The Cybercrime Herald

Edition list view

Science

Microsoft (tech) scam

politie.nl - Hier is sprake van oplichting / phishing. De beller is op uw geld uit en wil u ertoe verleiden om tegen betaling onveilige software (een virus) op uw pc te installeren. Hiermee krijgt de crimineel ...

Technology

Lurk cybercrime Gang developed, maintained and rent the Angler EK

securityaffairs.co - Security experts from Kaspersky Lab have confirmed that the Lurk cybercrime group are the author of the infamous Angler exploit kit. The members of the Lurk cybercrime crew were arrested by Russian...

Business

Cybercrime taking more than £147 billion a year from UK economy, report says - BelfastTelegraph.co.uk

Shared by Vincent ROYER

belfasttelegraph.co.uk - Cybercrime stands to cost the UK economy more than £147 billion per year, a new report claims. Data compiled by the Greater London Authority (GLA) Conservatives says that as many as 1.8 million com...

Environment

Six senators urge Obama to prioritize cybercrime at G20 summit

scmagazine.com - As President Obama prepares to attend the Group of 20 Summit in China, six Democratic senators asked him to make cybercrime a top priority. In a letter obtained by Reuters, the group, which include...

Business

Can Blockchain Prevent Cybercrime?

finextra.com - Can blockchain or distributed ledger technologies help prevent attacks on the world’s critical financial systems? Banks use standardised electronic messages, made up of codes and identifiers, a sor...

Technology

65% of IT Leaders Expect Serious Data Breach to Hit Their Business Within the Next Year

Shared by investorpro

itsecurityguru.org - Okta, the leading provider of identity and device management for the cloud and mobile enterprise, today announced the findings of its first Secure Business Agility report. Based on data compiled fr...

Technology

Are You Protected? 4 Tips to Avoid Losing $154 Per Record Stolen in a Corporate Data Breach

Shared by Dave Smith

business.com - Securing your company’s data is critical for both your bottom-line and brand reputation. When a breach occurs, your customers lose faith in your organization. With the cost of a data breach estimat...

World

Social engineering fraud / Financial crime / Crime areas / Internet / Home - INTERPOL

interpol.int - Social engineering fraud ‘Social engineering fraud’ is a broad term that refers to the scams used by criminals to trick, deceive and manipulate their victims into giving out confidential informatio...

Technology

Trends and traits of infamous data breaches – IT Governance Blog

itgovernance.co.uk - As noted in August’s list of data breaches, we have seen a large quantity of compromises, including: According to Verizon’s 2016 Data Breach Investigations Report, we can now assume that: Verizon’s...

Technology

Russia's Mail.ru Hacked Again; 27 million Accounts Stolen

hackread.com - A group comprising of just two hackers hacked Russia’s biggest internet company Mail.ru and stole a trove of data from forums hosted on the company’s server between July and August 2016. The total ...

Business

When Hackers Hack Each Other—A Staged Affair in the French Underground? - TrendLabs Security Intelligence Blog

Shared by Thireus ☠

blog.trendmicro.com - This past July, we published a blog post on a new illegal gambling system known as “French Dark Bets (FDB).” FDB is run and hosted by one of the biggest French underground marketplace, the French D...

World

​Australia outpaced by cyber criminals: Cyber professor | ZDNet

Shared by Integersec

zdnet.com - Greg Austin, professor at the Australian Centre for Cyber Security, believes it is a fact of life that governments are well behind corporate actors when it comes to cybersecurity; what he is concer...

World

Internet spying powers backed by review - BBC News

Shared by Gloria Law

bbc.co.uk - Britain's spies should be allowed to continue harvesting large amounts of data from emails, the government's reviewer of terror legislation said. David Anderson has published a review of so-called ...

Business

Hackers insert malware onto Thai ATMs, steal 12 million baht

Shared by Paul DeOrd

nakedsecurity.sophos.com - The central bank of Thailand (BoT) has shut down about half of its ATMs, suspecting an Eastern European gang of being responsible for planting malware on the machines in order to siphon off 12 mill...

Business

Internet access – households and individuals - Office for National Statistics

Shared by Quorum EMEA

ons.gov.uk - A quality report for the internet access is available on our website. The voluntary nature of the survey means that people who do not wish to take part in the survey can refuse to do so. The sample...

Technology

How Biometrics is Bringing the Banking Industry into the 21st Century by Steve Cook - eForensics

eforensicsmag.com - Look at how mobile banking is changing the financial services landscape and being ‘who you are’ is replacing your password and at the same time verifying your identity.  A number of new digital cha...

Business

14 business impacts of a cyber attack

Shared by SaltDNA

tradearabia.com - A new report demonstrates a model to quantify potential damage of a cyber attack, and identifies 14 business impacts of a cyber incident as they play out over a five-year incident response process....

Leisure

These Hotels Were Infected With Card-Data-Stealing Malware

Shared by Quorum EMEA

fortune.com - HEI Hotels & Resorts, which operates hotels for Starwood hot , Marriott mar and Hilton h among others, has warned customers that their payment card data may have been stolen over the last couple ye...

Business

Law council to launch cyber security information effort

Shared by Integersec

australasianlawyer.com.au - The Law Council of Australia expects to launch by the end of the year a national cyber security information campaign for the legal profession to combat the exponential growth of cybercrimes and cyb...

Business

The UK Is the European Leader in Deep Web Drug Deals | VICE | United Kingdom

vice.com - Someone doing some dodgy dealings - online. (Photo: Wikimedia user Colin, via) Me oh my, aren't we a naughty bunch of druggies? In a recent study conducted by RAND Europe, a not-for-profit research...

Business

Cyber criminals target holiday-related P2P media platforms

Shared by Neira Jones

computerweekly.com - Peer-to-peer (P2P) media platforms saw a tremendous spike in fraudulent activity ahead of the holiday season, a report has revealed. In a P2P network, computing devices use software to connect with...

Business

Tarox-Partner sollen sich als Security-Berater etablieren

Shared by Quorum EMEA

crn.de - Die wachsende Zahl von Cyberbedrohungen, aber auch das IT-Sicherheitsgesetz und die EU-Datenschutzverordnung haben das Thema Security auf die Agenda von vielen kleinen und mittelständischen Unterne...

Science

Achieving cybersecurity readiness: What enterprises should know

Shared by Quorum EMEA

searchsecurity.techtarget.com - 1. Cybersecurity plan: To achieve any goal or objective, a plan that provides guidance toward those goals and objectives is essential. Cybersecurity is no different than any other kind of endeavor ...

Technology

How the cloud can help your business stay secure as cyber-crime soars in Kenya - AfricanBrains

africanbrains.net - With the threat of cyber-crime and insider fraud on the rise, Kenyan companies should be looking towards cloud applications as one means of improving the security of their IT environments. That’s t...

Business

Every sixth cybercrime in India committed through social media: NIA

hindustantimes.com - Amit Sahay’s worst nightmare came true when someone hacked into his Facebook account and started posting pornographic content. Amit first warned his friends and then tried changing his password. Bu...

Business

Swift presses banks on security as more hacks surface

Shared by Neira Jones

finextra.com - Swift presses banks on security as more hacks surface 45 minutes ago  |  527 views  |  0 Interbank co-operative Swift is facing an uphill battle to convince its membership of the urgency of upgradi...

Technology

Data Loss Prevention Strategies for Networks

Shared by Quorum EMEA

blog.finjan.com - New threats are constantly emerging, on the digital security landscape. Data breaches are a regular occurrence, and fresh email hacks seem to take place every other week, as cyber-attackers, malici...

Science

Cyber Crime in Higher Education - The MSP Hub

Shared by Quorum EMEA

themsphub.com - With each passing year, higher education becomes a more vulnerable target of cybercrime.Symantec’s 2015 Internet Security Threat Report indicates that education is the third most frequently breache...

Technology

Over the Shoulder Data Theft

technologyreview.pk - A business executive is sitting on the hard plastic seats in the airport lounge. He decides to check his email and takes out his smartphone. Unbeknown to him, someone sitting either next to him or ...

Technology

Cyber-crime and cyber liability insurance

Shared by John Barila

rsmuk.com - Schools are not immune to the threats of cyber-attack, data theft, unauthorised access or IT failure. Instilling a culture of secure systems and procedures and recognising threats is vitally import...

Technology

NZ companies facing 'very sophisticated' cyber-attacks

Shared by Integersec

radionz.co.nz - New Zealand companies are being warned they are as vulnerable to cyber-ransoming as any other global company, with an "onslaught" of malicious hackers. Cyber crimes, and cyber-ransoming in particul...

Science

Extending the Edge: New Thinking on Data Security | Data Center Knowledge

datacenterknowledge.com - Security, like most aspects of IT infrastructure, has historically been a siloed function. Focused on protecting data, applications, network connections, and with the advent of BYOD (bring your own...

World

Dark web is a dangerous frontier for those trying to keep terrorists at bay

independent.co.uk - The killing spree in Munich last month by an 18-year-old student caused shockwaves in Germany. There is now a breakthrough in the case with the arrest of the man who allegedly supplied the gun used...

World

FBI Director Comey has high expectations for new cyber agents

Shared by Integersec

nbcnews.com - Federal Bureau of Investigations Director James Comey has high expectations when it comes to recruiting agents for their cyber security team. He says the perfect applicant would be intelligent, hav...

Technology

Fantom ransomware impersonates Windows update

Shared by Mark Dodds

webroot.com - Windows 10 has been notorious about automatically installing updates on users’ machines and now there is a ransomware that aims to capitalize on it. The new ransomware, Fantom, is based on the EDA2...

Technology

Google Chrome impersonator Trojan doing rounds - Help Net Security

Shared by Neira Jones

helpnetsecurity.com - If you’re a Google Chrome user, and suddenly your browser looks a bit off and shows you pages that you would never visit ordinarily, you’ve probably been hit with the Mutabaha Trojan. According to ...

Science

How artificial intelligence is aiding the fight against cybercrime | Information Age

Shared by Moonmoon Das

information-age.com - Instances of reported cybercrime are growing astronomically – and yet many successful attacks are still not reported, or even detected. In response to the escalating threat, detection capabilities ...

World

FBI says foreign hackers penetrated state election systems

Shared by BluVector

yahoo.com - The FBI has uncovered evidence that foreign hackers penetrated two state election databases in recent weeks, prompting the bureau to warn election officials across the country to take new steps to ...

Business

Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says

Shared by WorkFone

darkreading.com - A report out by Cybersecurity Ventures predicts global annual cybercrime costs will grow to $6 trillion by 2021.  While a $6 trillion estimate might be a little high, “a trillion dollars plus is a ...

Technology

Cybercrime Expected to Surpass $6 Trillion Annually Within 5 Years

Shared by WinMagic

inc.com - A report just issued by information-security analyst firm, Cybersecurity Ventures, estimates that cybercrime will double within just five years, reaching $6-trillion annually by 2012, up from an ex...

Business

ATMs in Thailand hacked by a cybercrime gang linked to Taiwan theft

securityaffairs.co - Hackers belonging to a cybercrime gang from Eastern Europe have stolen over 12 Million Baht (approximately US$346,000) from a 21 ATMs in Thailand. The crooks have targeted ATMs in Bangkok and other...

Sports

Punjab Police, Cyber Crime Cell warn E-Commerce sites to stop sale of E-Cigarettes

yespunjab.com - In its endeavor to save the youth and children from addiction of any kind Cyber Crime wing of Punjab Police on the directions of the Chief Minister S. Parkash Singh Baal, the Health department Punj...

Science

High-end banking malware hits Brazil

Shared by Quorum EMEA

csoonline.com - Brazil just can't catch a break. We've already seen flesh-eating bacteria in the water, athletes getting robbed on the streets, and police officers holding up a "welcome to hell" sign at the airpor...

Technology

PIPEDA Report of Findings #2016-005: Joint investigation of Ashley Madison by the Privacy Commissioner of Canada and the Australian Privacy Commissioner/Acting Australian Information Commissioner

priv.gc.ca - Avid Life Media Inc. (ALM)Footnote 1 is a company that operates a number of adult dating websites. The largest website operated by ALM is Ashley Madison, which is targeted at people seeking a discr...

Business

Cyberkriminalität: Jede Woche 6000 Angriffe aus dem Internet gegen VW

Shared by Quorum EMEA

faz.net - Mit der fortschreitenden Digitalisierung müssen sich die Vorstände deutscher Unternehmen immer häufiger mit einem für sie neuen Thema beschäftigen: mit der Datensicherheit. „Wir haben jede Woche ru...

Technology

APAC Organizations Completely Oblivious to Cybercrime

hotforsecurity.com - Despite increased security concerns among businesses, security research reveals organizations across Asia-Pacific are not in the slightest trained to detect and fight cyberattacks. With a 374-day d...

World

The FBI Just Found Security Breaches in Voter Databases in These 2 States

Shared by RAVENii

fortune.com - The Federal Bureau of Investigation has found breaches in Illinois and Arizona’s voter registration databases and is urging states to increase computer security ahead of the November presidential e...

Business

Be afraid: from Trump to terrorism | Global | Global Real Estate Insight

Shared by Quorum EMEA

globalrealestateinsight.com - There are no two ways about it, the Republican presidential candidate is somebody the industry needs to be worried about. The US has consistently been one of the most reliable international investo...

Technology

Ghoul - Deutsche Unternehmen von weltweiter Cyberattacke betroffen - silicon.de

Shared by Quorum EMEA

silicon.de - Der Sicherheitsanbieter Kaspersky Lab berichtet von einer zielgerichteten Angriffswelle gegen Unternehmen aus der Industrie und dem Ingenieurswesen. Von der weltweiten Attacke sind auch deutsche Un...

Technology

Attackers Use FairWare Ransomware Against Linux Servers - Bat Blue Networks

Shared by Babak Pasdar

batblue.com - Posted: Aug. 30th, 2016 at 4:45 pm under Watch Desk A number of system administrators claim attackers are using a new form of ransomware called FairWare targeting Linux servers. The web server admi...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →