The Cybercrime Herald

Edition list view

Technology

New Windows zero day being exploited through PowerPoint

zdnet.com

zdnet.com - Microsoft has disclosed a vulnerability affecting all supported releases of Microsoft Windows, excluding Windows Server 2003. The attack is being exploited through limited, targeted attacks using M...

Technology

5 passwords you should never use

Shared by
Michel Levert

blogs.microsoft.com - This is part three of three posts on stronger passwords. Part 1: Create stronger passwords and protect them The news is filled with stories about hackers cracking passwords. You can help avoid bein...

Technology

The Ten Most Wanted Hackers by the FBI - #10 - The State of Security

Shared by
CK Lee 李

tripwire.com - Home « News « Featured Articles « The Ten Most Wanted Hackers by the FBI – #10 Hackers all have different intentions—some are committed to making computer networks more secure, while some are more ...

Leisure

Civil Service Job Search

Shared by
Yaogwai

civilservicejobs.service.gov.uk - Welcome to the Civil Service Job Site Details of applications made for vacancies first advertised prior to introduction of the new version of the CS Jobs e-Recruitment System at the beginning of Ap...

Politics

Rep. Peter King on government’s response to cybercrime | On Air Videos

Shared by
★♥ Harriet Baldwin

video.foxbusiness.com - Oct. 21, 2014 - 4:00 - Rep. Peter King (R-NY) weighs in on the dangers of cybercrime and the government’s response to the security issue.

Technology

Operation Distributed Dragons, thousands of machine compromised worldwide

Shared by
Security Affairs

securityaffairs.co - Security experts at the Italian Tiger Security firm have spotted a new wave of DDoS attacks that were originated in China and that appear as run by well organized APT. The expert identified the ope...

Science

Cops Get ‘Smarter’: Using Analytics To Fight Crime

Shared by
Asad Ahamad

click-accenture.com - Police forces across the world are under pressure to be smarter, quicker and more efficient when it comes to fighting crime. Forward-thinking police departments are embracing the digital age and in...

World

Honors Colloquium - University of Rhode Island

Shared by
URI

uri.edu - Congressman James Langevin has served as the representative for Rhode Island's 2nd congressional district since 2001. As co-founder and co-chair of the bipartisan House Cybersecurity Caucus, he has...

Science

Secret Thoughts: a medical thriller (English Edition) eBook: H.S. Clark: Amazon.fr: Boutique Kindle

Shared by
Medical Thriller

amazon.fr - Présentation de l'éditeur Something is rotten in Seattle, where seven innocent people are dead from tainted cold medicine and some of the country's wealthiest CEOs are suffering from corporate espi...

Business

5 Things Boards Should Do About Cybersecurity Now - WSJ

Shared by
Amir Mizroch

blogs.wsj.com - headline gold Companies GOLD Ran gold U.S. View All Search Results »

Technology

Finally, the Mid-Season Cybercrime Awards Are Here! -HackSurfer

Shared by
Jeff Peters

hacksurfer.com - Week seven has come and gone, leaving only six weeks left to go in the regular season of 2014's HackSurfer Fantasy Cybercrime League. For those unfamiliar, a few months back the HackSurfer staff dr...

Business

Cost of cybercrime continues to increase for US companies

Shared by
Security Affairs

securityaffairs.co - Which is the cost of cybercrime suffered by US companies? The fifth annual report published by the Ponemon Institute and titled “2014 Global Report on the Cost of Cyber Crime” reveals that cyber at...

Technology

Health Repo Hacked Depot - SingleMomMilk

Shared by
Ali Eslami

singlemommilk.com - You don’t know me, you’re too old, let go It’s over, nobody listens to techno Now let’s go, just gimme the signal I’ll be there with a whole list full of new insults I been dope, suspenseful with a...

Business

Staples likely breached, retailer defenses back in spotlight

Shared by
Ronan Murphy

arstechnica.com - Office supply retailer Staples is investigating a possible breach of its systems following reports from the banking industry of fraudulent credit and debit card transactions at stores in the northe...

Technology

Backoff malware infections are more widespread than thought - ComputerworldUK.com

Shared by
Fountainhead

computerworld.com - The number of businesses hit by the data-stealing Backoff malware may be substantially more than the 1,000 or so companies estimated by federal officials, according to security vendor Kaspersky Lab...

Technology

Le coût des cyberattaques en France croît en un an de 20.5% pour atteindre 4,8M€ par entreprise - Global Security Mag Online

Shared by
Mike Beckett

globalsecuritymag.fr - Pendant la durée de l’étude, d’importantes cyberattaques menées aux Etats-Unis ont porté sur le vol de millions de cartes de paiement, de mots de passe Internet, de propriété intellectuelle et de c...

Business

A cyber fraud victim seeks justice

Shared by
Mark Dowling

kuenselonline.com - Crime: Following a major cyber fraud case, a Thimphu electronics supply firm, which nearly lost USD 0.191m, has lodged a fraud case against its supplier in Dubai, United Arab Emirates. After almost...

Business

Cost of Cybercrime Rising While IT Security Spending Is Down

Shared by
Michael Fimin

blog.netwrix.com - Are we all getting a little weary of stories about major data breaches at giant retailers or health care providers? A new survey released at the end of September sheds some interesting light on the...

Technology

UK cybercrime grows, but so does e-identity awareness

Shared by
The Paypers

thepaypers.com - The data, conducted by Get Safe Online, reveals that losses from online fraud are now running at more than GBP 670 million a year, though with many cases going unreported, the true economic cost co...

Technology

Mobile Malware Targets Financials -HackSurfer

Shared by
Jeff Peters

hacksurfer.com - In a recent study conducted by Kaspersky Labs, mobile phone malware is primarily designed to steal banking credentials or money. The focus of the study was Android specific phones which, according ...

Leisure

'653 mensen betaalden losgeld ransomware' - AD.nl

Shared by
Piet van Kroonenburg

ad.nl - Dat meldt het Delftse bedrijf Fox-IT. Onder meer via een mail die leek te komen van PostNL werd de ransomware de afgelopen weken wereldwijd verspreid. Bij dit type virus wordt iemands computer na b...

Technology

Cyber Security - how do you protect yourself?

Shared by
Katy Howell

immediatefuture.co.uk - The next phase of The Government Cyber Streetwise has launched. This time it’s tackling the subject of passwords. On average a person will have between 19 to 26 online accounts, (figures according ...

Technology

Malware directs stolen documents to Google Drive

Shared by
carlos fouz

net-security.org - Researchers have uncovered a new type of information-stealing malware that is apparently used in campaigns targeting government agencies and can syphon files from compromised computers to Google Dr...

Technology

Apple Pay Secure? Not so Fast!

Shared by
Info Security Buzz

informationsecuritybuzz.com - Apple Pay went live this week. And while there has been much talk about how it might disrupt the payment system, and how easy it will be to use, security is once again being overlooked in the urgen...

Technology

Microsoft PowerPoint Vulnerable to Zero-Day Attack

Shared by
Mike Beckett

thehackernews.com - It seems that there is no end to the Windows zero-days, as recently Microsoft patched three zero-day vulnerabilities in Windows which were actively exploited in the wild by hackers, and now a new Z...

Technology

10 Ways to Protect Your Home Network from Hackers

Shared by
Marc Wilczek

yahoo.com - Protecting your family’s digital assets used to be easy. You just turned on your PC’s built-in firewall settings and turned on an antivirus program. As long as you didn’t install strange software o...

World

Cybercrime law’s status uncertain, National, Phnom Penh Post

Shared by
Irene Poetranto

phnompenhpost.com - A Ministry of Commerce official said in a speech last week that the controversial draft cybercrime law was almost ready to appear before the National Assembly, though another government official di...

Business

Cost of Cybercrime on the Rise

Shared by
eSecurityPlanet

dfinews.com - According to the 2014 Cost of Cyber Crime Study, the average annualized cost of cybercrime has reached $12.7 million in the U.S., a 96 percent increase since the study was launched five years ago. ...

Business

23% increase in defamation actions as social media claims rise | Media

Shared by
Keith Stanton

theguardian.com - There has been a 23% rise in the number of reported defamation cases in the UK over the past year, up from 70 to 86, according to research by Thomson Reuters. The growth in the number of reported d...

Technology

Staples in Northeast likely breached with 'more to come'

Shared by
Jim Rivas

usatoday.com - SAN FRANCISCO — The office supply chain Staples is investigating a possible breach of credit card data, a company spokesman said Tuesday. "Staples is in the process of investigating a potential iss...

Technology

Security Tips For Keeping Your Documents Safe

Shared by
Fresh Business

techpageone.dell.com - In today’s society, the security procedures you have in place in order to keep your business documents and sensitive material safe is a high priority. Over just a few short years we have already se...

Technology

Security Affairs on Pinterest

Shared by
Security Affairs

pinterest.com - Apple apparently blocked China's "man-in-the-middle" attack against iCloud users within the country -- while China denied being involved in it. CaLLSTaCK hacked various HostGator servers for #OPHon...

Technology

Leaked programming manual inspired development malware for ATMs

Shared by
Security Affairs

securityaffairs.co - Recently Kaspersky Lab spotted a series of attacks on ATM machines which were infected by the Tyupkin malware, the malicious code is used by criminal organizations to compomise the banking machines...

Business

Payment Innovation: How to Engage 5.1billion Phone Users - MLM Solutions Blog

Shared by
Frank Cozzo

mlmsolutions.co.uk - According to the American Academy of Cosmetic Dentistry, 5.1 billion people have a cellular phone but only 4.2 billion people have a toothbrush. There are more mobile phone users in the world than ...

Business

Hackonomics: Cybercrime's cost to business

Shared by
Alessandro Guarino

zdnet.com - They say "crime pays" -- but we can be certain the paychecks for cybercrime come right out of the pockets of every business with a digital footprint. In March, Juniper Networks and RAND Corporation...

Science

Europol warning on the risks for the Internet of Everything (IoE)

Shared by
Security Affairs

securityaffairs.co - The EU’s chief criminal intelligence agency made a disconcerting revelation, the threat of “online murder” is set to rise. It isn’t a science movie trailer, but the finding that cyber criminals inc...

Technology

Prevent Cybercrime: A Brief Reminder by Victoria Roddel | 9781105229039 | NOOK Book (eBook)

Shared by
Victoria Roddel

barnesandnoble.com - Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information cont...

Technology

Pricing Policies in the Cyber Criminal Underground - InfoSec Institute

Shared by
Security Affairs

resources.infosecinstitute.com - Underground markets are places on the Internet where criminal gangs offer a wide range of illegal products and services. Black markets are crowded places where single individuals or criminal organi...

Science

Reflection DDoS Attacks Continue to be dangerous in Q3 2014

Shared by
Security Affairs

securityaffairs.co - Arbor Networks has published the quarterly report on global DDoS attack data related to Q3 2014, the slides show the distributed denial of service (DDoS) attack trends for the first three quarters ...

Science

Evolution of 3D Printing Technology Raises Security Concerns - InfoSec Institute

Shared by
Security Affairs

resources.infosecinstitute.com - Also known as the term additive manufacturing (AM), 3D printing is a process for making a three-dimensional object of almost any shape starting from a 3D model or other electronic data source. Thro...

Business

What is the cost of cyber crime? Looking past the ... - HP Enterprise Business Community

Shared by
HP Singapore

h30499.www3.hp.com - Dr. Larry Ponemon Chairman and Founder of the Ponemon Institute We just completed our fifth annual Cost of Cyber Crime study sponsored by HP Security. We surveyed 257 companies in seven countries t...

Business

Obama calls for greater credit card security in light of data breaches - The Washington Post

Shared by
Vormetric

washingtonpost.com - Speaking at the Consumer Financial Protection Bureau on Friday, President Obama announced the launching of a chip and PIN system called "Buy Secure." Starting in 2015, Obama said credit cards and c...

Technology

CYB3RCRIM3: Defamation, Facebook and the Seventh-Graders

Shared by
Iván Acosta

cyb3rcrim3.blogspot.com - Wednesday, October 22, 2014 Defamation, Facebook and the Seventh-Graders This post examines a recent opinion the Court of Appeals of Georgia issued in a civil case:  Boston v. Athearn, 2014 WL 5068...

Technology

Is your phone line a ‘6-figure liability waiting to happen’?

Shared by
e-Crime Wales

nakedsecurity.sophos.com - Remember pre-Voice-over-IP, back when long-distance calls were expensive, and you had to hunt down employees and beat them up to keep calls short? There are still ways to rack up breathtakingly exp...

Technology

Cybercrime increased by 96 percent in US - New Study Shows - The Hackers Post

Shared by
Doug Munro

thehackerspost.com - According to the Cyber Crime 2014 Study, conducted by Ponemon Institute, the average annualized cost of cybercrime has reached $12.7 million in the U.S., a 96 percent increase since the study was l...

Technology

Cybercrime now becoming a serious problem for many Britons | Money

Shared by
LogRhythm

theguardian.com - Many Britons have been the victim of a cybercrime such as identity theft, hacking or abuse on social media, new research has found. UK losses from online fraud are now running at more than £670m a ...

Technology

Cyber Crime Growing - Common Attack Techniques

Shared by
markITwrite Tech

voyager.net.uk - Our partner Blue Coat Systems recently published a blog post accompanied with powerful statistics that compared real-world crime and cyber crime and showed that cyber crime is at an all time high. ...

Technology

Malicious Android Code Disguised As Images

Shared by
e-Crime Wales

news.sky.com - A security flaw in Android means hackers can create malicious software that looks like an image. By wrapping up a photo or graphic with malware, it can be delivered in a way which gets past securit...

Technology

Hacked: The six most common ways non-tech people fall victim

Shared by
NCX Group

zdnet.com - Target, JP Morgan Chase, Verizon, Home Depot... the list goes on. The Identity Theft Research Center's 2014 report summary of data breaches paints a disturbing picture of 2014 to date -- as of Octo...

Leisure

Recent nieuws | WeSecureIT

Shared by
WeSecureIT

wesecureit.nl - Cryptolocker. Een verschrikkelijk vervelend en angstaanjagend virus. Het virus blokkeert en versleuteld al uw bestanden op de computer. Wanneer u een bestand wilt openen, kan dat niet meer. Het bes...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .