The Cybercrime Herald

Edition list view

Technology

Job security: Opportunities in combating cyber crime

Shared by Jon Avila

hackersamurai.com - The cyber attack on Sony Pictures late last year revealed not only the lengths that determined hackers will go to in targeting a company, but also the devastating impact they can have. The aggressi...

Technology

Expert Comment on Windows 10 Security

informationsecuritybuzz.com - Is Windows 10 secure ? Following yesterday’s official launch of Microsoft’s Windows 10, David Chismon, security researcher at MWR InfoSecurity commented below on the windows 10 security. David Chis...

Technology

Why Russian Cybercrime Markets Are Thriving

Shared by KeelsUS

bankinfosecurity.com - The prices for stolen payment card data and other cybercrime products and services on Russian underground forums continue to fall. But such marketplaces are thriving more than ever, in part, becaus...

Technology

Malvertising campaign hits 10 million users in 10 days

securityaffairs.co - Nick Bilogorskiy, a security researcher at Cyphort  revealed that 10 million users may have been infected in ten days due to a malvertising and exploit kit campaign. According to the expert threat ...

Technology

Employee Risk: Dealing With Risky Network Users

securityintelligence.com - Kevin Beaver is an information security consultant, expert witness, and professional speaker with Atlanta-based Principle Logic, LLC. With over 26 years of experience in the... We often hear about ...

Science

Security focus must move toward data analysis | ZDNet

Shared by Chris Konrad

zdnet.com - With antivirus technology no longer effective, businesses and security vendors must now shift their focus to tools that operate on data and behavioral analysis. With a security landscape today that...

Technology

4 Cybercrime Prevention Tips - markITwrite

markitwrite.com - Cyber-criminals are like most human beings; they want an easy life. Easy money, or an easy path to their objectives. So, the best you can do to frustrate them is to make their job (and their life) ...

Business

NatWest: Website problems caused by deliberate attack - BBC News

Shared by Neira Jones

bbc.co.uk - NatWest Bank has blamed earlier problems with its website on a series of deliberate attacks, known as a distributed denial of service (DDoS). It involved a surge of traffic, which resulted in many ...

Technology

Ashley Madison attack prompts spam link deluge - BBC News

Shared by NGenCode

bbc.com - The hack attack on the Ashley Madison site has prompted spammers to capitalise on interest in data stolen from the infidelity site. On 20 July, hackers claimed to have stolen information about the ...

Technology

Not Your Average Top 5 Things To Know Before Blackhat

Shared by Anthony Dutra

blog.fortinet.com - You've seen the blog posts before: "5 Things To Know Before You Head To [fill in conference here]" or "7 Things Every Road Warrior Should Pack For [conference of your choice]". That last one is wor...

Technology

You Need to Speak Up For Internet Security. Right Now.

Shared by FrenchRedFrog

wired.com - An Ethiopian journalist living in the U.S. was spied on by his own government. A pro-democracy activist in Dubai was beaten repeatedly by thugs after his computer was infected with surveillance sof...

Science

UConn engineering school computers hacked

norwichbulletin.com - STORRS – The University of Connecticut confirmed Friday that computers at the School of Engineering had been attacked by hackers apparently originating in China. UConn said it has no evidence that ...

Business

Darkode black market back online with security improvements

securityaffairs.co - A few days ago Darkode, a black market specialized in the sale of exploit kits and hacking tool was shut down by an international operation of law enforcement. A joint operation run by the FBI and ...

Technology

Retreat to Move Forward: Conquering the Shadow IT Risks - Dtex Systems

Shared by Cyber Racing

dtexsystems.com - Have you ever wondered what might be hiding in the shadows of your network? Do you really know what your employees are doing, or whether they’re jeopardizing your institution’s security? You’re not...

Technology

Secure Enterprise Client 10.02 for Windows Users to Enable Enhanced Remote Access VPN Services

informationsecuritybuzz.com - First IPsec VPN Client compatible with Windows 10 now available with newly added features to improve ease-of-use capabilities while optimizing for Internet of Things configuration NCP engineering t...

Technology

10 Security Mistakes Nearly Everyone’s Guilty Of

informationsecuritybuzz.com - When it comes to data security, attackers continue to exploit the biggest weakness of all – people. ESET Ireland looks at 10 security mistakes humans continue to make on a daily basis. The sad real...

World

Cybercriminals are preying on existing vulnerabilities to plan future attacks

net-security.org - Cybercriminals are preying on existing vulnerabilities to plan future attacks Solutionary performed a broad analysis of the threat landscape, which unearthed several key findings. They identified s...

Business

O'Melveny & Myers LLP | Newsroom | Awards and Rankings | Press Releases | Los Angeles Business Journal Names O’Melveny’s Cheng Among Most Influential Lawyers in White Collar and Cybercrime

omm.com - Los Angeles Business Journal Names O’Melveny’s Cheng Among Most Influential Lawyers in White Collar and Cybercrime FOR IMMEDIATE RELEASE Contact: Emily Lattal O’Melveny & Myers LLP 212.326.2285   L...

Technology

From Russia With Love: A Slew of New Hacker Capabilities and Services

Shared by Doug Munro

darkreading.com - China is the country that is most often blamed by U.S. authorities for hacking attacks against American corporate and government targets. The recent intrusion at United Airlines is only the latest ...

Technology

4 Crucial Tactics for Preventing Cyber Crime - Arellia

arellia.com - What Ben Franklin can teach us About Cyber-Attacks Everyone knows Ben Franklin famously said “an ounce of prevention is worth a pound of cure.” He also said “He that can take rest is greater than h...

Technology

Negligent Employees Cost Firms $1.5m – Report

Shared by NGenCode

infosecurity-magazine.com - Employee error diminishes IT productivity and causes more problems than intentionally malicious acts, costing US firms as much as $1.5m in time wasted responding to incidents, according to Raytheon...

Technology

ZeroDay Flaws in Most Popular Smart Home Hubs

informationsecuritybuzz.com - Tripwire finds security flaws in popular Smart Home Hubs Following an extensive piece of research, Tripwire’s Vulnerability and Exposure Research Team (VERT) can confirm it has discovered Zero-day ...

Technology

Cyber ROI

informationsecuritybuzz.com - As you know, cyber attacks pose a major threat to U.S. industry and government.  However, it can be difficult for executives to quantify the benefits of implementing cybersecurity measures.  We hav...

Business

To Invoke or not to Invoke? That is the question when it comes to DR

informationsecuritybuzz.com - NYSE technical glitch highlights concerns as to when an organisation should invoke its DR plans Deciding whether to failover to a secondary site or wait it out and fix the problem in-house still re...

Technology

Experts Found a Unicorn in the Heart of Android

Shared by Root-Secure

blog.zimperium.com - Gaining remote code execution privileges merely by having access to the mobile number? Enter Stagefright. The targets for this kind of attack can be anyone from Prime ministers, govt. officials, co...

Science

CYB3RCRIM3: Consent, the External Hard Drive and the 4th Amendment

Shared by Iván Acosta

cyb3rcrim3.blogspot.com - Friday, July 31, 2015 Consent, the External Hard Drive and the 4th Amendment pled guilty to one count of possession of child pornography after having been previously convicted and sentenced for pos...

Technology

Training the next generation of cyber security professionals

letstalk.globalservices.bt.com - By Theo Dimitrakos, Chief Security Research Professional, BT Security.  A recent report commissioned by the UK Cabinet Office estimated cyber crime’s annual cost to the UK to be £27billion (about 1...

Technology

Cybercrime forum Darkode returns with security, admins intact

theregister.co.uk - Crime forum Darkode has relaunched with renewed security two weeks after it was obliterated in a global police raid that shut down the site and saw members arrested. The English-speaking forum, est...

Business

Cyber attack hits RBS and NatWest online customers on payday

Shared by Paul Conroy

theguardian.com - The RBS banking group has revealed it suffered a cyber attack on its online services that left customers struggling to log on for nearly an hour – just as monthly pay cheques were arriving in accou...

Business

Canada announces fresh funding to fight cybercrime

Shared by Websitesy

france24.com - Canada is investing Can$142 million to beef up its cybersecurity measures and help private companies ward off attacks, officials said, after government websites were hacked last month. The fresh ro...

Business

NY village makes ransom payments to keep computers running

bigstory.ap.org - ALBANY, N.Y. (AP) — A village in central New York made ransom payments of $300 and $500 last year to keep its computers running after two official-looking emails released malware throughout its sys...

World

Met chief: Police must do more to beat hidden threat of cyber crime

Shared by James Stewart

standard.co.uk - Sir Bernard Hogan-Howe has admitted the figures are “worrying” for his force’s reputation, and warns that the “hidden threat” from online swindlers will continue to go under-investigated across the...

Business

How Vulnerable Are The U.S. Stock Markets To Hackers? - Liberty Investor™

libertyinvestor.com - When the New York Stock Exchange halted trading for nearly four hours on July 8, it raised an important question: How vulnerable are the markets to hackers? That morning, United Continental had gro...

World

Anonymous hacks US Census Bureau over TTIP agreement, leaking employee details online

ibtimes.co.uk - Anonymous has claimed responsibility for a cyber-attack against a US government website, resulting in the leak of sensitive employee data. Members of the online activist collective Anonymous have t...

Technology

Car Hacking Shifts Into High Gear

darkreading.com - If a car's brakes suddenly fail and send it careening uncontrollably into a ditch, how do you know whether it was a mechanical failure or the work of a malicious hacker? There's no foolproof way to...

Business

Why This Founder Is Sharing $27 Million With His Staff

Shared by SenseCy

inc.com - Turkish food-delivery company Yemeksepeti has made a killing in sales. Even after the company's recent sale to Germany's Delivery Hero for $589 million, CEO and co-founder Nevzat Aydin isn't quite ...

Business

Defense often lax amid cyber crime boom - Banking Exchange

Shared by iGloobe.info

bankingexchange.com - Despite a year of highly public and destructive cyberattacks, few organizations’ cybersecurity policies and processes are providing better protection than a year ago, according to a joint public an...

World

Russia and Israel cooperate to fight cyberterrorism

scmagazineuk.com - The agreement involves a range of measures, several of which are focused particularly on the fight against the growing threat of Daesh (ISIS). Former Israeli Prime Minister Ehud Barak told SCMagazi...

Business

Ex-boss of MtGox bitcoin exchange arrested in Japan over lost $390m

Shared by CyberSecIntel

theguardian.com - Mark Karpeles, the former head of defunct bitcoin exchange MtGox, has been arrested in Japan, reportedly set to be questioned over the 2014 disappearance of nearly $390m (£250m) worth of the virtua...

Technology

Hackers Can Remotely Hack Self-Aiming Rifles to Change Its Target

Shared by Yarix

thehackernews.com - High-tech Sniper Rifles can be remotely hacked to shoot the wrong target – Something really scary and unpredictable. Yes, Hackers can remotely gain access to the $13,000 TrackingPoint sniper rifles...

Technology

MMS Not the Only Attack Vector for “Stagefright”

Shared by Johnny

blog.trendmicro.com - Earlier this week Zimperium zLabs revealed an Android vulnerability which could be used to install malware on a device via a simple multimedia message. This vulnerability, now known as Stagefright,...

Technology

Cyberia: 8 human factors feeding cyber crimes!

Shared by Cyber Council

cyberstreet.buzz - On a scale of 1-10, how “cyber savvy” do you really feel? Surpassing boundaries of distance and time, our superior existence in cyber space has fueled innovation, simplified lives and created conne...

Technology

Placek to plead guilty for role in creating Darkode hacker marketplace

Shared by R.G. Jackson

jsonline.com - A computer owned by Daniel Placek — a suburban Milwaukee man who helped create an international malware marketplace — contained 74,190 credit card numbers and 297 bank account numbers when it was s...

Technology

Password Management Software And Driver Management Software Are Critical

Shared by John Cosstick

identity-theft-scout.com - Password management software, for strong passwords, and driver management software, for up to date software drivers are essential for cyber security. Here we are looking at how to lock the cyber cr...

Technology

Unlock and start General Motors cars with a $100 box of tricks – hacker

theregister.co.uk - Anyone with $100 spare for electronic components, and some technical skills, can wirelessly track, unlock, and start General Motors cars that have OnStar fitted, it is claimed. OnStar is a cellular...

Technology

The hackers that beat the US government may have just broken into one of the world’s biggest airlines

businessinsider.com - The Chinese team believed to be responsible for a high-profile cyber strike on the US government has hacked United Airlines, according to reports. Bloomberg reported the breach on Wednesday, citing...

Business

Federal Government Pouring Money into Anti-Cybercrime Plan - Techvibes.com

Shared by PageFreezer

techvibes.com - The federal government says it will put an additional $142.6 million into its anti-cybercrime strategy over the next five years. That money is intended to help protect private-sector computer syste...

World

FBI Warns of Increase in DDoS Extortion Scams

Shared by Johnny

threatpost.com - Online scammers constantly are looking for new ways to reach into the pockets of potential victims, and the FBI says it is seeing an increase in the number of companies being targeted by scammers t...

Science

Hacking Critical Infrastructure: A How-To Guide

Shared by Eddie

defenseone.com - How easy would it be to pull off a catastrophic cyber attack on, say, a nuclear power plant? At next week’s Black Hat and Def Con cybersecurity conferences, two security consultants will describe h...

Business

Mt. Gox head arrested over loss of 650,000 bitcoins

arstechnica.com - Mt. Gox head Mark Karpelès was arrested by Japanese police on Saturday, more than a year after the exchange folded amidst the loss of 650,000 bitcoins. Karpelès hasn't been formally charged but "po...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →