The Cybercrime Herald

#cybercrime

Extra Helpings of Hacked Servers? Compromised Machines Hit Low Prices on the Dark Web

securityintelligence.com - A freelance writer for three years, Doug Bonderud is a Western Canadian with expertise in the fields of technology and innovation. In addition to working for the IBM Midsize... It’s a great time to...

The Digital Underworld: What You Need to Know

Shared by Kaluma Inc

rand.org - Tens of millions of Americans will have their credit-card numbers, hospital records, or digital identities hacked or stolen this year, RAND research suggests—victims of a cybercrime industry that n...

Inside the Mind of a Hacker: Attacking the Memory

Shared by IBM Software

securityintelligence.com - Paul Ionescu leads the Security Engineering program for the IBM Security Systems division. He also manages a team of highly skilled security experts tasked with pen-testing IBM... In the previous t...

SWIFT Hackers Steal $10 Million From Ukrainian Bank

Shared by SECbuddy

thehackernews.com - A Ukrainian bank has become the latest victim of the widespread cyber attack on global banking and financial sector by hackers who target the backbone of the world financial system, SWIFT. Hackers ...

Hard Rock Hotel & Casino Hit By PoS Malware

Shared by resecure

securityweek.com - Memory Scraping Point-of-Sale Malware Infects Hard Rock Hotel & Casino Las Vegas Hard Rock Hotel & Casino Las Vegas said on Monday that hackers managed to access customer payment card data through ...

3 ways to fight cyber criminals

Shared by Sarajit Jha

weforum.org - The Fourth Industrial Revolution is well underway. It is transforming how we live, work and play. We share information about everything. We’re constantly plugged in. And as consumers, we expect the...

What is the difference between cyber crime and traditional crime?

pgicyber.com - Although we talk about cybercrime as a separate entity to traditional crime, it is carried out by the same types of criminals for the same type of reasons. These hackers are professional thieves, c...

Another email Hack: Should We Worry?

Shared by Tim

poweradmin.com - Each time a major email service or social media platform gets hacked, the incident generates exciting headlines in the media. But behind the hype there’s a very real tale of anxiety for all the use...

Cognitive Security Helps Defend Against Cybercrime

securityintelligence.com - Marc van Zadelhoff is the General Manager for IBM Security, the fastest-growing enterprise security company in the world. ... On any given day, cybersecurity analysts investigate ongoing incidents ...

Sixgill claims to crawl the Dark Web to detect future cybercrime

techcrunch.com - Sixgill, a self-proclaimed ‘cyber intelligence’ SaaS startup that analyses the Dark Web, is launching publicly today and announcing that it has closed a $5 million funding round led by Elron, an Is...

Worldwide Worry: New National Exposure Index Ranks Most Hackable Countries

securityintelligence.com - A freelance writer for three years, Doug Bonderud is a Western Canadian with expertise in the fields of technology and innovation. In addition to working for the IBM Midsize... Nothing is truly saf...

History and Statistics of Ransomware

securityweek.com - Ransomware is not new - it has been around in one form or another for more than 20 years. It comes in two main varieties: 'blockers' that simply block the users' access to files, and 'encryptors' t...

Don't Rely on Castles and Moats to Protect Your Data — Build a Healthy Immune System Instead

Shared by Sue Ewig

securityintelligence.com - As part of IBM's Security Business Unit, Mitch leads the overall messaging and branding efforts for IBM BigFix and IBM MobileFirst Protect–IBM's Unified Endpoint Management... Have you ever taken a...

What’s really behind China’s drop in attacks against the US?

securityaffairs.co - Earlier this week, FireEye released a report showing a significant decline in cyber-attacks originating from China.  According to the report, the attacks started declining in mid-2014 and has conti...

Apple left iOS 10 Kernel Code Unencrypted, Intentionally!

thehackernews.com - Apple’s new iOS 10 recently made headlines after MIT Technology Review revealed that the company had left the kernel of the mobile operating system unencrypted. Yes, the first developer preview of ...

Corruption Currents: FBI Says Criminals Sought $3 Billion Via Email Scams

blogs.wsj.com - A daily roundup of corruption news from across the web. We also provide a daily roundup of important risk & compliance stories via our daily newsletter, The Morning Risk Report, which readers can s...

Small businesses bearing the brunt of cyber crime

riscitsolutions.com - A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is a piece of data stored by a website within a browser, and then subsequently sent back to the same website by the browser. C...

Intrusion Detection and Prevention for Networks

blog.finjan.com - Being able to trust your corporate network to deliver information, services and support to whoever needs them is not only crucial to keeping your operations going – it’s a vital element in maintain...

Tech support scams target victims via their ISP - BBC News

Shared by Jill Storey

bbc.co.uk - A new scam, in which fraudsters pose as legitimate internet service providers to offer bogus tech support, either via the phone or on the net, is on the rise, the BBC has found. It is a twist on an...

Using Context to Predict the Future

Shared by OXITS

blog.fortinet.com - The vast majority of security strategies are reactive. The goal is to close the gap between the time to compromise and time to discover. According to the 2016 DBIR report, this compromise time is m...

Australia's Defence Department tips AU$12M to seat spies with students

theregister.co.uk - The Department of Defence has tipped A$12 million (£6.1 million, US$9.1 million) into an information security facility to attract new blood by housing signals spooks alongside Australian National U...

Uber Hack lets anyone find Unlimited Promo Codes for Free Uber Rides

thehackernews.com - An Independent Security Researcher from Egypt has discovered a critical vulnerability in Uber app that could allow an attacker to brute force Uber promo code value and get valid codes with the high...

Grandpoint Division to Offer 'First of Its Kind' Cyber Crime Insurance

Shared by Tim Cohn

sdbj.com - Grandpoint Bank, parent of La Jolla-based Regents Bank, has created a new division to address growing concerns about cybercrime within the banking industry. Regents, which operates four banks in Sa...

Warning in UAE over ‘SIM swap fraud’ mobile phone scam | The National

Shared by Neira Jones

thenational.ae - ABU DHABI // Residents are being warned about a new type of scam where fraudsters gain access to mobile phones, allowing them to expose valuable banking information. Last week, customers of Abu Dha...

FIA arrests Chinese hacker for skimming bank ATM

techjuice.pk - A young Chinese national was arrested on Saturday by the Federal Investigation Agency (FIA) for stealing data from a private bank’s ATM machine. The bank management contacted the FIA when they noti...

Hacker Selling 651,894 Patient Records on the Dark Web

news.softpedia.com - A hacker who goes by the name of TheDarkOverlord has put up for sale on the Dark Web three databases stolen from three healthcare institutions in the US. The hacker is selling the data on The Real ...

EXCLUSIVE: Hackers Compromise Global Banking System at Highest Level, Investigator Reveals

Shared by Net Aurora

theepochtimes.com - The global banking system has been compromised by cybercriminals who have demonstrated they have high-level access that gives them nearly full control to alter data and steal from banks, according ...

Don’t Become the Hacker’s Next Victim

sgcybersecurity.com - Investment professionals need to focus on the threat poor cybersecurity poses to asset managers of all sizes. Cybercrime and cyberespionage cost the US economy about $100 billion annually, and the ...

PunkeyPOS might have already stolen millions of payment card numbers

Shared by Scuttlebutt

securityaffairs.co - Security experts from PandaLabs spotted a new strain of the PoS malware dubbed PunkeyPos which seems to be used by multiple criminal crews in the wild, likely it could be involved in malware-as-a-s...

Canadian Cops Lose Fight to Keep Details of Their High-Tech Surveillance Powers Secret | VICE News

news.vice.com - Federal police in Canada may have lost the battle, but won the war, when it comes to keeping secret their ability to track cellphones, intercept messages, and decrypt messages sent by BlackBerry ph...

Beneath the surface | Deloitte US | Cyber Risk Services

Shared by Deloitte Risk

deloitte.com - Common perceptions about the impact of a cyberattack are typically shaped by what companies are required to report publicly—primarily theft of personally identifiable information (PII), payment dat...

IBM to set up cyber centre in Canberra | ZDNet

zdnet.com - IBM has announced that it will create a National Cyber Security Centre (NCSC) in Canberra, to be headed by Kevin Zuccato, a former Australian Federal Police assistant commissioner and head of the A...

Net Politics » The Implications of Brexit on UK Cyber Policy

blogs.cfr.org - The United Kingdom’s vote to leave the European Union has prompted pundits and politicians to speculate on what the result means for the country, Europe, and the world. To paraphrase Churchill, nev...

PwC Report Shows That Cybercrime Is a Top C-Level Concern

Shared by Varonis

blog.varonis.com - One metric that’s difficult to gauge when it comes to cybercrimes is the economic impact felt by companies. However, PwC took on this challenge and just released the results of its 19th Global Econ...

One of the nastiest types of ransomware has just come back to life | ZDNet

Shared by Danny Palmer

zdnet.com - Just when you thought it was safe to go back onto internet... instances of Locky malware - one of the most prolific forms of malicious software - have bounced back following what had been a huge de...

Facebook-Malware verbreitet sich über Google Chrome | ZDNet.de

Shared by SECbuddy

zdnet.de - Hacker verteilen derzeit mit Hilfe des Google-Browsers Chrome Malware an Facebook-Mitglieder. Wie Hackread berichtet, erhalten Nutzer per E-Mail oder in einer Facebook-App eine Benachrichtigung, wo...

Hackers have reportedly stolen $10m from a bank in Ukraine - what do we know so far?

ibtimes.co.uk - Hackers have reportedly stolen $10m from a bank in Ukraine by exploiting the Swift messaging system, according to reports emerging from the region citing an independent IT monitoring organisation c...

Ransomware - Die nächste Generation - silicon.de

Shared by SECbuddy

silicon.de - Ob Locky, SamSam oder TeslaCrypt: Die Zunahme der Angriffe durch Ransomware sorgt immer häufiger für Schlagzeilen. Gleichzeitig steigt die Wahrscheinlichkeit, dass Unternehmen von einer solchen Erp...

Top website domains are vulnerable to email spoofing

Shared by Lance Edelman

cio.com - Don’t be surprised if you see spam coming from the top websites in the world. Lax security standards are allowing anyone to "spoof" emails from some of the most-visited domains, according to new re...

The rise of cybercrime and the need for cyber ransom liability insurance

Shared by Mike DeCesare

healthcareitnews.com - Over the last few years, the healthcare industry has had its consciousness raised over hacking and cybercriminals, as cybersecurity has been thrust into the spotlight – especially with the recent s...

Zero-Day Warning! Ransomware targets Microsoft Office 365 Users

Shared by SECbuddy

thehackernews.com - If just relying on the security tools of Microsoft Office 365 can protect you from cyber attacks, you are wrong. Variants of Cerber Ransomware are now targeting MS Office 365 email users with a mas...

Verschlüsselungs-Trojaner verleibt sich Zimbra-Mails ein

Shared by SECbuddy

heise.de - Die Schädling ZimbraCryptor infiziert die Zimbra Collaboration Suite und verschlüsselt alle Daten im E-Mail-Ordner. Dafür muss sich ein Angreifer aber in einen Zimbra-Server hacken. Ein neu entdeck...

Ransomware and Cyber Extortion Are on the Rise – What Can Be Done?

Shared by Neira Jones

claimsjournal.com - Ransomware is evolving from a relatively low-dollar extortion racket, into a more sophisticated, more expensive, and more prevalent major criminal activity. Hardly a day goes by anymore without ran...

Maakt ICT het te moeilijk om security te begrijpen?

Shared by Computable.nl

computable.nl - Ik ben ervan overtuigd dat als iedereen cybersecurity begrijpt, veel meer mensen hun computers tegen cybercrime zouden beveiligen. Laten we het daarom simpel houden en de vergelijking tussen de bev...

Watson is adding cybercrime fighting to its resume

developer.ibm.com - When I first joined developerWorks® and started working on the Security zone, it seemed to me that the topic area wasn’t as en vogue as other areas, such as Cloud or Mobile development. So you can ...

New service offering from Wurldtech

Shared by TpromoCom

securityworldhotel.com - Wurldtech's iMSS utilises its innovative network security detection and prevention technology, Opshield, which is designed to protect critical infrastructure control systems and assets and enable s...

Cyber crime is serious business, shows Imperva report

Shared by Imperva

computerweekly.com - Security researchers have discovered a long-running, multi-vector black hat search engine optimisation (SEO) campaign that shows that cyber criminals are organised and professional. Latest on netwo...

Three security myths that could jeopardize your small business - Microsoft Enterprise

Shared by ANDREASCY

enterprise.microsoft.com - One of the biggest myths that I hear from our customers is that small businesses aren’t as susceptible to security breaches as large enterprises. The truth is, just because you’re small doesn’t mea...

The gaming industry can become the next big target of cybercrime

Shared by Sajan

techcrunch.com - Ben Dickson is a software engineer and freelance writer. He writes regularly on business, technology and politics. Video-game-related crime is almost as old as the industry itself. But while illega...

Inside the World of the Dark DDoS

theregister.co.uk - Today’s distributed denial of service attacks are different than the kinds that we saw at the dawn of the millennium when the threat emerged. They’re becoming more nuanced, and subtle – and they co...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →