The Cybercrime Herald

Edition list view

Art & Entertainment

Zero Day Weekly: Superfish attacks, FBI GameoverZeus bounty, Komodia in Lavasoft

zdnet.com

zdnet.com - Ms. Violet Blue is an Advisor for Without My Consent (a legal nonprofit for survivors of online harassment) and an Editor on the Editorial Board for The Porn Studies Journal (Routledge). She is a M...

Science

Vacature - Ministerie van Binnenlandse Zaken en Koninkrijksrelaties - Data-analist cybersecurity - Werken voor Nederland

Shared by
Klaas Brongers

werkenvoornederland.nl - Ministerie van Binnenlandse Zaken en Koninkrijksrelaties, Logius De beheersing van (digitale) dreigingen is een randvoorwaarde voor de continuïteit en het waarmaken van de ambities van Logius en de...

Science

Cyber criminals use Google Maps plugin for DDoS attack

Shared by
Henrik Kentsson

thepaypers.com - Attackers spoof the source of the requests, causing the results to be sent from the proxy to someone else. The true source of the attack remains unknown, because the attack traffic appears to come ...

Technology

Pharming attacks exploit default passwords to hack routersSecurity Affairs

Shared by
Roman Slovinec

securityaffairs.co - Security firm Proofpoint revealed that its experts recently detected a spam campaign targeting organizations and primarily Brazilian Internet users. The spam campaign implements a very effective te...

Technology

Cyber Security Survey: Fear of cybercrime up 66 percent in US

Shared by
GFI Software

gfi.com - 2014 could go down in history as a highlight year for cybercriminals. Cybercriminals have shown that no organization is safe, regardless of size or reputation. The victim list now boasts the likes ...

Technology

Cybercrime: Don’t Fall into the Hands of Hackers

Shared by
Capgemini

capgemini.com - It is 9am and two hackers are up to their tricks to glean vital information from Smit-Golders Capital.    Two scenarios. One safe option. Which one are you in?

Technology

FBI Offers $3 Million Reward for the Arrest of Russian Hacker

Shared by
Aamir Khan

hackread.com - Whopping $3 Million Bounty offered by FBI for Evgeniy Bogachev. The FBI and the U.S. State Department announced the highest ever bounty of $3 million on Tuesday for info leading to the capture or c...

Technology

Twitter Will Crackdown On Serial Trolls By Tracking Their Phone Number

Shared by
Gh𧆠RïÐêr RåÐïð™

techcrunch.com - Twitter has a troll problem. Even its CEO knows it. And now the company is doing more to prevent its users suffering abuse and threats on its service. In a bid to make improvements, Twitter has ann...

Leisure

NCSC-2015-0048 [1.13]

Shared by
♔ NEWSDESK: EU♔

ncsc.nl - 27-02-2015 - Oracle heeft een groot aantal kwetsbaarheden in Oracle-producten verholpen. Oracle heeft deze kwetsbaarheden verholpen via een Critical Patch Update (CPU). Diverse leveranciers hebben ...

Business

Bitcoin-Shark | Bitcoin news, The Lessons the Banking System Has to Learn From Bitcoin

Shared by
Edecio Garcia Sosa

bitcoin-shark.com - It seems like “bank grade security” doesn’t really live up to its name. It was recently reported that the FBI offered a $3M reward for the suspected masterminds behind the The post appeared first on .

Science

NCSC-2014-0773 [1.01]

Shared by
♔ NEWSDESK: EU♔

ncsc.nl - 27-02-2015 - IBM heeft meerdere updates uitgebracht om verschillende kwetsbaarheden te verhelpen in WebSphere Application Server.

Technology

The value of personal data in the criminal undergroundSecurity Affairs

Shared by
Roman Slovinec

securityaffairs.co - What is the underground economy? Put simply, the underground economy is a collection of forums, chat rooms and custom-made websites that are all designed to facilitate, streamline and industrialize...

Science

NCSC-2015-0145 [1.00]

Shared by
♔ NEWSDESK: EU♔

ncsc.nl - 26-02-2015 - Er bevindt zich een kwetsbaarheid in IBM DB2. Een geauthenticeerde kwaadwillende kan deze kwetsbaarheid misbruiken om een Denial-of-Service te veroorzaken. IBM heeft updates uitgebrach...

Environment

NCSC-2015-0140 [1.01]

Shared by
♔ NEWSDESK: EU♔

ncsc.nl - 26-02-2015 - Mozilla heeft updates voor Firefox en Thunderbird beschikbaar gesteld waarmee meerdere kwetsbaarheden worden verholpen.

Science

Medical Devices and Cybercrime: Are Patients at Risk?

Shared by
Shatha Al Maskiry

blog.protiviti.com - By Jeff Sanchez, Managing Director, Information Security and Privacy Practice and Scott Erven, Associate Director, Healthcare IT Security Practice Technology now allows doctors to connect remotely ...

Technology

index

Shared by
EnderXenocida

cyberdefensemagazine.com - To view this page ensure that Adobe Flash Player version 10.0.0 or greater is installed.

Business

Security implications for the C-suite

Shared by
Procurious

information-age.com - Over the course of the last few months, information security has dominated headlines across the media. High profile cyber breaches, pressing EU regulation, educational policy changes and a generati...

Technology

Nude photo ban by Reddit, Google won't delete damage - Technology & Science - CBC News

Shared by
Ryerson University

cbc.ca - The ban on sexual content that is posted online without consent – to be implemented by Reddit and Google in March – is an admirable effort, experts say, but they also paint a fairly bleak picture a...

Technology

Phish pharm: Cybercriminals use phishing to exploit router vulnerabilities and carry out man-in-the-middle attacks

Shared by
Neira Jones

proofpoint.com - Every crop and garden requires preparation and tending. Cybercriminals, too, cultivate their resources – from botnets and exploit kits to SOCKS networks and poisoned DNS servers – to harvest valuab...

Technology

'White hat hackers' of Johns Hopkins protect data, thwart cybercrime | Gazette

Shared by
Hopkins Engineering

hub.jhu.edu - Last year, nude photos of celebrities were hacked through iCloud. Online robbers also made off with millions of credit card numbers at Home Depot and Target. By year-end, the latest Seth Rogen come...

Technology

Identifying and preventing security threats: Servi... - HP Enterprise Business Community

Shared by
Nancy Lichtle

h30499.www3.hp.com - Guest post by Robert Wigger, Vice President, Service Providers – EMEA – HP Enterprise Group In my recent discussions with service providers, enterprise security is always on our ‘hot topic list’. R...

Technology

Millions Of Non-Anthem Customers Also Hit By Anthem Breach

Shared by
Bob Carver

darkreading.com - Healthcare insurer Anthem has updated its original estimate of how many customers' records were compromised in the data breach reported earlier this month. The original estimate of 80 million has b...

Technology

Cybercriminologie - CNRS Editions

Shared by
JF Fiorina

cnrseditions.fr - « L’univers cybernétique est désormais l’un des principaux domaines de la fraude et du crime », a déclaré un expert anglais à la suite du piratage de 233 millions de fiches clients d’un géant du e-...

Technology

The showdown between energy and cyber crime

Shared by
Fernando Roca

plymouthenergy.com - Foolishly opening a mysterious email and clicking a suspicious link could cost people their identities and privacy, but what could a lapse in judgment like that do to the U.S. power grid? Nothing g...

Art & Entertainment

Cyber-crime thriller Blackhat used a former hacker to teach the cast to code

Shared by
Social Marketing

interestinggossip.com - “I can’t think of a movie that has been a realistic depiction of technology,” McKinlay says from the University of Minnesota, where he is a postdoctoral scholar. What’s the worst techy film he’s se...

Science

Hunting Malware in the Deep Web - InfoSec Institute

Shared by
Security Affairs

resources.infosecinstitute.com - Botnets are still considered one of the most dangerous cyber threats. These malicious networks of compromised machines are used by cyber criminals and state-sponsored hackers for numerous activitie...

Leisure

Annoying quiz might stand between you and your tax return, thanks to ID thieves

Shared by
CyberPlotters.com

cyberplotters.com - Just how bad is the tax ID theft problem? About half of all filers seeking refunds in the state of Ohio now must answer a series of challenge questions just to prove they are who they say they are....

Science

The emerging science of digital forensics - Tech Page One

Shared by
Dell South Asia Biz

techpageone.dell.com - Digital forensics can be described as the science of preserving and analyzing digital evidence useful in the development of legal cases against cyber criminals. This new and growing field includes ...

Technology

Industry Expert Says Cyber-Security Is Not Fit For Purpose »

Shared by
BYOD News

cloudtweaks.com - Several people have been claiming for a long time that anti-virus needs a major re-imagining, and after Mandiant released its annual M-Trends report on data breaches yesterday, that chorus of voice...

Technology

Israeli startup's unique cybercrime solution - Feb. 10, 2015

Shared by
CGMA

money.cnn.com - According to Nadav Zafrir, a former commander at Israeli Defense Force's esteemed intelligence unit 8200: "We need a new formula." After all, 2014 was bookended with major security breeches: from T...

Science

How 3D printing puts manufacturers at risk of cybertheft

Shared by
Dennis Nally

usblogs.pwc.com - Since the invention of the hammer, the anvil, and, more recently, the assembly line, manufacturing has relied on an array of specialized knowledge, equipment, and materials. Luckily, that varied an...

Technology

Five Key Cybercrime and Cybersecurity Issues To Consider, <i>The National Law Journal</i > Publications : Morgan, Lewis & Bockius - an international law firm

Shared by
Morgan Lewis

morganlewis.com - Reprinted with permission from the February 19, 2015 edition of the The National Law Journal © 2011 ALM Media Properties, LLC. All rights reserved. Further duplication without permission is prohibi...

Business

Brazil: The Global Fraud Test Kitchen - DataBreachToday

Shared by
Amaury Delplanque

bankinfosecurity.com - Brazil has quickly become one of the world's leading hubs for financial cybercrime, says Ori Bach, a risk management expert at security firm IBM Trusteer, and a featured speaker at Information Secu...

Technology

Is your business vulnerable to a Cyber Attack?

Shared by
Capital Networks

business.wales.gov.uk - Companies across the world rely on the internet everyday to drive their businesses. Some companies, however big or small, are leaving themselves vulnerable to cyber attacks which can cripple everyd...

Technology

Addressing cybersecurity business disruption attacks

Shared by
codiceinsicuro

net-security.org - Addressing cybersecurity business disruption attacks Although the frequency of a cybersecurity attack on a large scale is low, by 2018, 40 percent of large enterprises will have formal plans to add...

Business

Cyber Incident Response Services

Shared by
Business Growth Serv

cesg.gov.uk - ‘The worst breach cost, on average, £65,000 - £115,000 for small businesses and £600,000 – £1,150,000 for large organisations,’  2014 Information Security Breaches Survey. Approach There are two ro...

Technology

Las posibles amenazas cibernéticas del 2015

Shared by
Alina Poulain W.

g4smx.wordpress.com - En el 2014 las empresas de seguridad libraron una gran batalla contra los criminales cibernéticos. Tanto pequeñas empresas como grandes compañías transnacionales se vieron afectadas al tener algún ...

Technology

The business and social impacts of cyber security issues

Shared by
Roman Slovinec

net-security.org - The business and social impacts of cyber security issues With multiple recent high profile attacks targeting household names and large employers, individuals increasingly fear cyber crime and its r...

Leisure

ACORN system ready to catch cyber criminals

Shared by
LogRhythm

dailymercury.com.au - THE Federal government has set up a national online system - ACORN - for people to report incidents of cybercrime. Asked about specific incidents in the Mackay region, a spokesman for the Attorney-...

Business

African experts grapple with rising cybercrime

Shared by
Liberationtech

thehill.com - Ten Central African states are exploring new ways to fight cybercrime after a new wave of identity theft, credit card fraud and corporate hacking brought the issue to the forefront. Cybersecurity e...

Business

The Lessons the Banking System Has to Learn From Bitcoin

Shared by
Stock Trade Alerts

newsbtc.com - It seems like “bank grade security” doesn’t really live up to its name. It was recently reported that the FBI offered a $3M reward for the suspected masterminds behind the GameOver Zeus botnet; a b...

Business

Security & Compliance - Advanced 365

Shared by
Advanced 365

advancedcomputersoftware.com - Organisations of every size are facing an every-increasing array of sophisticated threats from a variety of sources. When vulnerable systems and data are compromised, businesses are accountable to ...

Science

More watchful eye needed on 'dark Web' and cybercriminal activities, notes new paper - FierceGovernmentIT

Shared by
George Frink

fiercegovernmentit.com - Security researchers and government investigators need to be watchful and respond to illicit activities emerging from the "dark Web," the intentionally hidden portion of the World Wide Web that hos...

Science

Profource Blog (3) - Kennis-café bij VenJ

Shared by
Daniel Alfrink

profource.com - Profource is een dienstverlenende kennispartner, een Oracle-autoriteit met ruim 250 betrokken professionals. Vanuit onze specialistische kennis en ruime ervaring adviseren en ondersteunen wij bij h...

Technology

Banks Lose $1 Billion in Cyber Heist

Shared by
StepFeed

stepfeed.com - Around 100 financial institutions from around the world recently realized they had lighter pockets after a cyber-gang managed to steal approximately $1 billion over the last two years, in what seem...

Politics

Hacktivismus = Cybercrime? Eine Replik auf die Studie des BKA zu Hacktivisten

Shared by
Leonie Tanczer

sicherheitspolitik-blog.de - Vor wenigen Tagen veröffentlichte das Bundeskriminalamt eine Studie mit dem Titel “Hacktivisten“, die auf einem dreistufigen Forschungsdesign beruht: einer Literaturrecherche, einer quantitativen F...

Business

Target breach costs company $191M, financials show - SC Magazine

Shared by
Eng. Mahmoud Soliman

scmagazine.com - More than a year after a breach affected millions of customers who shopped at Target, the company is still feeling the financial impact, racking up $191 million in expenses related to the breach, b...

Business

Cyberciminals Target Bank Employees, Steal $1 Billion From Financial Institutions Worldwide

Shared by
aap³

darkreading.com - KASPERSKY SECURITY ANALYST SUMMIT -- Cancun, Mexico -- An international cybercrime ring based out of Eastern Europe has pilfered some $1 billion in two years from 100 different banks in nearly 30 c...

Technology

Ransomware Looming As Major Long-Term Threat | Threatpost

Shared by
Br.Halopeau

threatpost.com - On May 30, 2014, law enforcement officials from the FBI and Europol seized a series of servers that were being used to help operate the GameOver Zeus botnet, an especially pernicious and troublesom...

Environment

Anthem data breach affects more than 750,000 Pennsylvania customers

Shared by
StavrosStavrinoudaki

insurancenewsnet.com - Feb. 25--More than 750,000 Pennsylvanians might have had personal information divulged in the massive data breach at Indianapolis-based health insurer Anthem Inc., although it isn't clear how many ...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more →