The Cybercrime Herald

Edition list view

Technology

Deutsche Telekom: Survey: Almost one in two has been a victim of cybercrime

Shared by Andreas Fuchs

telekom.com - Almost half of all Germans (48 percent) have already been victims of Internet crime. Internet users of all ages are most frequently affected by viruses, Trojans or computer worms: 45 percent have a...

Business

Neuer Vorstoß zur Vorratsdatenspeicherung gegen Hacker und Cyberangriffe geplant

Shared by Alex

heise.de - Auch Anbieter von Web-Diensten sollen Nutzungsdaten einschließlich IP-Adressen anlasslos im Interesse der IT-Sicherheit aufbewahren dürfen, fordert der IT-Bundesbeauftragte Klaus Vitt. Ein erster A...

Business

Cybercrime Gangs Blend Cyber Espionage And Old-School Hacks In Bank Heists

Shared by Charles Fair

darkreading.com - TENERIFE, SPAIN – Kaspersky Lab Security Analyst Summit 2016 – Two newly discovered cybercrime gangs spotted stealing millions of dollars mainly from Russian banks further demonstrate how financial...

Technology

Critical Infrastructure Security And Cyber Threats

Shared by ID Experts

idexpertscorp.com - In September 2015, water industry magazine Waterworld reported that security researcher Kyle Wilhoit had connected to the Internet three industrial control systems (ICS) designed to look like a wat...

Business

Ways Cybercrime Can Affect an SME

pgicyber.com - Cybercrime can do huge damage to businesses, but whereas a large company is likely to survive, albeit battered and bruised, an SME can be devastated. In this article we will look at just a few of t...

Technology

Infettare o spiare un computer, lo possono fare tutti: ecco come

lastampa.it - Un programma in grado di infettare e spiare computer, venduto a chiunque in abbonamento come fosse una sottoscrizione a Spotify o a Netflix. Facile da usare anche per persone non eccessivamente esp...

Technology

Metel Bank Robbers Borrowing from APT Attacks

Shared by Brent Muir

threatpost.com - TENERIFE, Spain— Many bank robbers long ago dropped the stick-up man persona in favor of a keyboard and a reliable password-stealing Trojan. Banking malware, however, may soon not be good enough fo...

Technology

Russian financial cybercrime: how it works

Shared by Ben Brickman

securelist.com - The Russian-language cybercrime market is known all over the world. By ‘Russian-language market’ we mean cybercriminals who are citizens of the Russian Federation and some former USSR countries, pr...

Technology

Check Point Threat Alert: Exploit Kits

Shared by Luc Straeten

blog.checkpoint.com - An exploit kit is a malicious toolkit whose purpose is to identify vulnerabilities in client machines. These vulnerabilities are then exploited in order to upload and execute malicious code on the ...

Technology

Denying the deniers: how to effectively tackle DDoS attacks | Information Age

information-age.com - Distributed Denial of Service (DDoS) attacks maybe as old as the hills but they continue to be a popular, and highly effective, attack vector for hackers. In the past couple of months alone we have...

Environment

E-fraudsters, beware! Govt plans cybercrime labs across statePrafulla.Marpakwar - Times of India

timesofindia.indiatimes.com - A senior bureaucrat said that a budgetary provision has been made and the process of setting up the cyber crime laboratories at district headquarters and at police commissioner offices has begun. "...

Science

Seven predictions for 2016 from Technology Pioneers

Shared by PROMETHEUS

weforum.org - As participants gather in Davos to discuss how the Fourth Industrial Revolution will disrupt business and change the way we live, we asked our Technology Pioneer companies for their take on what li...

Technology

The internet of military things: Logistics dream, security nightmare? | ZDNet

zdnet.com/

zdnet.com - The potential for the IoT (Internet of Things) in the military services is truly awesome. It's the stuff of science fiction. Don't expect it to be adopted at the speed with which we Internet-enable...

Technology

Clever bank hack allowed crooks to make unlimited ATM withdrawals

Shared by Tom Wills

arstechnica.com - To appreciate how malware targeting banks and other financial institutions is adopting sophisticated techniques once reserved for so-called advanced persistent threats used by state-sponsored spies...

Business

Hackers Steal Money from Banks via APT-Style Attacks

securityweek.com - Researchers at Kaspersky Lab have been monitoring the activities of several cybercrime gangs that use tactics and techniques common for APT groups to steal money from banks. Last year, at its 2015 ...

Technology

Webshop für Schadsoftware: Cyberwaffen im Sonderangebot - SPIEGEL ONLINE

spiegel.de - Die E-Mail an den Bankmitarbeiter in Singapur wirkte vollkommen unverdächtig. Abgeschickt hatten sie scheinbar Kollegen von einem malaysischen Geldhaus, um vor einem vermeintlichen Fall von Geldwäs...

Technology

09.02.2016 – Handel mit E-Zigaretten verboten | Fast jeder Zweite Opfer von Cybercrime | Mobile Traffic vor allem visuell

Shared by Händlerbund

onlinehaendler-news.de - Wichtige Themen heute im Newspreview: Der Bundesgerichtshof hat einem Händler den Verkauf von E-Zigaretten verboten. Außerdem: Fast jeder Zweite war offenbar schon einmal Opfer von Cybercrime und e...

Technology

Poseidon cybercriminals blackmail enterprise players into business relationships | ZDNet

zdnet.com/

zdnet.com - TENERIFE, SPAIN: The long-standing cyberespionage campaigner and malware boutique Poseidon is ramping up efforts to make a profit in cybercrime by blackmailing businesses, according to Kaspersky. S...

Business

I Believe in Cybercrime Unicorns

Shared by Rick Cordisco

bankinfosecurity.com - There's new evidence of just how much cybercrime pays. See Also: Trust, But Verify: The Evolution of Vendor Risk Management in Financial Institutions Mikko Hyponnen, chief research officer of Helsi...

Technology

SUSPECTÉ D'USURPATION D'IDENTITÉ : IL TENTE D'ESCROQUER SON AMOUREUX VIRTUEL À L'AIDE D'UNE FRAUDE À LA CARTE BANCAIRE

cybercrime.interieur.gouv.ci

cybercrime.interieur.gouv.ci - Côte d'Ivoire - Site officiel de la Plateforme de Lutte Contre la Cybercriminalité Lutte contre toute infraction liée aux technologies et au cyberespace. Investigation et sensibilisation HAMADOUNE ...

Technology

Why cybercrime will always need humans

Shared by Eric

itpro.co.uk - Forget automation, cybercrime still needs a human touch.  With robotics and automation taking over – researchers believe as many as five million jobs could disappear by 2020 – it may seem as though...

Technology

Cybercrime, the new reality

biztechafrica.com - “Were you a victim of cybercrime last year?” asks Anton Jacobsz, managing director of South Africa's leading value-added distributor, Networks Unlimited. “It is a valid question to ask just about a...

Business

It’s a reputation killer (but do SMEs recognise the threat?) - Hiscox Business Blog

hiscox.co.uk - New research has found that a majority of SMEs (89%) who have suffered a data breach say it has had an impact on their reputation. Despite this, the survey – Small Business Reputation & The Cyber R...

Technology

Thousands of FBI and Homeland Security details stolen by hackers

telegraph.co.uk - One of the hackers that claims to be behind the breach is a British male, and a former member of the Lizard Squad - the hacking group that claimed responsibility for the Sony PlayStation and Xbox L...

Technology

Trojaner T9000 zeichnet Skype-Gespräche auf | ZDNet.de

Shared by VanCrash

zdnet.de - Palo Alto Networks hat einen Trojaner entdeckt, der Skype-Anrufe und auch Screenshots von Videotelefonaten aufzeichnen kann. Die T9000 genannte Malware ist zudem in der Lage, der Entdeckung durch v...

World

Report notes shift from individual cybercrims to skilled adversaries

scmagazineuk.com - A new report from threat-intelligence experts Crowdstrike has highlighted the continuous shift from individual cyber-criminals and cyber-gangs to skilled adversaries such as governments and large o...

Technology

Safer Internet Day, riflettori sui pericoli della Rete

Shared by EuroPrivacy

rainews.it - 2016/02/08 18:55 Dimensione testo Invia ad un amico Stampa l'articolo L'iniziativa Safer Internet Day, riflettori sui pericoli della Rete Il 9 febbraio si celebra in tutto il mondo la Giornata dell...

Technology

What Motivates Cyber-criminals and Who Are They Targeting?

infosecurity-magazine.com - There is a part of me that finds hackers, or cyber-criminals, of fascinating interest. Whether it’s the clandestine nature of their ‘profession’ or the untapped genius with which some of them opera...

World

Security News This Week: The White House Bans Its Own Security Researcher

wired.com - This week, The UN Working Group on Arbitrary Detention deemed Julian Assange’s detention in the London Ecuadorian embassy unlawful, and urged the UK and Swedish authorities to let him leave the emb...

Technology

HPE News - Annual Study Reveals Average Cost of Cyber Crime Per Organization Escalates to $15 Million

hp.com - PALO ALTO, Calif., October 6, 2015 — HP today unveiled the results from its sixth annual study in partnership with the Ponemon Institute detailing the economic impact of cyber attacks across both t...

World

Hacking disaster: NSA’s own code blamed for vulnerability

wnd.com - The House Oversight Committee has kicked off an investigation into reports the federal government’s official software may have been hit by hackers more than two years ago – and the feds may have go...

Technology

Bitcoin Lender Loanbase Breach Sees Atleast 8 Stolen BTC - CCN: Financial Bitcoin & Cryptocurrency News

Shared by David Liam

cryptocoinsnews.com - Bitcoin lending platform Loanbase — formerly BitLendingClub — was the target of a recent security breach that saw a small number compromised user accounts lose at least 8 bitcoins. In an email sent...

Science

'Niemand is immuun voor cybercrime'

Shared by VALORI

cio.nl - Terwijl iedereen kijkt naar nieuwe technologieën, gebeurt er veel op de achtergrond. Dit is zeker het geval voor netwerken. Hoe ziet het netwerk van de toekomst eruit? Voor welke mogelijkheden zorg...

Technology

flash infos - Cybercriminalité : Kaspersky "avertit les Etats et les banques"

Shared by Yohann

mobile.leconomiste.com - Les terroristes de Daech pourraient bien s’attaquer aux économies des pays à distance. C’est ce que craignent les experts de Kaspersky Lab, en conclave du 7 au 11 février à Tenerife (Espagne). Ces ...

Technology

Semiconductor Engineering .:. Executive Insight: Paul Kocher

Shared by Ed Sperling

semiengineering.com - Paul Kocher, president and chief scientist of Rambus’ Cryptography Research Division, sat down with Semiconductor Engineering to talk about the state of security today and how it will be affected a...

Technology

Former DOE employee admits to hacking scheme

thehill.com - A former government employee on Tuesday pleaded guilty to attempting to hack dozens of employee emails at the Department of Energy (DOE). Charles Harvey Eccleston, 62, admitted to orchestrating a s...

Technology

Hacker Publishes Personal Info of 20,000 FBI Agents

motherboard.vice.com - While America was getting ready to watch the Super Bowl on Sunday, a hacker promised he would dump online a list of more than 20,000 agents of the Federal Bureau of Investigation and 9,000 Departme...

Education

Sind Ihre Drucker ausreichend gegen Angriffe geschützt?

Shared by Jochen Christ

business-services.heise.de - Jens Liebchen Geschäftsführer und Penetrationstester, RedTeam Pentesting Kurzvita Jens Liebchen arbeitet als Geschäftsführer und Penetrationstester bei der RedTeam Pentesting GmbH in Aachen. RedTea...

Business

Netsafe: Cyber crime steathily evolving

Shared by Eric

newshub.co.nz - Demand for online security is going up as Kiwis' internet use increases and they expose themselves to more risks, according to a new report. Tuesday has been designated Safer Internet Day, and a re...

Technology

Is your Teenager a Hacker? - Information Security Buzz

informationsecuritybuzz.com - Kaspersky Lab urges parents to question their teen’s online habits ahead of Safer Internet Day 2016 Research by Kaspersky Lab to mark Safer Internet Day 2016 reveals that one in ten (12 per cent) o...

Technology

16-31 January 2016 Cyber Attacks Timeline

Shared by ICS-ISAC

hackmageddon.com - 16-31 January 2016 Cyber Attacks Timeline February 8, 2016 Paolo Passeri 0 Comment 2016, Cyber Attacks, Featured, January, Timeline It’s time to publish the second part of the January 2016 Cyber At...

World

Bank joins Interpol cyber-crime fighting centre | ZDNet

Shared by ASCL

zdnet.com - Barclays is to become the first bank to have a cyber-crime analyst working full-time alongside police at Interpol's Cyber Fusion Centre to improve information-sharing and response to imminent secur...

Business

Carbanak 2.0: the billion-dollar bank heist is back

Shared by Amit Sharma

itpro.co.uk - Cybercriminals are targeting banks and businesses with a new version of a damaging attack that helped them steal $1 billion last year, according to Kaspersky. Carbanak was first noticed last year. ...

Technology

What if hackers took over our power grid?

ibmbigdatahub.com - Cyber attacks and hackers are a reality. We wake up, we grab coffee, and then we read about the latest cybersecurity breach. That statement may seem to trivialize the problem. But in an interconnec...

Technology

5 ways to protect your company data from internal attacks

Shared by Security Chat

net-security.org - 5 ways to protect your company data from internal attacks by Paul Kraus - CEO of Eastwind Breach Detection - Monday, 8 February 2016. While Hollywood may love the image of the hacker lurking in the...

Technology

Experts 'deeply worried' as teenage cybercrime wave sweeps Britain

Shared by Eric

mirror.co.uk - Britain is in the grip of an adolescent cybercrime wave, with one in ten teenagers openly admitting to being friends with someone who has committed an online offence. To mark Safer Internet Day 201...

Technology

How To Trace A Cyber Criminal And Accused From Internet Protocol (IP) Address

Shared by PTLB

ptlb.in - The Internet Protocol Address (IP Address) is one of the core components of the Internet. All computers or devices communicate through the IP Address that is allotted either on a Static or Dynamic ...

Business

New Bitcoin Rival Currency Will Offer More Anonymity, Say Its Creators

Shared by Anders Camin

fastcompany.com - Digital currencies like bitcoin are touted for their anonymity. But in practice, it can be possible to trace transactions across the shared bitcoin ledger known as the blockchain and figure out who...

Business

Carbanak cybergang is back and it is not alone

Shared by CTIN

securityaffairs.co - Security researchers at the 2016 edition of SAS in Tenerife revealed that the infamous Carbanak gang is back, and it is not the unique group that is adopting APT-style techniques to steal money fro...

Business

The One Thing Criminal Hackers Have on Their Side That You Don't

Shared by Ed Kwedar

securityintelligence.com - Kevin Beaver is an information security consultant, expert witness, and professional speaker with Atlanta-based Principle Logic, LLC. With over 26 years of experience in the... We hear that stateme...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →