The Cybercrime Herald

#cybercrime

The second most common crime in the UK is cybercrime

Shared by Farah Idris

qz.com - In its first year of inclusion in the UK’s crime estimates for England and Wales, cybercrime placed right near the top of the list of the most common criminal offenses. The Office for National Stat...

The surprising cyber risks facing your small business clients

Shared by Proficio

ibamag.com - When many business owners think of data breaches, they think of malicious hacker collectives going after Fortune 500 companies. And that image can lead to a risky assumption: that smaller businesse...

From Linux to Windows - New Cross-Platform Backdoor Discovered

Shared by Rod

securelist.com - Recently we came across a new family of cross-platform backdoors for desktop environments. First we got the Linux variant, and with information extracted from its binary, we were able to find the v...

Login duplication allows 20m Alibaba accounts to be attacked | ZDNet

Shared by Neira Jones

zdnet.com - Hackers in China have attempted to access over 20 million active accounts on Alibaba Group's Taobao ecommerce website using Alibaba's own cloud computing service, state media reports. An Alibaba sp...

Cybercrime costing NI economy £100 million per year

grantthorntonni.com - Cybercrime is costing the Northern Ireland economy almost £100 million per year, new research from business advisory firm Grant Thornton has revealed. The startling figure was announced in Belfast ...

No One Knows How Much Cybercrime Really Costs

technologyreview.com - Before the Grum botnet of several hundred thousand compromised computers was taken down by law enforcement in 2012, it was responsible for sending out 18 billion spam messages per day, mostly hawki...

Cybercrooks target finance department employees in India, US and UK - The Economic Times

Shared by EconomicTimes

economictimes.indiatimes.com - NEW DELHI: Cybercriminals are targeting small businesses in India, the UK and the US, sending infected mails to employees responsible for accounts and fund transfers to steal money from affected or...

Here's How Fraudsters Are Still Able to Hack Chip and PIN Credit Cards

Shared by Dave Trader

popularmechanics.com - Chip and PIN credit cards have a reputation for being much more secure than a signature, but hackers have shown that they are not invulnerable. Now, we know how they pulled it off.  As Ars Technica...

Chinese military force to take lead on cyber, space defence

Shared by A. J. Hunt

reuters.com - BEIJING Jan 29 (Reuters) - A new Chinese military outfit will lead the country's push to enhance its cyber warfare, space security and online espionage capabilities, Chinese military observers and ...

Fisher Price's Smart Toy range found vulnerable to hacking

ibtimes.co.uk - Wi-Fi-enabled toys from Fisher Price could have put children's information on the line. Its Smart Toy range has been diagnosed with a security vulnerability that could leak the owners' information ...

Ransomware malware: a rising threat to businesses

Shared by Dhaval Shah

forensicdiariesblog.ey.com - In this day and age, everyone is troubled by the menace of computer malware — unwanted and malicious software code that hacks computer systems, causing malfunction, data theft and loss of business....

United Nations Rules in Favor of WikiLeaks Founder Julian Assange

thehackernews.com - As a result of the legal action against WikiLeaks founder Julian Assange by both British and Swedish Governments, he has been arbitrarily detained by the United Kingdom and Sweden since his arrest ...

Twitter suspends 125,000 'terrorism' accounts - BBC News

Shared by Dave Trader

bbc.com - Twitter says it has suspended more than 125,000 accounts since mid-2015 "for threatening or promoting terrorist acts". In a blog, the US-based firm said the accounts "primarily related to ISIS" (th...

G L Giddings | Press Release: The Holiday Season And ID Theft: The Cycle Continues

ibosocial.com - “If we don't act now to safeguard our privacy, we could all become victims of identity theft.” Bill Nelson “There are two kinds of people in America today: those who have experienced a foreign cybe...

7 Online Activities That Can Get You Arrested

hackread.com - The Internet is a wonderland. It is a place where everything from the birth of the universe to the Miley Cyrus’s twerking is available with just a few clicks of your mouse! If a man from as late as...

Just 45% of global organisations confident of their cyber security measures

Shared by bq magazine

bq-magazine.com - While executives may be uncertain about their security strength, 92 percent of them agree that regulators and investors will expect companies to manage cyber security risk exposure. These leaders a...

Australian companies 'open to cyber crime'

Shared by Marcus Chung

theage.com.au - Australian firms are not taking security seriously enough, says Deloitte. Australian companies could risk becoming "low-hanging fruit" for cyber criminals due to a lack of education and an unwillin...

Arrow Was The Target: Criminals Impersonate Executive, Transfer Money To Outside Bank

crn.com - Criminals recently managed to impersonate an Arrow Electronics executive, prompting the unauthorized transfer of money from the distributor to outside bank accounts in Asia.   The Centennial, Colo....

Cybercrime is booming and the Internet of Things will just make things worse

Shared by Sean McElroy

qz.com - Hackers are getting better and businesses are increasingly at risk, according to a new report from global security consultants PwC. Worryingly for corporate digital security chiefs, this problem is...

Now, hackers are targeting self-checkout lanes

cbsnews.com - Skimmers are the top crime involving ATM machines around the world, but now they're moving into new territory: supermarkets. The devices are hidden electronics that sit inside or over a card slot. ...

Hoe voorkom je een DDos-aanval op jouw website? - Starten.nl

starten.nl - DDoS staat voor Distributed Denial of service. Een DDoS-aanval is bedoeld om systemen plat te leggen. Vaak gaat het om doelgerichte protestacties uit ideologische motieven en zijn de aanvallen geri...

Polizei Sachsen - Landeskriminalamt Sachsen - Schlag gegen die Underground Economy

polizei.sachsen.de - In einem bei der Staatsanwaltschaft Dresden anhängigen Verfahren wurden vom 10. bis 12. November 2015 in vier Bundesländern (Hessen, Rheinland-Pfalz, Nordrhein-Westfalen und Berlin u. A. in den Stä...

U.S. investigators find proof of cyber-attack on Ukraine power grid

Shared by A. J. Hunt

wwlp.com - (CNN) – U.S. investigators have found evidence to confirm what is believed to be the first of its kind cyber-attack on a power grid that caused a blackout affecting hundreds of thousands of people ...

Feds Warn Banks of Rising Ransomware Tide

Shared by TK.CTL

infosecurity-magazine.com - The US Federal Financial Institutions Examination Council (FFIEC) is warning banks about a continued sharp rise in cyber-attacks using ransomware. Ransomware seizes control of and blocks access to ...

UCF grads file suit in federal court over 63,000-person data hack

orlandosentinel.com - Two former UCF student leaders are suing their alma mater after learning they were among the 63,000 people whose Social Security numbers were compromised in a hack, according to court records. The ...

Malware KeyBase: Polivalência e Capacidade para Carregar Outros Tipos de Pragas

Shared by Camilla Lemke

under-linux.org - Malware KeyBase: Polivalência e Capacidade para Carregar Outros Tipos de Pragas Na sexta-feira da semana que passou, a família de malware "Keybase" entrou para o Team Cymru's Botnet Analysis & Repo...

(Video) What questions should I be asking about my cyber risk - SME Security Framework

Shared by Roger Smith

smesecurityframework.com.au - Hello my name is Roger and today I’d like to ask you what questions I should be asking about my cyber risk. Because today’s business world the problem with the digital security, cyber crimes, cyber...

Des chercheurs créent un algorithme pour analyser les réseaux cybercriminels - Diplomatie Digitale

diplomatie-digitale.com - Après que le trafic de produits illicites a gagné le Web, l’identification et l’analyse des réseaux cybercriminels sont devenus deux composantes primordiales de la recherche d’information stratégiq...

WSJ CIO Network: DHS to Start Sharing Cybersecurity Threat Indicators With Industry

blogs.wsj.com - HALF MOON BAY, Calif. — The U.S. Department of Homeland Security will take steps this month to begin automatically sharing cybersecurity threat information with private industry, said Andy Ozment, ...

Combien se revendent les données volées en ligne par les pirates ?

lefigaro.fr - Coordonnées bancaires, identifiants de services de paiement en ligne, informations des comptes de fidélité: toutes ces données volées en ligne rapportent beaucoup d'argent aux cybercriminels, selon...

EY - Shifting into high gear: mitigating risks and demonstrating returns

ey.com - Cyber breaches and insider threats, which include malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks driving investment in FDA, according to EY’s 2016 Globa...

Internet of Things: cyber crime on the rise

Shared by Moti Romi

euronews.com - More data has been generated in the past two years than in the entire history of mankind. While for many, there are reasons to celebrate this increasingly connected world, others express growing co...

Economics of Cybercrime - Crime is Paying Well

Shared by ArnoldHustler

sera-brynn.com - As a cybersecurity firm, our focus, and thus bulk of our time, is spent helping clients prevent cyberattacks, recover from cyberattacks and meet compliance requirements such as PCI, HIPAA, SSAE-16 ...

Now VirusTotal can scan your firmware image for bad executables

Shared by InfoSec

securityaffairs.co - VirusTotal has recently announced the launch of a new malware scanning service for firmware images. The intent is to allow users to identify malicious firmware images. Threat actors could exploit v...

Critical Flaws Found in NETGEAR Network Management System

thehackernews.com - Netgear, one of the most popular router manufacturers, has been vulnerable to two different flaws that could allow hackers to compromise your corporate network and connected devices. Reported criti...

Resources for Small and Midsize Businesses (SMB)

Shared by chad calease

us-cert.gov - Cybersecurity is critical to any business enterprise, no matter how small.  However, leaders of small and midsize businesses (SMB) often do not know where to begin, given the scope and complexity o...

(Video) What is Business Continuity? - www.rniconsulting.com.au

Shared by Roger Smith

rniconsulting.com.au - Roger Smith, CEO at R & I ICT Consulting Services Pty Ltd, Amazon #1 author on Cybercrime and founder of the SME Security Framework | Speaker | Consultant | Trainer discusses –  Business Continuity...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →