The Cybercrime Herald

Edition list view

Science

Effective security techniques we don't follow enough

zdnet.com

zdnet.com - This is #1 because it's so well-understood and so long-established as an effective defense against SQL injection, and yet it is still widely unused. Any programmers using SQL and not parameterizing...

Technology

Britons Feel Extremely Violated by Cybercrime Yet Most Still Don’t Use Basic Security Measures - Web Host Industry Review

Shared by
Maryleelove

thewhir.com - Over half of Britons have been the victim of an online crime, this according to a poll released on Tuesday by Get Safe Online for its cybercrime awareness week. People now feel online crimes are as...

Business

Cost of cybercrime continues to increase for US companies

Shared by
GreeneConsulting

securityaffairs.co - Which is the cost of cybercrime suffered by US companies? The fifth annual report published by the Ponemon Institute and titled “2014 Global Report on the Cost of Cyber Crime” reveals that cyber at...

Politics

Computer misuse: Brits could face LIFE IN PRISON for serious hacking offences • The Register

Shared by
Isaias Hicks

theregister.co.uk - British computer hackers who severely damage the national security of any country could face life in prison under a new criminal offence proposed in the Serious Crime Bill, however the plan has bee...

Technology

The Ten Most Wanted Hackers by the FBI - #10 - The State of Security

Shared by
Kiril Kamburov

tripwire.com - Home « News « Featured Articles « The Ten Most Wanted Hackers by the FBI – #10 Hackers all have different intentions—some are committed to making computer networks more secure, while some are more ...

Art & Entertainment

Symantec Observed Spike in DNS Amplification Attacks

Shared by
Jeremie

securityweek.com - "Another trend seen in 2014 is the increase in Unix servers being compromised and their high bandwidth being used in DDoS attacks," Wueest blogged. "PHP.Brobot and Backdoor.Piltabe are two examples...

Technology

CenturyLinkVoice: The 3 Biggest Cybersecurity Threats Of 2014 -- And How The Federal Government Plans To Stop Them - Forbes

Shared by
Mike Beckett

forbes.com - The cyber attack on JP Morgan Chase that compromised the personal information of 76 million households is just the latest in a slew of security breaches that have plagued some of the nation’s most ...

Technology

Small firms urged to take steps to combat cyber crime - Press releases - GOV.UK

Shared by
Bill Broadband

gov.uk - Many small and medium-sized businesses ignore or underestimate the threat online fraud poses to their profitability, cashflow and reputation, according to a panel of experts on cyber fraud. Ed Vaiz...

Science

Toename phishing duizelingwekkend | Binnenland

Shared by
Digitale Opsporing

telegraaf.nl - ’Phishing’ met nepmails van internetcriminelen om de consument te bestelen en op te lichten, heeft nu ook de reiswereld bereikt. Onder meer online reisbureau Cheaptickets kreeg een frontale aanval ...

Leisure

Seattle News and Events | Seattleland: ‘Kidnapped’ Russian Hacker Facing New Charges

Shared by
Graham Palmer

seattleweekly.com - On the humid morning of July 5, 30-year-old Roman Seleznev was passing through security screening at Malé International Airport in the Maldives, about 400 miles southwest of India in the Indian Oce...

Technology

Operation Distributed Dragons, thousands of machine compromised worldwide

Shared by
Security Affairs

securityaffairs.co - Security experts at the Italian Tiger Security firm have spotted a new wave of DDoS attacks that were originated in China and that appear as run by well organized APT. The expert identified the ope...

Technology

How to avoid falling victim to cybercrime by protecting your details from online fraudster | Personal Finance | Finance

Shared by
Alice

express.co.uk - Sending fake emails, known as “phishing”, is an old trick. The message will typically ask you to click on a malicious link and reveal passwords and account numbers. Criminals are getting better at ...

Crime

L’arrestation du baron russe du cybercrime seco...

Shared by
Alexandre Hugla

scoop.it - L’arrestation du présumé baron de la cybercriminalité russe Romain Seleznev semble coïncider avec plusieurs fermeture de sites underground dédiés à la vente de données bancaires piratés, tous spéci...

Technology

Cybercrime : "Plus vite l'hébergeur réagit, moins il y aura de victimes" - Le Point

Shared by
Marguerite Perle

lepoint.fr - Cybercrime : "Plus vite l'hébergeur réagit, moins il y aura de victimes" Les deuxièmes rencontres parlementaires de la cybersécurité soulignent la nécessité de la coopération entre les autorités et...

Technology

Hacked and ashamed? C'mon, Brits – report that cybercrime • The Register

Shared by
Dan Willis

theregister.co.uk - Internet-enabled frauds reached £670m across the UK in the 12 months running up to the end of August, according to new figures from the National Fraud Intelligence Bureau. Since the majority of int...

Technology

Cybercriminals Are Using Cloud Storage to Hoard Stolen Files

Shared by
John F. McClure

gizmodo.com - Cybercriminals: They're just like us! At least, their choice of cloud storage isn't so far off from your average non-despicable data thief. Instead of using dedicated servers to hoard stolen data, ...

Technology

Le coût des cyberattaques en France croît en un an de 20 %

Shared by
Mike Beckett

itrnews.com - Le coût des cyberattaques en France croît en un an de 20 % Le coût moyen annuel par entreprise lié au cyber crime s’élève à 12,7 M$[1], avec une progression de 9,3%, ce qui représente une augmentat...

World

Not been a victim of cyber-crime yet? You're now in the minority

Shared by
John Gunn

zdnet.com - Just over half the people in Britain have been the victim of an online crime, or cybercrime, according to the latest survey of the issue by Get Safe Online, costing £670m a year in fraud. Research:...

Technology

5th Annual Ponemon Cost of Cyber Crime Study Results: Americas

Shared by
Duncan Brown

brighttalk.com - Erfahren Sie in unserem Webinar mehr über den Secunia Corporate Software Inspector 7.0 und dessen Integration in Microsoft Windows Server Update Service. Die Lösung ermöglicht Ihnen das Scannen nac...

Technology

Hackers exploit Windows zero-day flaw in targeted PowerPoint attacks

Shared by
David Moloney

blog.lumension.com - Be on your guard. Another zero-day vulnerability has been uncovered that affects almost all supported versions of Windows, and it is being actively exploited by hackers in targeted attacks. Microso...

Technology

"Poodle" attack - yet another Internet bug - Oct. 15, 2014

Shared by
Mike Beckett

money.cnn.com - Google (GOOG) security researchers have discovered a weakness in a method for securing Internet communication. As it turns out, our Web browsers are susceptible to a cyberattack dubbed "Poodle" (Pa...

Politics

Computer users who damage national security could face jail | Law

Shared by
SCRIPT Centre

theguardian.com - Government plans that mean computer users deemed to have damaged national security, the economy or the environment will face a life sentence have been criticised by experts who warn that the new la...

Technology

Le coût des cyberattaques en France croît en un an de 20.5% pour atteindre 4,8M€ par entreprise - Global Security Mag Online

Shared by
CoupeDuMonde 2014

globalsecuritymag.fr - Pendant la durée de l’étude, d’importantes cyberattaques menées aux Etats-Unis ont porté sur le vol de millions de cartes de paiement, de mots de passe Internet, de propriété intellectuelle et de c...

Technology

Worm variant of Android ransomware, Koler, spreads via SMS - SC Magazine

Shared by
Yaogwai

scmagazine.com - In May, researchers observed Android ransomware identified as Koler.A locking up the screens of victims around the world who visited certain pornographic websites – now, mobile security company Ada...

Business

Payments Peeps: Brace For More Cyber Attacks

Shared by
PYMNTS

pymnts.com - Just the news we all wanted to hear: cybercrime black markets are getting to be much more efficient, well-organized and better able to profit from stolen payment data. As those efficiencies squeeze...

Business

For average big business, cyber-security costs reach $12.7 million - St. Louis Business Journal

Shared by
STLBusinessJournal

bizjournals.com - For large U.S. companies, the annual cost of dealing with cybercrime has doubled in the last five years to $12.7 million. The cost is even higher at financial services companies — $20.8 million a y...

Business

2014 Global Report on the Cost of Cyber Crime – a HP Ponemon Study.

Shared by
Judy Selby

brianpennington.co.uk - The results of the HP Enterprise Security sponsored Ponemon 2014 Global Report on the Cost of Cyber Crime are summarised below. During the period they conducted interviews and analysed the findings...

Technology

Cyber Crime Growing - Common Attack Techniques

Shared by
Luciano Gama

voyager.net.uk - Our partner Blue Coat Systems recently published a blog post accompanied with powerful statistics that compared real-world crime and cyber crime and showed that cyber crime is at an all time high. ...

Business

Cyber-criminals could spark next financial crisis - Telegraph

Shared by
Jack Armstrong

telegraph.co.uk - Mr Boleat was speaking as he prepared to address the Institute of International Finance in Washington this weekend on the threat of cyber-crime. The dramatic picture follows a series of security br...

Business

World in beta - Trust

Shared by
Jack Armstrong

worldinbeta.com - It’s hard to overstate how important trust is becoming. In the digital world, trust comes in two forms: trust you earn from your customers, employees, suppliers and partners. And trust in the resil...

World

U.S. national security prosecutors shift focus from spies to cyber - Chicago Tribune

Shared by
RSA Conference

chicagotribune.com - WASHINGTON (Reuters) - The U.S. Justice Department is restructuring its national security prosecution team to deal with cyber attacks and the threat of sensitive technology ending up in the wrong h...

Technology

Finally, the Mid-Season Cybercrime Awards Are Here! -HackSurfer

Shared by
Jeff Peters

hacksurfer.com - Week seven has come and gone, leaving only six weeks left to go in the regular season of 2014's HackSurfer Fantasy Cybercrime League. For those unfamiliar, a few months back the HackSurfer staff dr...

World

INTERPOL-Europol cybercrime conference reinforces multisector commitment to cybersecurity

Shared by
Arnout Lansberg

europol.europa.eu - Prevention, information exchange, investigation and capacity building were highlighted as the four core elements in combating cybercrime at the conclusion of the INTERPOL-Europol conference. Center...

Technology

Pricing Policies in the Cyber Criminal Underground - InfoSec Institute

Shared by
Security Affairs

resources.infosecinstitute.com - Underground markets are places on the Internet where criminal gangs offer a wide range of illegal products and services. Black markets are crowded places where single individuals or criminal organi...

Technology

This POODLE bites

Shared by
Axel Buhrmann

it-online.co.za - POODLE (Padding Oracle On Downgraded Legacy Encryption) is a vulnerability that enables attackers to gain access to things like passwords, cookies and users private account data on a website. It ex...

Technology

Get safe online - the top 10 most common internet scams

Shared by
StavrosStavrinoudaki

gloucestershireecho.co.uk - The ten biggest online scams lost victims across the country £670million over the last year – and this figure is likely to be far higher due to unreported cases, National Fraud Intelligence Bureau ...

Science

Synthetic Identity Fraud A Fast-Growing Category

Shared by
CyLab

darkreading.com - The next time some company tells consumers that an attacker only managed to steal Social Security numbers (SSNs) from a database but has no way of tying those back to customer names, the market sho...

World

DOJ's National Security Division Reorganizes for Cyber and Corporate Espionage Threats

Shared by
McGuireWoods LLP

mainjustice.com - The Justice Department has reorganized its National Security Division to combat the increasing threat of state-sponsored economic espionage and theft of corporate America’s secrets. “Nation states ...

Science

Social Media And Crime - Crime Wire

Shared by
Chris Duque

instantcheckmate.com - Did you know that 81% of Internet-initiated crimes involve a social networking site? This statistic is pretty unnerving to think about, especially since the majority of people in the U.S. maintain ...

Crime

California woman charged with using spyware to tap a police officer’s phone

Shared by
CyLab

arstechnica.com - On Friday, a Monterey County woman was charged with wiretapping a police officer and possessing "illegal interception devices,” according to the Northern California District Attorney’s office. The ...

Technology

Staples probes potential theft of customer credit card data - CNET

Shared by
CyLab

cnet.com - Staples said late Monday that it is investigating a "potential issue" involving its customers' credit card data in what could be the latest US retailer to fall victim to a payment card system secur...

Technology

Staples investigating data breach following reports of stolen card details - IT News from V3.co.uk

Shared by
World News Report

v3.co.uk - Office supply giant Staples is investigating a data breach following reports that fraudsters are going on a spending spree with stolen customer card details. Cyber investigator Brian Krebs reported...

Science

830.000 computers besmet door Cryptowall-ransomware - Security.NL

Shared by
internetsporen.nl

security.nl - Het aantal computers dat met de Cryptowall-ransomware besmet is geraakt is naar 830.000 gestegen. Een toename van meer dan 200.000 infecties in twee maanden tijd, zo blijkt uit nieuwe cijfers van D...

Business

Analyzing the HIGH-TECH CRIME TRENDS 2014 Report

Shared by
Security Affairs

securityaffairs.co - Group-IB, a leading company in cybercrime prevention and investigations, has issued its annual report titled “GROUP-IB REPORT: HIGH-TECH CRIME TRENDS 2014″ which cover the second half of 2013 and t...

World

Justice division takes on economic spying, cybercrime

Shared by
IdenTrust, Inc.

usatoday.com - WASHINGTON —The Justice Department is expanding its National Security division to take on threats to the country from state-sponsored economic espionage and cybercrime, assistant attorney general f...

Business

UK National Crime Agency looking to hire cyber and software specialists - IT News from V3.co.uk

Shared by
Kunkka

v3.co.uk - The UK's National Crime Agency (NCA) has started a recruitment drive to find technical specialists for a number of digital forensic and software development roles. A range of jobs are available, an...

Education

Malware Tyupkin: Mitigação de Riscos Relacionada à Manipulação de Caixas Eletrônicos

Shared by
Camilla Lemke

under-linux.org - Malware Tyupkin: Mitigação de Riscos Relacionada à Manipulação de Caixas Eletrônicos No início deste ano de 2014, a pedido de uma instituição financeira, o Global Research da Kaspersky Lab e equipe...

Technology

In Plain Sight: How Cyber Criminals Exfiltrate Data Via Video

Shared by
Power Bot

darkreading.com - There's always been a tension between the promise of new technology and peril from its misuse or abuse. Look at the recent iCloud breach. A technology that offers the convenience of accessing photo...

World

Online harassment seen as major problem: US survey | AFP

Shared by
WITBANK NEWS

witbanknews.co.za - by Rob Lever Washington (AFP) | 22 October 2014 20:54 Harassment ranged from mild — such as name-calling — to stalking or physical threats, according to the Pew Research Center survey. “We know fro...

Technology

Top 10 tricks to protect yourself from cyber crime

Shared by
Neckerman Insurance

blog.cinfin.com - October is normally associated with Halloween and ghosts and goblins, but for the last 10 years it’s been National Cyber Security Awareness month. As evidenced by the rising number of successful at...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .