The Cybercrime Herald

Edition list view

Business

ThyssenKrupp secrets stolen in 'massive' cyber attack

Shared by Neira Jones

reuters.com - FRANKFURT Technical trade secrets were stolen from the steel production and manufacturing plant design divisions of ThyssenKrupp AG (TKAG.DE) in cyber attacks earlier this year, the German company ...

Science

IBM’s Watson Now Fights Cybercrime in the Real World

wired.com - You may know Watson as IBM’s Jeopardy-winning, cookbook-writing, dress-designing, weather-predicting supercomputer-of-all trades. Now it’s embarking on its biggest challenge yet: Preventing cybercr...

Technology

Top 4 global security threats businesses will face in 2017 - Help Net Security

Shared by Norseman

helpnetsecurity.com - The Information Security Forum (ISF) has announced their outlook for the top four global security threats that businesses will face in 2017. “The pace and scale of information security threats cont...

Environment

West Midlands Police and Crime Commissioner- Second annual cyber crime survey launches in Warwickshire, West Mercia and the West Midlands

Shared by WestMidsPCC

westmidlands-pcc.gov.uk - The Police and Crime Commissioners for Warwickshire, West Mercia and the West Midlands have joined together with Warwickshire County Council and partners today to launch the second annual cyber cri...

Technology

Watch out! A new LinkedIn Phishing campaign is spreading in the wild

Shared by CyberSecurity

securityaffairs.co - Phishing attacks continue to be a serious threat, crooks exploit paradigms such as social medial platforms and mobile in the attempt of stealing sensitive data.According to 2015 Verizon Data Breach...

Science

An AI cyber-security sauce to repel IT threats?

Shared by Khalid Hamdan

itproportal.com - Since cybersecurity threats have become a topic of nightly newscasts, no longer is anyone shocked by their scope and veracity. What is shocking is the financial damage the attacks are predicted to ...

Business

Avalanche: Thwarting Cybercriminal Hazards with Law Enforcement Collaboration - TrendLabs Security Intelligence Blog

Shared by TrendLabs

blog.trendmicro.com - Figure 1. Some of the malware families leveraged by Avalanche Information from Europol and Shadowserver Foundation cited over 20 malware families involved in Avalanche’s campaigns, which Trend Micr...

Business

Law firm data security is now clearly a national security issue | Logikcull Blog

Shared by Logikcull

logikcull.com - Bad news for some Big Law clients: those emails partners are charging $800 an hour to draft are also finding their way into foreign intelligence apparatuses. If there was ever a question that law f...

Technology

Britain’s cybersecurity policy needs common sense, not just cash | John Naughton

Shared by CyberSecurity

theguardian.com - On Tuesday, the chancellor, Philip Hammond, announced that the government was “investing” £1.9bn in boosting the nation’s cybersecurity. “If we want Britain to be the best place in the world to be ...

World

Will the Future U.S. Leaders Establish a Cybersecurity Strategy? - IT Peer Network

Shared by CyberSecurity

itpeernetwork.intel.com - The U.S. lacks of a clear and comprehensive national cybersecurity policy, objectives, and plan.  It is very concerning.  As cyber issues continue to grow, we will look back and ask ourselves "why ...

Technology

Beware of this text scam that looks like a message from Amazon

independent.co.uk - Shoppers are being targeted by a new wave of text message phishing scams that pretend to offer Amazon users free gift vouchers. The scam offers people what appears to be a free Amazon gift card and...

Technology

Georgia Secretary of State: DHS Attacked Our Firewall

thenewamerican.com - On Thursday, Georgia Secretary of State Brian Kemp sent a letter to the Department of Homeland Security (DHS) to ask “why [it] was attempting to breach” the firewall protecting his computer infrast...

Science

Watson finally gets to hunt bad guys - Enterprise Times

Shared by Bob Mack

enterprisetimes.co.uk - IBM Watson for Cyber Security has finally moved from a research programme to formal beta. The press release announcing the beta phase said that 40 different organisations have agreed to be beta par...

Technology

5 tips for hardening your firewalls

perspectiverisk.com - In this second part of our occasional series ‘Make the most of your Pen Testing‘ by our cyber security specialist Tom Sherwood, we help you take care of some security basics ahead of your pen test....

Technology

Are you ready to defend your firm's reputation in the event of a cyber-attack? - Legal Futures

Shared by Legal Eye Ltd

legalfutures.co.uk - Posted by Jonathan Hemus from Insignia on behalf of Legal Futures Associate tmgroup With cyber-crime making the headlines more and more frequently, it is becoming increasingly important that law fi...

Technology

Cybercrime expected to rise during the 2016 holiday shopping season

knowtechie.com - New studies show a massive increase in malware for the 2016 holiday shopping season.  Holiday shoppers will need to take extra precaution this year, according to a report from Enigma Software. The ...

Technology

Data Loss Prevention Strategies for Networks

blog.finjan.com - New threats are constantly emerging, on the digital security landscape. Data breaches are a regular occurrence, and fresh email hacks seem to take place every other week, as cyber-attackers, malici...

Science

Cybercriminals Are Cracking Advanced Authentication Methods

securityintelligence.com - Cybercriminals are learning how to use newer authentication methods to exploit security weaknesses. As always, it is a cat-and-mouse game with serious consequences. Facial recognition software can ...

World

MDR, MSSP and SIEM: A primer

arcticwolf.com - The rising tide of cybercrime is putting more pressure on IT leaders than ever to make smart, cost-efficient detective cybersecurity purchases. Traditionally, businesses turned to security informat...

Business

Account Takeover Attack – Not for Detect-It-Yourselfers - VeriClouds

Shared by Stan Bounev

vericlouds.com - Do you like to fix things yourself? Handy with tools at home or work? Maybe even tech-savvy and smart with online security tools? Every company, even those who do not have an IT department, have so...

Technology

Cybersecurity

lawsociety.ie - In this section you learn what cybercrime is, read details of specific threats we are aware of, plus articles on types of fraud and security tips and use our form to tell us about your experiences ...

Science

Here are some best practices for preventing DDoS attacks | ZDNet

zdnet.com - Distributed denial-of-service (DDoS) made lots of headlines in late October when a massive DDoS attack on Domain Name System (DNS) service provider Dyn temporarily disrupted some of the most popula...

Technology

Research: A New Christmas Decorated Cerber Ransomware Has Arrived

blog.fortinet.com - A new unversioned Cerber has surfaced! It appears that the author(s) of Cerber is working hard to make more money during Christmas season. This latest version has relatively more changes as compare...

World

DDoS means points and prizes as hackers in Turkey gamify cyber-crime

Shared by Morphisec

scmagazineuk.com - Hackers in Turkey have come up with a bizarre loyalty scheme that gives other hackers points if they help out in DDoS attacks. These points can then be turned into prizes. Turkey was identified as ...

Technology

CenturyLinkVoice: 6 Cyberthreats Keeping CIOs Up At Night

forbes.com - Cybersecurity defenses must constantly evolve to meet new threats. To do so, IT executives have to keep up with a lot. The good news is that many threats — even sophisticated ones— are preventable....

Education

ThyssenKrupp-Hack – Bemerkenswertes Vorgehen - it-daily.net

Shared by it management

it-daily.net - Wenige Tage nach dem breit angelegten Angriff auf ein bestimmtes Routersystem, das unter anderem auch die Telekom einsetzt, erschüttert der nächste Sicherheitszwischenfall die Medien. Bei der von T...

Technology

Hackers target UK National Lottery players

Shared by IT Empathy

foxnews.com - The U.K.’s National Lottery said Wednesday that around 26,500 players’ accounts have been accessed by hackers. Camelot, which organizes the National Lottery, said that it became aware of suspicious...

Science

Waarom het zo moeilijk is om cybercrime aan te pakken

Shared by Wilco de Haan

computerworld.nl - Online criminaliteit is big business en het boevengilde verplaatst veel 'oude' criminaliteit naar internet, waar ook nog eens minder risico aan verbonden is. Vanochtend nog verbaasden we ons op de ...

Science

Law School Victim Of A Cyber Attack, Applicant Data Compromised

Shared by Will Lymer

abovethelaw.com - The stress of applying to law school can be intense. The LSAT, the essay, the hassle of it all. Now there’s an additional stress factor — well, if you applied to the University of Wisconsin Law Sch...

Technology

Another email Hack: Should We Worry?

poweradmin.com - Each time a major email service or social media platform gets hacked, the incident generates exciting headlines in the media. But behind the hype there’s a very real tale of anxiety for all the use...

Technology

Herridge - Johnson No Clue How DHS IP Linked To Georgia State Hack

rickwells.us - Homeland “Security” is a rogue outlaw agency engaged in the non-stop daily flouting of our laws, most visibly but not restricted to our immigration laws. Against that backdrop of experience, partic...

Technology

Bahamian Hacker Gets 5 Years Jail Time for Hacking, Leaking Celebrities Photos

Shared by HackRead

hackread.com - Alonzo Knowles, a 24-year-old Bahamian male, has received five years in prison for violating the privacy of celebrities, athletes and famous personalities by hacking into their email accounts and s...

World

This Ransomware Unlocks Your Files For Free If You Infect Others

thehackernews.com - Is your PC infected with Ransomware? Either pay the ransom amount to the attacker or spread the infection further to get the decryption keys. Yes, this new technique has been employed by cyber crim...

Business

Conveyancing theft reported as biggest cybercrime problem for law firms - Today's Conveyancer

Shared by iGloobe.info

todaysconveyancer.co.uk - Figures published today by the Solicitors Regulation Authority (SRA) have shown that email hacks of conveyancing transactions are the most common cybercrime in the legal sector, with £7 million of ...

Politics

Why it's so hard to prosecute cyber criminals

Shared by James Dean

infoworld.com - We live in a world where internet crime is rampant. Cyber criminals steal hundreds of millions of dollars each year with near impunity. For every 1 that gets caught, 10,000 go free -- maybe more. F...

Business

What will be the most important drivers of change in the global sourcing arena over the next decade, and why?

niccollsanddimes.com - (Previously published in Outsourcing Magazine, on August 16, 2016) For the last few decades outsourcing has been on a journey… literally! Outsourcing once meant having another company do your work,...

Science

IBM Watson AI: These firms are fighting cybercrime using cognitive computing | ZDNet

zdnet.com - Fortune 500 companies across the globe are tackling cybercrime by deploying IBM Watson's cognitive computing power. Watson for Cyber Security, a project designed to take the fight to hackers, is a ...

Business

Your Credit Card Was Hacked, Now What?

Shared by Alex Jiménez

thefrugaltoad.com - With major retailers revealing the breach of their customers’ credit and debit card data, it is more important than ever to protect yourself.  It is becoming easier for hackers to steal and use cus...

Business

Data Theft At ThyssenKrupp Highlights Industrial Espionage Threat

Shared by Fusioneer

darkreading.com - In recent years, data breaches involving theft of financial and personal information have outnumbered cyber incidents involving theft of intellectual property and trade secrets. But news this week ...

Technology

Protecting Your Business from Cybercrime | NewsFactor Network

Shared by Data2Vault

newsfactor.com - During our live Q&A on how to protect your business from cybercrime, our panel offered a broad range of expertise, from how to recognize a hacking attempt to tips for keeping your business safe whe...

Technology

Eight Proven Strategies To Deal With Cybercrime

Shared by OVH Ireland

forbes.com - Security can no longer be an afterthought when building your company's online presence. Technology executives need to focus on cybersecurity as a core feature; in short, they must build systems now...

Business

ThyssenKrupp Hit by Hackers Eyeing Industrial Secrets

securityweek.com - German heavy industry giant ThyssenKrupp said Thursday it fell victim to a hacking attack in which the perpetrators sought to steal company secrets. Hackers believed to be from Southeast Asia were ...

Business

Measuring the True Impact of a Cyberattack

Shared by ZENEDGE

deloitte.wsj.com - What can a large-scale cyberattack cost in terms of lost revenue, customer relationships, and brand damage? A Deloitte study gives business leaders a realistic—if unsettling—sense of what’s at stak...

Technology

Beware!! Now Hackers Can Read Your Yahoo Mails –

vishwagujarat.com - Yahoo has patched a critical security vulnerability in its Mail service that could have allowed an attacker to spy on any Yahoo user’s inbox. Jouko Pynnonen, a Finnish Security researcher from secu...

World

Barack Obama orders 'full review' of possible Russian hacking in US election

Shared by Will Lymer

theguardian.com - Barack Obama has ordered US intelligence to review evidence of Russian interference in the 2016 presidential election after coming under sustained pressure from congressional Democrats. The review ...

Technology

Reusing passwords is the biggest threat to social media globally – Facebook - TechCity

Shared by CyberSecurity

techcityng.com - Every now and then, news of cybersecurity breaches are published on TechCity and other major tech platforms. The increasing popularity of cybercrime has created a major challenge for the tech commu...

Technology

Cyber criminals move to exploit ‘safe’ social media spaces

Shared by RFA

theguardian.com - Following a few glasses of wine, John’s inhibitions had dropped when he went online to talk to a woman he had met through an internet dating site. Although they hadn’t met in person, they had been ...

Technology

This is the new reality for cyber security: Accept that hackers will get in

marketwatch.com - The stakes of the data breach crisis have been enormous this year and make prospects bleak for 2017 and beyond. Global cybercrime will double to a projected $6 trillion in $2021, from $3 trillion i...

Technology

Netizens say: We’re not OK with the draft Computer Crime Act - SEAPA – Southeast Asian Press Alliance

seapa.org - This article was rewritten from the original post in Thai “สองเวทีวิเคราะห์ร่าง พ.ร.บ.คอมฯ คนใช้เน็ตประสานเสียง #เราไม่โอเค“ It has been nine years since the Computer Crime Act (CCA) was promulgate...

Business

Cybercrime in Social Media Grows 70% in Six Months - Speaking of Security - The RSA Blog

Shared by Jan Graham

blogs.rsa.com - These days, all you need to do is type “botnet,” “hacking,” “DDoS,” “CVV2,” or any other cybercrime-related term into the search bar on most social media platforms, and you will find a plethora of ...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →