The Cybercrime Herald

Edition list view

Technology

Deer.io platform facilitates cybercrime and its activities

securityaffairs.co - Security experts from Digital Shadows have conducted a deep analysis of the Russian cybercrime website Deer.io. The site aims to facilitate cyber criminal activities allowing even crooks without sp...

Politics

‘Cybercrime bill poses threat to fundamental rights’

Shared by Zahra Lodhi

dawn.com - ISLAMABAD: Despite amendments proposed by the Senate Standing Committee on IT, the Prevention of Electronic Crimes Bill (PECB) continues to pose a threat to fundamental rights, local civil rights o...

Technology

IT and C-suite business leaders perceive cybersecurity differently: Report - The Financial Express

Shared by NVRA.NL

financialexpress.com - There is growing cybersecurity vulnerabilities in India, with nearly 8 in 10 IT and C-suite business leaders experiencing increased cyber-attacks on their firms in 2015, said a report on corporate ...

Business

Warum deutsche Firmen leichte Beute für Hacker sind

welt.de - Es war eine unangenehme Nachricht, die der Babybrei-Hersteller Hipp Anfang Juni an seine Kunden schicken musste: Wer sich auf der Webseite des Herstellers registriert hatte, dessen persönliche Date...

Technology

Next-Generation Breaking and Entering | Brandeis Magazine

brandeis.edu - Over time, Goodman was drawn to the intersection of technology and crime, getting in on the ground floor of an area about to see breakneck growth. “Criminals are very much early adopters of technol...

Technology

Robocop is (almost) here : Artificial Intelligence in your Security Team

Shared by 7h3rAm

securityaffairs.co - The Rio Olympics 2016 is something everyone is looking forward to. The sportsmanship, the record making, medals the spirit of the game and the hilarious doping scandals like the 1920’s grafting of ...

Technology

Ransomware Dominates 18 Million New Q2 Malware Samples

Shared by Neira Jones

infosecurity-magazine.com - Panda Security detected a staggering 18 million new malware samples in the second quarter, the majority of which were credential stealers and ransomware, it claimed in a new report. The Spanish sec...

Science

Warning: Over 100 Tor Nodes Found Designed to Spy On Deep Web Users

thehackernews.com - Researchers have discovered over 100 malicious nodes on the Tor anonymity network that are "misbehaving" and potentially spying on Dark Web sites that use Tor to mask the identities of their operat...

Business

The Growing Threat From Emerging Cybercrime Markets

securityintelligence.com - David is an award-winning writer, speaker, editor, video blogger, and online communications professional who also advises numerous startup and well-established technology ventures.... It may be dif...

World

FBI probes suspected breach of another Democratic organization by Russian hackers

Shared by Neira Jones

washingtonpost.com - Russian government hackers have breached the computers of the Democratic Congressional Campaign Committee, according to individuals familiar with the matter. The intrusion appeared to be carried ou...

World

Don't use a VPN in United Arab Emirates – unless you wanna go to jail and pay $545,000

Shared by SECbuddy

theregister.co.uk - A royal edict from the president of the United Arab Emirates (UAE) has made it illegal for anyone in the country to use a VPN service. Those caught will face jail time and fines of between 500,000 ...

Technology

End of SMS-based 2-Factor Authentication; Yes, It's Insecure!

thehackernews.com - SMS-based Two-Factor Authentication (2FA) has been declared insecure and soon it might be a thing of the past. Two-Factor Authentication or 2FA adds an extra step of entering a random passcode sent...

Science

Beneath the surface | Deloitte US | Cyber Risk Services

Shared by Deloitte Risk

deloitte.com - Common perceptions about the impact of a cyberattack are typically shaped by what companies are required to report publicly—primarily theft of personally identifiable information (PII), payment dat...

Technology

No More Ransom: law enforcement and IT security companies join forces to fight ransomware - Europol Press Release - eForensics

eforensicsmag.com - Today, the Dutch National Police, Europol, Intel Security and Kaspersky Lab join forces to launch an initiative called No More Ransom, a new step in the cooperation between law enforcement and the ...

Business

21 Months Jail & $77000 fine for Sabotaging CITI Bank Network(Cyber Crime) in 2013

cyberlawconsulting.blogspot.com - 21 Months Jail & $77,000 Fine for Sabotaging CITI Bank Network in 2013 Ex staff of Citibank named Lennon Ray Brown was sentenced to Jail for 21 months along with a $77,000 fine by a Texas court (U....

Politics

Data Security and Cybercrime in Argentina | Lexology

lexology.com - Use the Lexology Navigator tool to compare the answers in this article with those from other jurisdictions. Trends and climate Would you consider your national data protection laws to be ahead or b...

Technology

Chimera ransomware keys leaked by rival gang as cyber-turf wars heat up

Shared by CERGlobal

siliconangle.com - The ransomware business has gotten so profitable and so competitive that rival gangs are now sabotaging each other in a bid to secure more victims for themselves. As revealed this week, the creator...

Business

Web Threat Detection Services Deliver SWIFT Remediation - Speaking of Security - The RSA Blog and Podcast

Shared by RSA Fraud

blogs.rsa.com - With the dust settling on a series of high profile cyber heists against international banks SWIFT’s network used to facilitate international payments between banks, the service provider is weighing...

World

UAE Cybersecurity Law Threatens Freedom of Expression - Americans for Democracy & Human Rights in Bahrain

Shared by Sejal Parmar

adhrb.org - On 21 July 2016, President Sheikh Khalifa bin Zayed Al Nahyan of the United Arab Emirates (UAE) issued new legislation further intensifying existing cybercrime laws enacted under Federal Law No. 5 ...

Technology

What Is the Next Phase of Cybercrime?

Shared by Dave Keller

futureofbusinessandtech.com - I recently got to sit down and discuss the future of cybercrime with Steph Aldridge, who may just be a contender for having the world’s coolest job title: Cyber Assurance Bletchley Park; CyberCentu...

Science

Who Let the Pandas Out? Zeus, Zeus, Zeus, Zeus

Shared by arbornetworks

arbornetworks.com - A few months ago Proofpoint released a blog post about a new banking trojan called Panda Banker. They credit Fox-IT with the discovery and both companies indicate that it is another variant based o...

Science

Large global automaker

Shared by WeissenbachPR

ecc.ibm.com - With increased connectivity to automobiles, automakers have seen new risks and attack vectors to the Connected Car ecosystem. By working with IBM and Arxan, a leading automaker was able to “harden”...

Technology

Are Data Breaches Becoming More Common?

motherboard.vice.com - The reported number of data breaches on Vigilante.pw since 2007. Source: Vigilante.pw. Image: Che Saitta-Zelterman It feels as if data breaches are becoming more and more frequent. Pretty much ever...

Technology

POS-terminals become target of cyber-attacks in Russia this year

Shared by Neira Jones

scmagazineuk.com - POS-terminals have increasingly become a target for cyber-attackers in Russia, posing a threat to ordinary buyers and shoppers, according to analysts of FinCERT POS-terminals have increasingly beco...

World

Cyber Crime Replacing Traditional Crime

Shared by PGI Cyber

pgicyber.com - The Crime rate across England and Wales was shown to have doubled over the past 12 months after the Office for National Statistics (ONS) added the number of recorded cybercrime incidents for the fi...

Leisure

Are You Really Safe While Dating Online

Shared by writeforvalue

writeforvalue.com - Dating is a salubrious experience, and I believe, everyone has the right to go through it! In this context, I would rather say that people have the right to fall in love, not just once, but a multi...

Technology

Sprunghafter Anstieg bei aktiver Malware

Shared by SECbuddy

security-insider.de - Die Anzahl der aktiven Malware-Familien ist in der ersten Hälfte 2016 um nahezu zwei Drittel gestiegen. Das zeigt der neueste Bedrohungsindex für Deutschland von Check Point. In Deutschland haben s...

Business

Trendon Shavers Sentenced 18 Month Prison For Bitcoin Ponzi Scheme

Shared by David Liam

deepdotweb.com - US Securities and Exchange Commission (SEC), in 2013, charged a man with defrauding investors in a bitcoin Ponzi scheme. According to the SEC, Trendon T. Shavers, founder and operator of Bitcoin Sa...

World

USA: Wieder eine farbcodierte Skala für Cyberbedrohungen

Shared by SECbuddy

heise.de - An der Bundeswehrhochschule in München wird nun das bundesweit, möglicherweise europaweit größte Forschungszentrum für Cybersicherheit aufgebaut (Bundeswehrhochschule München richtet "größtes Forsc...

Science

Why your antivirus software can't stop ransomware - Futurity

Shared by Ofer Israeli

futurity.org - You are free to share this article under the Attribution 4.0 International license. If your computer is infected with ransomware, your antivirus software probably won’t detect it until it’s too lat...

Technology

Symantec Hurdles Rio Olympics Cybersecurity Competition

investors.com - Simone Biles, Katie Ledecky and Michael Phelps are on the road to Rio, but so are cybercrooks looking to bilk some of the bucks entering Brazil and hacktivists with an ax to grind. During the 2012 ...

Technology

A New Service Alerts You When Someone Uses Your Social Security Number

Shared by Mark Testoni

wired.com - You already know that identity theft could happen to you. You’re never more than a few headlines away from another wide-scale hack. But what are you supposed to do with that knowledge? According to...

Education

Los niños españoles dan información a los cibercriminales en las redes sociales

Shared by cleanmyrep

zonamovilidad.es - Y es que, los jóvenes, deseosos de formar parte de un grupo de una red social, pueden llegar a compartir mucha información personal. Muchos lo hacen sin darse cuenta de que los datos que comparten ...

Science

Huge malvertising campaign uses steganography to hide malware in plain sight

scmagazineuk.com - By encoding malware in innocuous-looking images and only decoding it once the victim has been found to be "safe", creators of AdGholas managed to hide their malvertising campaign for over a year. A...

Education

Wissenschaftler in der Schule – per Videokonferenz. Das digitale Junior Science Café

wissenschaft-im-dialog.de - Ein Auto fährt in hohem Tempo die Straße entlang, drin sitzen mehrere jubelnde Personen, die massenhaft Geldscheine in die Luft werfen – und diesen Moment über Facebook live nicht nur mit ihren Fre...

Technology

5 Reasons You Can't Ignore This New Rise in Cyber Crime

Shared by asiflateef

inc.com - When it comes to studies, surveys and reports sent my way that dissect various nuances of the cyber wild, my cup runneth over. So, I've assembled a small grouping of revelatory proof points that co...

Technology

Democrat hack: Who is Guccifer 2.0? - BBC News

Shared by Geoff Kates

bbc.co.uk - A lone hacker calling themselves Guccifer 2.0 has claimed responsibility for a damaging hacking attack on the US Democratic Party. In that attack, gigabytes of files including emails and other docu...

Technology

Mitarbeiter auf Dienstreise – oft klappt es nicht mit der Sicherheit

itsicherheit-online.com - Deutsche Mitarbeiter verspüren einen hohen Druck, möglichst rasch nach der Landung im Ausland wieder geschäftlich online zu sein. 21,6 Prozent geben an, dass dies schlicht und einfach erwartet wird...

Technology

Using VPN in the UAE? You'll Be Fined Up To $545,000 If Get Caught!

Shared by Cempal

thehackernews.com - If you get caught using a VPN (Virtual Private Network) in Abu Dhabi, Dubai and the broader of United Arab Emirates (UAE), you could face temporary imprisonment and fines of up to $545,000 (~Dhs2 M...

World

What the DNC Hack Say About the U.S. Government’s Cybersecurity Strategy

Shared by Geoff Kates

fortune.com - Rajiv Gupta is CEO of Skyhigh Networks, a California-based cloud security and enablement company. The companies and agencies listed in this article are not clients of Skyhigh Networks. As if the US...

Technology

How the hackers get in and how you can stop them | ITProPortal.com

itproportal.com - It is hard to get away from the presence and scale of the cybersecurity threat. The mainstream and social media are full of stories of companies who have been hit by a data breach, but there are ma...

Technology

How Computers Hackers Hack Sensitive Information… And What You Can Do About it

marketwatch.com - Media outlets on June 14 reported that Russian hackers allegedly had breached the Democratic National Committee’s computer network and gained access to a large amount of emails, chat logs and whatn...

World

Hack attack on Democrats: Why experts think Russia may have done it

Shared by PixAlert

cnbc.com - The idea of Russia hacking a U.S. political party's emails may sound like a Cold War spy novel, but it fits into a larger pattern of how Putin operates. "It is true that some populist parties in Eu...

Environment

Cisco-Studie: Unternehmen im Fadenkreuz von Ransomware

Shared by SECbuddy

computerwelt.at - Ransomware ist inzwischen der profitabelste Malware-Typ in der Geschichte der IT. Dabei erpressen Cyberkriminelle Computernutzer, indem sie die Daten auf dem Computer mit einer mehr oder weniger st...

World

Democrats Fear October Surprise of More Hacked Emails

Shared by Jo Lown

nbcnews.com - Now that U.S. authorities are confident Russian intelligence agencies are behind the hack of Democratic Party emails, political operatives and cybersecurity experts tell NBC News they are bracing f...

World

Nigeria loses N127 bn yearly to cybercrime – Minister

simmyideas.com - The Minister of Communications, Mr. Adebayo Shittu, says Nigeria is losing about N127billion which is 0.8 per cent of the country’s Gross Domestic Products (GDP), to cybercrime yearly. Shittu said ...

Business

(Video) How are you protecting your clients information -

Shared by Roger Smith

rniconsulting.com.au - Roger Smith, CEO at R & I ICT Consulting Services Pty Ltd and Amazon #1 author on Cybercrime discusses How small and medium business and not for profit organisations are protecting your clients inf...

Business

Why CyberSecurity Spending Is Much Higher Than Reported

Shared by 3Di

inc.com - Earlier this year there were various predictions - including from the CEO of information-security technology vendor FireEye - that spending on cybersecurity would slow down in 2016. I was unconvinc...

Technology

Cybercrime 2016 – The worst cases so far

boxcryptor.com - Cybercrime is constantly on the rise, since more and more people are connected online, and more and more interactions – private or business related – take place in this cyberspace. Cybercrime encom...

Technology

Sicherheit im Unternehmen: Achillesferse Mitarbeiter - silicon.de

Shared by SECbuddy

silicon.de - Ransomware, Trojaner und Malware – häufig halten Unternehmen Hackerangriffe für das größte Sicherheitsrisiko. Eine aktuelle Studie des Branchenverbandes Bitkom scheint dies zu bestätigen: Demnach s...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →