The Cybercrime Herald

Edition list view

Technology

Diving in the Illegal Underground Hacking Markets

Shared by
Frank Langenfeld

securityaffairs.co - The monitoring of black hat markets is one the principal activities of security experts and intelligence agencies, it allows information gathering on evolution of cyber threats and emerging trends ...

Technology

FBI Beefs Up Amid Explosion of Cybercrime

Shared by
CyberPlotters.com

cyberplotters.com - The head of the FBI said cybercrime is “exploding” apace as the influence of the Internet rises meteorically. “It (the Internet) is transforming human relationships in ways we’ve never seen in huma...

Art & Entertainment

This is the Only Holiday Cyber-Crime Article Yo...

Shared by
CyberPlotters.com

scoop.it - Millions of us will go online in search of bargains. However, many people won’t even consider the fact that they could be the victims of cyber-crime when e

World

Victim of ATM fraud? Banks liable to pay you | Latest News & Updates at Daily News & Analysis

Shared by
Eng. Mahmoud Soliman

dnaindia.com - Inaction in a case of an ATM fraud which had caused loss to a consumer has led to two banks being asked to cough up Rs25,000 as compensation. In his order, the principal secretary of the state info...

Technology

Exploits, mobile and cloud storage threats will plague users in 2015 - SC Magazine

Shared by
Tom Walters

scmagazine.com - The next year will hit you harder than ever before. Based on trends of malware spread, advances in technology and new, cunning methods of attack, 2015 is set up to be one of the most dangerous year...

Technology

Top 10 Cybercrime Trends for 2015 (Infographic)

Shared by
mark beyerle

cspnet.com - LOUISVILLE, Colo. -- Look for cloud-based businesses to get more aggressive around data security, with retailers following close behind, according to a data-security specialist who just came out wi...

Technology

Steuergelder: So will der BND auf dem Hacker-Schwarzmarkt mitmischen - Die Klardenker. Der Wirtschaftsblog.

Shared by
KPMG in Deutschland

blog.kpmg.de - Der Bundesnachrichtendienst (BND) will in das Geschäft mit Softwareschwachstellen, sogenannten Zero-Day-Exploits, einsteigen. Warum sich der deutsche Geheimdienst auf dieses heikle Terrain begibt, ...

Education

Registrare | punkt.wien - Unsere Stadt. Unsere Domain.

Shared by
Unit-API

nic.wien - Jedes Unternehmen, das Dienstleistungen im Bereich der Domain-Registrierung unter den (neuen) gTLDs anbieten möchte und damit in direkte Geschäftsbeziehung mit einer Registry wie .wien treten möcht...

World

Investigators: hackers stole Sony passwords - CNN.com

Shared by
Browsingprivacy

cnn.com - Washington (CNN) -- U.S. investigators have evidence that hackers stole the computer credentials of a system administrator to get access to Sony's computer system, allowing them broad access, U.S. ...

Technology

US reportedly asks China for help with North Korea over Sony hack

Shared by
Eng. Mahmoud Soliman

theverge.com - While the US is dismissive of North Korea's proposed "joint investigation" into the Sony hack, according to a New York Times report, the Obama administration has reached out to China for help in "b...

Technology

Top 10 information security bloggers in 2014

Shared by
n0ug4

iso27001standard.com - If you want to stay on top of cybersecurity / information security news and insights, here are the blogs that I found the most useful. I listed here only the blogs written by independent authors (b...

Business

U.S. must re-analyze how to deal with cybercrime - Herald and News: Members

Shared by
Webhosting.net

heraldandnews.com - The last year has been marked by headline-grabbing cybercrimes, including the theft of stunning amounts of personal information from Target, Home Depot and online photo-storage sites. Now, the hack...

Technology

Sony hack: Hollywood’s week of high farce, fear and global diplomatic fury - HITC Business

Shared by
HITC Business

hereisthecity.com - The great hulking behemoth that is America’s entertainment industry has watched first in bemusement, then scorn, and now fear and fury as the mighty Sony Pictures has been brought to its knees by a...

Technology

US officials blame North Korea, but absolute attribution in Sony hack may be elusive - CSMonitor.com

Shared by
InvestigativMagazine

csmonitor.com - The speed at which US officials identified North Korean involvement in the Sony Pictures Entertainment hack surprised many experts familiar with the enormous challenges of pinpointing the origins o...

Technology

Crimeware-as-a-Service, CryptoLocker, ICANN Spear Phishing, and more

Shared by
PhishLabs

blog.phishlabs.com - Each week, the PhishLabs team posts The Week in Cybercrime (TWIC) to recap noteworthy cybercrime articles and reports (open source). The unrelenting evolution of Vawtrak (PhishLabs) In December 201...

World

Michael York: Athens investigator on high alert for cyber crime

Shared by
The eCore Group

onlineathens.com - He once jumped out of planes to serve his country, and now Michael York hunts down cyber criminals to protect his community. The former U.S. Army paratrooper is currently an Athens-Clarke County po...

Technology

Norse – Strategies to Mitigate DNS Hijacking Risks

Shared by
Jeff Bedser

blog.norsecorp.com - You have (probably more than once in your life) keyed in a familiar domain name and ended up in an entirely different page that was not even close to what you had expected. Chances are that you nev...

Technology

The Secure Data Act could help law enforcement protect against cybercrime

Shared by
The eCore Group

thehill.com - Last Sunday, Sen. Ron Wyden (D-Ore.) wrote an op-ed describing the role that U.S. law enforcement should play in fostering stronger data encryption to make information technology (IT) systems more ...

Business

Start with Security

Shared by
#InfoSec

informationsecuritybuzz.com - In a world where cyber criminals are getting smarter every day and the penalties for data breaches could destroy a business, there is no denying that security is a crucial factor when developing so...

Business

EU banks counter rising cybercrime as traditional hold-ups decrease

Shared by
Ravdeep Sodhi rsx33

euractiv.com - “Working in partnership with the relevant authorities is important for protecting against attacks. However, these threats are not only physical and the cyber-threat is increasing. Banks cannot act ...

Science

Managing a cyber crime scene -- FCW

Shared by
The eCore Group

fcw.com - Challenges to data security have reached epidemic proportions, as evidenced by recent consumer and government breaches that have put hundreds of millions of Americans' credit and debit cards, email...

Art & Entertainment

Staples warnt Kunden vor Hackerangriff - SPIEGEL ONLINE

Shared by
Scripter

spiegel.de - Framington - Die US-Büroartikel-Kette Staples hat einen großen Diebstahl von Kundendaten eingeräumt. Bei einer Hackerattacke könnten zwischen Juli und September die Daten von etwa 1,16 Millionen Kr...

Technology

Sony breach moves cybercrime into new realm of attacks - The Globe and Mail

Shared by
jopocop

theglobeandmail.com - Sony Corp.’s decision to pull a motion picture release in response to retaliatory terror threats represents an alarming development in the seemingly unstoppable cybercrimewave that has engulfed the...

World

Seoul, Toyko pledge to work with US to combat cyber crime - Channel NewsAsia

Shared by
Irene Poetranto

channelnewsasia.com - SEOUL: South Korea and Japan on Saturday (Dec 20) vowed to work closely with the US to combat cyber crime, after Seoul blamed North Korea for a crippling cyber attack on Sony Pictures. South Korea ...

World

Visitors Gain Insight During Tour of Indiana State Police Cyber Crime Office - NewsBarb

Shared by
The eCore Group

newsbarb.com - Issues associated with cyber crime know no borders, says Indiana State Police  Lt. Chuck Cohen The ISP provided training to Ukrainian law enforcement cyber crime investigators yesterday in Indianap...

Technology

After Sony, Every Startup Should Prepare For War

Shared by
Trulioo

techcrunch.com - The battle between Sony and what the FBI believes are North Korean hackers may be at its end, but the war for the security of the enterprise is just getting started. Companies have been rapidly tra...

Technology

Next Facebook Status Update Could Get You Robbed? ~ Social Mediaroid

Shared by
Mohenesh Buthgumwa

socialmediaroid.com - Next Facebook Status Update Could Get You Robbed? Will your next ‎Facebook status update get you robbed? Social networks are a data entry that permits individuals to share and unite in means that w...

Technology

Cars Identified as the Next Targets of Cybercrime

Shared by
HackingTechnologies

carscoops.com - Cars Identified as the Next Targets of Cybercrime Did you know that there are six ways someone can hack into your car wireless-ly? Neither did we, but someone can do so through systems like the tir...

Technology

A "Nigerian Prince" Wants My Help? ~ Social Mediaroid

Shared by
Mohenesh Buthgumwa

socialmediaroid.com - The world of Internet scams isn’t only frequently sprouting; it’s trusting on a range of ancient and novel approaches to keep the revenue of cash flowing in to the hands of cyber pirates. These ema...

Technology

Live Map Shows Thousands Of Cyber Attacks As They Happen - Forbes

Shared by
Laurie Henneborn

forbes.com - Sony got nuked, said one security expert. But it’s hardly the only attack aimed at a major corporation. Tens of thousands of cyber attacks are launched every second – a majority of which are direct...

Technology

Social Media safety vital for Children ~ Social Mediaroid

Shared by
A.T.O.M

socialmediaroid.com - Social Media safety vital for Children Social Media safety vital for Children Each day brings developments and growth trends in electronic know-how, including the swift upsurge of social media. Thi...

Science

Hackers used data exfiltration based on video steganography

Shared by
Madsadyaktracker

securityaffairs.co - Threats actors in the wild are exfiltrating data with a technique based on video uploaded to cloud services. Attackers adopted this trick to move data from a compromised target outside without dete...

World

Norse – Consequences of Overstating the Cyber Terrorism Threat

Shared by
Network Box USA, Inc

blog.norsecorp.com - In the first installment of this series we examined the concepts behind cyberterrorism as a strategy, and the second article looked deeper into how cyberterrorism is being portrayed by the media, g...

Technology

U.S. Struggles for Response to Sony Hack - WSJ

Shared by
Mario Derba

wsj.com - The U.S. government is looking for ways to retaliate for North Korea’s apparent hacking of Sony Pictures but is struggling for an appropriate solution, according to people familiar with the discuss...

World

FBI Beefs Up Amid Explosion of Cybercrime

Shared by
Yotam Gutman

govtech.com - (TNS) -- The head of the FBI said cybercrime is "exploding" apace as the influence of the Internet rises meteorically. "It (the Internet) is transforming human relationships in ways we've never see...

Technology

Cybercrime predictions for 2015

Shared by
SenseCy

welivesecurity.com - As regular readers of We Live Security will know, every December the ESET researchers put together their predictions for cybercrime attacks for the coming year. Last year, the emphasis was on inter...

Technology

The Ultimate Guide to Internet Safety (English Edition) eBook: Victoria Roddel: Amazon.fr: Boutique Kindle

Shared by
Victoria Roddel

amazon.fr - Présentation de l'éditeur Anyone who uses a home computer connected to the internet needs "The Ultimate Guide to Internet Safety" Second Edition. This is an updated reference manual for internet sa...

Technology

RIP P4ssw0rd? IT giants agree to share patents to rollout two-factor auth • The Register

Shared by
Ian Darlington

theregister.co.uk - Passwords, right? If they're too weak, they can be worse than useless – but making them too strong means people do dumb things like writing them down or forget them and piss off IT workers with fre...

Technology

The Biggest Lesson from the Sony Hack? We Need to Replace Email

Shared by
Chris Dickens

motherboard.vice.com - The most striking discovery of the Sony hack wasn’t that studio head Amy Pascal had an intensely personal meltdown or that the feds were collaborating with the company on the ending of The Intervie...

Politics

Tips to prevent cybercrime - Post and Courier

Shared by
John M. Thomas, Jr.

postandcourier.com - The Post and Courier is pleased to offer readers the enhanced ability to comment on stories. Some of the comments may be reprinted elsewhere in the site or in the newspaper. We ask that you refrain...

Technology

Computer intrusion inflicts massive damage on German steel factory

Shared by
Mike Richards

arstechnica.com - A German steel factory suffered significant damage after attackers gained unauthorized access to computerized systems that help control its blast furnace, according to a report published Friday by ...

World

BBC News - North Korea proposes joint Sony hack inquiry with US

Shared by
Chris Dickens

bbc.com - North Korea has offered to hold a joint inquiry with the United States into a cyber-attack on Sony Pictures, strongly denying US claims that it is behind it. Its foreign ministry accused the US of ...

Technology

Protect Your Smartphone (English Edition) eBook: Victoria Roddel: Amazon.fr: Boutique Kindle

Shared by
Victoria Roddel

amazon.fr - Présentation de l'éditeur The same internet safety principles you practice on your home computer apply to your smartphone. Know how to protect your smartphone, the information it contains, get rid ...

Technology

CYBER ALERT – “CYBER MONDAY” OFFERS GREAT SAVINGS FOR CRIMINALS

Shared by
WillisFINEXGlobal

willisfinexglobal-news.com - Krebs on Security reporting that the Cyber criminals are experiencing their own versions of Black Friday and Cyber Monday marketing campaigns. The latest Krebs article titled “Black Friday, Cyber M...

Technology

North Korea continues cyber warfare against Sony

Shared by
CyberSecIntel

cybersecurity-intelligence.com - The Interview stars Seth Rogen and James Franco as journalists enlisted to kill Kim Jong-un. For the past few weeks, entertainment giant Sony Pictures has seen its computers paralysed by a cyberatt...

Technology

Using Global Intelligence Data to Prevent Online Fraud and Cybercrime

Shared by
Esther George

brighttalk.com - Gavin Hill, Director of Product Marketing & Threat Research, Venafi The Heartbleed vulnerability will be talked about for years to come. Well respected cryptographers like Bruce Schneier have state...

World

U.S. Asks China to Help Rein In Korean Hackers - NYTimes.com

Shared by
Michelle Zakarin

nytimes.com - WASHINGTON — The Obama administration has sought China’s help in recent days in blocking North Korea’s ability to launch cyberattacks, the first steps toward the “proportional response” President O...

Environment

Petition: Stop Wildlife Cybercrime on UK Websites

Shared by
Linda J Bodicoat

thepetitionsite.com - Dear Minister, Stop wildlife cybercrime on UK websites I was shocked to learn about the scale of wildlife trade over the internet. The International Fund for Animal Welfare’s (IFAW’s) recent report...

Technology

HP Reveals Cost of Cybercrime in Australia Escalates 33 percent to $4.3 Million - Australian Security Magazine | Australian Security News | Security Products |Asia Pacific Security News : Australian Security Magazine | Australian Security News | Security Products

Shared by
Esther George

australiansecuritymagazine.com.au - Third annual study reconfirms security intelligence solutions mitigate impact, saving an average of $1.9 million annually per organisation HP has unveiled the results from a third annual study cond...

World

Cyber Crime: Chinese police here to ‘help’ probe 70 Chinese cyber crime suspects arrested in Runda

Shared by
Philippe Raybaudi

ntv.nation.co.ke - News : Cyber Crime: Chinese police here to ‘help’ probe 70 Chinese cyber crime suspects arrested in Runda Cyber crime experts from China are in the country to help investigate the activities of the...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .