of using Remote Access Trojans (RATs) to take over victims' computers and steal information from them. In an international effort, led by...

Technology

Digital crime thrives in Brazil

Shared by
Matteo Cavallini

zdnet.com - Brazil has a thriving scene of cybercrime online "schools" offering training programs as well as a vast array of services offering financial data obtained illegally, according to a recent study on ...

Politics

ProSecurityZone: UK and USA to collaborate on joint cyber crime initiative

Shared by
Eng. Mahmoud Soliman

prosecurityzone.com - The New York District Attorney, Cyrus Vance, has announced plans to increase collaboration between the UK and US in an attempt to combat cyber crime. A member of the City of London’s police force w...

Technology

Sony Pictures hack takes computers down studio-wide

Shared by
Cyber Dystopia

engadget.com - As a whole, Sony isn't a stranger to being hacked, but the most recent effort targeted its movie division -- not PlayStation. Computers in Sony Pictures offices have been compromised, as Deadline, ...

Environment

West Yorkshire Police and Crime Commissioner joins 2 year project aimed at tackling cybercrime and child sexual exploitation (25 Nov 2014)

Shared by
West Yorkshire OPCC

westyorkshire-pcc.gov.uk - A two-year project aimed at tackling cybercrime and child sexual exploitation (CSE) is being joined by a team on behalf of the Police and Crime Commissioner and West Yorkshire Police. The West York...

World

China's 'knock-off' J-31 fighter - cyberwar spoils or self deception? - Blogs - Techworld.com

Shared by
Mark Chillingworth

techworld.com - The Chinese Government has been accused of numerous military-industrial cyber-attacks against the US, the direct effects of which are almost impossible to gauge. The contentious case of China’s J-3...

Technology

Fighting cyber crime starts at home

Shared by
SecureNinja

tennessean.com - Unless you work within the cybersecurity industry, I bet you don't truly understand how scary and damaging cybercrime adversaries can be to your business and personal reputation. •The money in cybe...

Business

Conspirators sought to divert money from customer accounts to prepaid debit cards they controlled

Shared by
SDCExec

sdcexec.com - TRENTON, N.J. (AP) — A New York City man was sentenced Friday to more than three years in prison for his role in an international cybercrime ring that prosecutors say hacked into the computers of m...

Technology

Microsoft Leverages IoT Tech to Combat Online Fraud

Shared by
Feliciano Intini

eweek.com - The software giant is banking on the Internet of things and the cloud to help law enforcement combat cyber-criminals.

Business

Zambia : South African based Fraud Specialist says cyber-crime is as serious as ebola crisis

Shared by
Vesa Hietanen

lusakatimes.com - A South African based Fraud Specialist has charged that cyber-crime is the second major challenge facing the African continent after the Ebola crisis. FNB South Africa Fraud Specialist Henk Vermeul...

Environment

Wildlife crime study finds 33,000 items worth £7m for sale online | Environment

Shared by
Azzedine Downes

theguardian.com - The world’s endangered wildlife is for sale on the world wide web: live tigers, bears, orangutans and chimpanzees are all just a few clicks away. For those seeking a more manageable purchase, there...

Education

Underground Brasileiro: Mercados Cybercriminosos em Plena Expansão

Shared by
Camilla Lemke

under-linux.org - Underground Brasileiro: Mercados Cybercriminosos em Plena Expansão O Cybercriminal Underground Economy Series (CUES) constatou que existe um mercado em plena expansão no submundo, onde os cybercrim...

Technology

Don't fall victim to cyber crime this holiday season — Insights For Success

Shared by
Edward Kiledjian

kiledjian.com - If something sounds too good to be true, it probably is. If you want to conduct any online transactions (banking, shopping, etc), go directly to the website in question and don't click through from...

Technology

European arrests highlights danger of teen cyber-crime

Shared by
7Safe

corporate.7safe.com - Like many websites this site makes use of Cookies. Cookies are small pieces of information that contain non-sensitive information about your browsing session. This is to ensure that you have the be...

Technology

Sony Paralyzed By Computer Hacker Attack

Shared by
MKB AUDITS

deadline.com - UPDATE: While it seems that a world-leading tech company would be the last to be brought down by a hacker, this Sony thing is serious. I’ve come across a still photo of the hacked message that appe...

Sports

Attackers Using Compromised Web Plug-Ins in CryptoPHP Blackhat SEO Campaign | Threatpost

Shared by
Cienaga Systems

threatpost.com - “While investigating the ‘nulledstylez.com’ website we found that every pirated plug-in, theme and extension contained the same backdoor. While making a mirror of all the content published on the w...

Technology

Cyber Crimes Network

Shared by
Cyber Crimes Network

cybercrimesnetwork.com - You think your wireless and other technology is safe? From Blue Tooth to automobile remotes, PCs, and "secure" credit cards, Hacker extraordinaire shows how ...

Technology

Working together for a more secure digital future - Let's Talk Security blog

Shared by
Let's Talk Security

letstalk.globalservices.bt.com - Every week this month, we’ve been collecting articles homing-in on security issues and challenges to mark National Cyber Security Awareness month in Europe and the USA. This is the last instalment ...

World

Trans-European investigation leads to arrest of cyber criminals

Shared by
LogRhythm

blog.logrhythm.com - Last week a team of European law enforcement agencies arrested a number of individuals on suspicion of using Remote Access Trojans (RATs) to commit various types of cybercrime.  The operation, led ...

Business

Lack of Incident Response Holding Back Cyber Insurance Market - INFOSECINSIGHT.COM

Shared by
ALPS for Attorneys

infosecinsight.com - The hottest topic in the insurance world today is “cyber risk insurance”, or coverage for the response to and fallout from cyber crime and breaches.  As Reuters recently highlighted, the cyber insu...

Art & Entertainment

How to protect against Shellshock - Let's Talk Security blog

Shared by
Let's Talk Security

letstalk.globalservices.bt.com - From the Times to the Washington Post, Shellshock has been making headlines across the globe. As a threat that could impact all public and private sector organisations worldwide, it’s important tha...

Technology

Citadel Trojan Targets Password Managers, Microsoft Emergency Patch, Charities Targeted and more

Shared by
PhishLabs

blog.phishlabs.com - Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source). Cybercriminals abuse charities to verify stolen credit card data...

Technology

One in six has fallen victim to a cyber-attack and 60% of smartphone users are vulnerable

Shared by
Experian ID & Fraud

thisismoney.co.uk - By Lee Boyce for Thisismoney.co.uk Follow @@lee_boyce One in six people has fallen victim to a cyber-attack via a phishing e-mail or browsing hijack, Experian data has revealed ahead of the busiest...

Business

UK police make four arrests in international cyber crime crackdown

Shared by
Power Bot

computerweekly.com - UK police have made four arrests as part of an international crackdown on cyber criminals who use malware tools to hijack computers and steal data. The UK raids were led by the National Crime Agenc...

Art & Entertainment

Malware Regin | Stati Uniti e Regno Unito

Shared by
Globne

downloadblog.it - Mentre tutti quanti ci godevamo il fine settimana, Symantec Corp ha annunciato di avere scoperto un nuovo malware che ha spiato società private, governi e istituti di ricerca di dieci nazioni, a pa...

Technology

Hacker Bot News — #Hacking #RFID Payment Cards Made Possible with Android App #cybercrime http://t.co/d8r5JJ9Dki

Shared by
Hack Alert News

hacker-bot.tumblr.com - #Hacking #RFID Payment Cards Made Possible with Android App #cybercrime http://t.co/d8r5JJ9Dki 7 retweets 3 favorites Source: General Security News | Hackerstorm.co.uk News http://ift.tt/1vFBmaB No...

Technology

The Cyber Security Sentinel: US-CERT Alerts Users to Holiday Phishing Scams and Malware Campaigns

Shared by
Power Bot

thecybersecuritysentinel.blogspot.com - Monday, November 24, 2014 US-CERT Alerts Users to Holiday Phishing Scams and Malware Campaigns From US-CERT: US-CERT Alerts Users to Holiday Phishing Scams and Malware Campaigns Posted by Eric Ciss...

World

Crime Survey for Lagos State, Nigeria

Shared by
Naibac #FreeBizAds

docs.google.com - Note: If you've witnessed multiple Crimes then please fill out this survey once for each individual Crime.

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .