The Cybercrime Herald

Edition list view

Technology

What If Your ISP Could Stop Cybercrime Before It Happened? - Beyond Bandwidth

blog.level3.com - This article was written by Jonathan Salem Baskin from Forbes and was legally licensed through the NewsCred publisher network. Although major hacks generate news headlines, most companies and insti...

Environment

Die Sicherheitsrisiken von IoT mit NAC eindämmen

Shared by TechTargetDE

searchnetworking.de - Die Unternehmen in Deutschland haben im Durchschnitt mehr Sicherheitsereignisse zu verzeichnen und im Hinblick auf die Cyber-Sicherheit Nachholbedarf. Frost & Sullivan befragte IT- und Sicherheitsf...

Technology

The 2016 trends in cybercrime that you need to know about

cnbc.com - Europol's "Internet Organised Crime Threat Assessment" for 2016 identified eight cybercrime trends that everyone should beware of: The digital underground is underpinned by a growing Crime-as-a-Ser...

Technology

IoT malware on the rise with hackers hijacking devices to launch DDoS attacks

ibtimes.co.uk - Security surrounding IoT (Internet of Things) devices has long been a major cause of concern to experts, especially given the increasing use of IoT botnets by cybercriminals to leverage attacks. Ho...

Science

From Gut Instincts to Data-Driven Decision Making

Shared by Quorum EMEA

technologyreview.pk - Khuram Rahat is well known in Pakistan for his in-depth knowledge of cutting edge business intelligence solutions, the current regional Managing Director for Teradata – Pakistan, Afghanistan and Ba...

Technology

What the Hacking at Yahoo Means for Verizon

Shared by Prasad Np

nytimes.com - Now, just a few days after Verizon learned of the breach, it is contending with the ramifications of what is believed to be the largest hack of a single company. Even as Verizon tries to assess the...

Business

ABS targets service provider IBM over census fail

abc.net.au - The Australian Bureau of Statistics (ABS) has targeted service provider IBM in its submission to a Senate inquiry into the handling of the botched census. Thousands of Australians were prevented fr...

Technology

Cyber Security How Deleted Files Are a Goldmine for Cyber Criminals

intelligenthq.com - ‘HACKSPACE’ – Deleted Files A Goldmine for Cyber Criminals  In an increasing complex business world digital and computer security – cybersecurity or IT security, is increasing a preoccupation. Busi...

Science

Protected API Calls and String Constants: Looting Dridex's Candy Box

securityintelligence.com - When I was a kid, my mom would give my brothers and me a weekly allowance to buy candy. It was about the equivalent of $2, and if used prudently was just about enough to buy an ice cream bar and a ...

Technology

Cybersecurity is key to the success of Digital Transformation in Asia Pacific

news.microsoft.com - by Keshav Dhakad, Regional Director, Digital Crimes Unit, Microsoft Asia With more than 1 billion people in the Asia Pacific online and more people and businesses using multiple devices to stay con...

Business

US Senators Urge Obama to Address Financial Cyber-risk at G20

Shared by Brand Street

infosecurity-magazine.com - US senators are urging President Obama to address the topic of cybersecurity at the upcoming Group of 20 Summit in China. Sherrod Brown of Ohio, a senior Democrat on the Senate Banking Committee, G...

Technology

Researchers wirelessly hit the brakes in a Model S, Tesla patches quickly

Shared by Walt Manning

arstechnica.com - Security researchers at the Chinese Internet company Tencent's Keen Security Lab privately revealed a security bug in Tesla Model S cars that allowed an attacker to achieve remote access to a vehic...

Sports

Munich Gunman Purchased Weapon on Dark Web

Shared by Quorum EMEA

defendmagazine.org - In Germany, it is difficult to buy weapons, so many people were asking how the Munich gunman got a 9mm Glock 17. According to several German news outlets, the shooter bought the 9mm Glock 17 he use...

Business

Cybercrime may be costing London business '£35bn', say GLA Tories | THINK Digital Partners

thinkdigitalpartners.com - Report says Khan could be doing more to help protect London’s businesses from the threat Posted 1 September 2016 at 7:53am by Gary Flood Cybercrime could cost London businesses £35bn, according to ...

Technology

Hack Brief: Yahoo Breach Hits Half a Billion Users

Shared by Jim Rodriguez

wired.com - Editor’s note: This story was updated at 4 p.m. to include new information after Yahoo’s announcement of its data breach. Over recent months, the ghosts of data breaches past have been returning to...

Technology

Instagram Accounts Getting Hacked; Spreading Adult Content

Shared by Quorum EMEA

hackread.com - Social media accounts are always targeted very by malicious actors and scammers. Lately, we have seen quite a few platforms being violated by hackers including Twitter, LinkedIn and MySpace. So, it...

Art & Entertainment

More than 100 cyber crime suspects arrested in Sharjah this year | The National

Shared by Robin Singh

thenational.ae - SHARJAH // More than 100 cyber crime suspects were arrested in Sharjah in the first eight months of the year. Sharjah Police said 122 people were held for involvement in 94 cases, the majority of w...

Technology

Cybersecurity Standards

Shared by SaltDNA

insights.samsung.com - Cybersecurity standards for financial services providers are gaining more backing from regulators as threats from cyberattacks continue to rise. According to the Identity Theft Resource Center (ITR...

Business

Energy sector addressing cybersecurity threats

upi.com - OSLO, Norway, Sept. 29 (UPI) -- An international organization said Thursday a group of energy companies joined it in forming an industry body to tackle cybersecurity threats. "We see that cyber-sec...

Business

Four Things to Look for When Evaluating a Financial Services Security Vendor

Shared by Quorum EMEA

blog.fortinet.com - The need for cybersecurity vendors in the financial services marketplace has amplified as the threats have increased exponentially due to IOT, BYOD, and state-sponsored cyberterrorism, to name just...

Science

Cyberattacks on personal health records growing ‘exponentially’

washingtonpost.com - A doctor checks a patient’s blood pressure. (iStock) This year marks the 20th anniversary of the Health Insurance Portability and Accountability Act, better known as HIPAA. Since it took effect, do...

Technology

7WC14 Windows 10 Cybercrime Online-Konferenz

Shared by Milad Aslaner

microsoftevents.com - Zur Einwahl ins Meeting nutzen Sie bitte den Link aus Ihrer Registrierungsbestätigung. Die erste Windows 10 Cybercrime Online Konferenz ist gezielt für IT Entscheider, Chief Information Security Of...

Science

Mobiele telefoon vaker doelwit van cybercrime – Beveiliging Nieuws

Shared by maria genova

beveiligingnieuws.nl - Internetcriminelen richten zich steeds vaker op mobiele telefoons. Dit meldt dagblad Trouw op basis van het jaarlijkse trendrapport van Europol over digitale criminaliteit, dat vandaag verschijnt. ...

Technology

Yahoo Hackers Were Criminals Rather Than State-Sponsored, Security Firm Says

Shared by Neira Jones

wsj.com - An information-security firm says the hackers who stole at least 500 million records from Yahoo Inc. YHOO 0.74 % two years ago are criminals who are selling access to the database, and not a state-...

Technology

Malvertising and How it's Being Used to Launch Cyber Attacks

blog.finjan.com - Trust and ignorance can work hand in hand to produce favorable results – from a cybercriminal’s point of view. That’s why perpetrators are turning to a disturbing new strategy for porting malware o...

Technology

CloudFlare tells court it does not assist pirate sites: Report

Shared by Ali Raza

hackread.com - Perhaps the most difficult of all things to understand in the world in terms of law is online piracy. After all, who is to blame? One such case has been filed in the federal court of California and...

Politics

New ATM skimmers steal fingerprints

Shared by Neira Jones

finextra.com - New ATM skimmers steal fingerprints 4 hours ago  |  2165 views  |  0 As banks increasingly turn to biometrics to secure ATM transactions, Kaspersky Lab is warning that crooks are already selling sk...

Technology

Cybercrime Blotter: Majerczyk pleads guilty to hacking celeb email accounts

Shared by ECS Cyber

scmagazine.com - What happenend? Edward Majerczyk on September 27 pleaded guilty to one count of unauthorized access to a protected computer to obtain information which brings to a close a case dubbed Celebgate. Ma...

Technology

How to Improve IT Security in the Construction Industry

Shared by Gray

gray.com - The cost of cybercrime on the global economy has been estimated at $445 billion, according to a study released by McAfee and the Center for Strategic and International Studies. What’s more, Juniper...

Technology

Cybercriminalité : Tous victimes du crime du XXIe s.

quotidienne-agora.fr - Rédigé le 29 septembre 2016 par Etienne Henri | Nouvelles technologies Nous confions une part croissante de notre activité aux machines, et plus particulièrement aux ordinateurs. Avec l’arrivée d’I...

Science

Unlocking Big Data for Electioneering

Shared by Quorum EMEA

technologyreview.pk - Can Big Data Impact Politics and Elections in Pakistan? Big data in politics is more about following the digital footprints of the individuals (the voters), capturing their sentiments and emotions ...

Business

InfoSec 2016: Global experts to address cybersecurity issues at RDS - BelfastTelegraph.co.uk

Shared by Quorum EMEA

belfasttelegraph.co.uk - Ireland's first annual cybersecurity conference, InfoSec 2016, is set to address the main areas of IT security threats and the implications for businesses in Ireland. The conference takes place on ...

Science

Cybercriminaliteit » van phishing tot virus of hack. Wat nu?

mediawijsheid.nl - Cybercrime is criminaliteit waarbij gebruik wordt gemaakt van internet. We zijn overal en altijd online; thuis, op school en op ons werk. Aandacht voor cyberveiligheid is dus geen overbodige luxe. ...

Business

The True Cost of Cybercrime in Brazil

Shared by Quorum EMEA

securityintelligence.com - Many cybersecurity eyes have been on Brazil in the run up to this summer’s events. Every system has been under scrutiny, from ticket fraud prevention to the clocks used to time athletes. But cyberc...

Technology

POS Malware Raises Its Head Yet Again

Shared by Quorum EMEA

securityintelligence.com - Security firm PandaLabs has been watching point-of-sale (POS) malware for some time. It talked earlier this year about PunkeyPOS, a malware that affected POS terminals at hundreds of restaurants. B...

Science

Hoe maak je je mobieltje hackerproof?

ad.nl - ,,Een cryptolocker is het meest voorkomende middel dat gebruikt wordt door cybercriminelen'', zegt Brenno de Winter, journalist en specialist op het gebied van cybercrime. ,,Dat zorgt ervoor dat je...

Technology

Cybercrime: Ransomware, CEO Fraud Still Going Strong

Shared by JFK

bankinfosecurity.com - Drawn by the promise of faster, less expensive and more effective crime-committing capabilities - with lower risk - and backed by the easy availability of "as a service" offerings, more criminals t...

Science

Can technology and cognitive computing help us minimize cyber crime?

ibmbigdatahub.com - Innovation and cutting-edge technology exists in an environment where cyber crime is the norm. Each new technology evolution seems to beget increasingly agile cyber criminals bent on outwitting cyb...

Technology

Security and the threat of cybercrime is a real concern for organisations

Shared by Hope Tung

information-age.com -   Cyberattacks are becoming more frequent and costly and it seems no organisation size, type or industry is immune. What…   What do you think of when you imagine the world of industrial espionage? ...

Crime

Europol Sees Surge In Cybercrime | PYMNTS.com

Shared by Igor Leikin

pymnts.com - The European Union’s police agency, Europol, has seen a significant spike in the number of cybercriminals gaining from malicious activities. The latest data from the group found that Europol’s Euro...

Technology

The State of Malware on the Mac

cyberisk.biz - We often hear horror stories about the vulnerabilities and security shortcomings of Windows and its operating platforms across the board, but the same can’t be said about the Macintosh brand – unti...

Business

Growth of cybercrime is ‘ruthless’

Shared by ZON.ca

welivesecurity.com - Cybercrime has established itself as a permanent fixture in 21st century life, with the number of incidents and victims continuing to rise with dogged determination. This is according to a new repo...

Science

The psychological reasons behind risky password practices - Help Net Security

helpnetsecurity.com - Despite high-profile, large-scale data breaches dominating the news cycle – and repeated recommendations from experts to use strong passwords – consumers have yet to adjust their own behavior when ...

Business

Is the future of cyber crime a nightmare scenario? - Raconteur

Shared by SkillsVillage

raconteur.net - Cyber crime, according to the National Crime Agency (NCA) Cyber Crime Assessment 2016 report, accounted for 53 per cent of all crimes in 2015. Cameron Brown, an independent cyber defence adviser, w...

Science

IT audits must consider the cyber kill chain and much more

Shared by Integersec

csoonline.com - Many articles have been written regarding the cyber kill chain as it pertains to threat intelligence. By understanding the cyber kill chain we have the chance to take defensive action against an ad...

Leisure

The Luxury Dark Web Trade of Disneyland Tickets and Dinners for Two

Shared by Consfearacy

motherboard.vice.com - The dark web is famous for the trade of weapons, drugs, and child porn. But a handful of vendors on underground marketplaces advertise rather more high-brow fare: Burberry handbags, reduced hotel t...

Technology

Europol's IOCTA report says cyber-crime on a sharp rise

Shared by Proteus-Cyber

scmagazineuk.com - Europol has released its yearly Internet Organised Crime Threat Assessment (IOCTA) report, which this year has highlighted a sharp incline in cyber-crime and identified eight cyber-crime trends. Eu...

Technology

Hospital Ransomware Attacks On The Rise

Shared by Quorum EMEA

news.filehippo.com - In the realm of data breaches and hacking events, there are a handful of victims who are easy targets, for one reason or another. Elder scams, for example, are quite common–and utterly reprehensibl...

Science

Virlock Ransomware Spreads User-to-User for Massive Viral Infection

Shared by ReSec

infosecurity-magazine.com - The latest version of Virlock ransomware has hit the scene, with the brand-new capability of infecting every file it comes into contact with—for a potentially disastrous, virus-like propagation tec...

Technology

Yahoo breached by cyber-criminals rather than state-sponsored actors, says InfoArmor

thetechportal.com - Yahoo was already being rebuked(and laughed at) for its negligence over the massive data breach which resulted in the leak of over 500 million user accounts in 2014. But, it is now under fire from ...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →