The Cybercrime Herald

#cybercrime

5 years of cybercrime: where we’ve been and where we’re going | Information Age

Shared by tech_news

information-age.com - Cybercrime is always changing. Despite new developments in cyber security and increases in security budgets, the five years have seen an uptick in major security breaches. Companies – and even cons...

Lordfenix: 20-year-old Brazilian has written 100 banking trojan

Shared by Vircom Inc.

securityaffairs.co - Security experts at Trend Micro have identified a 20-year-old Brazilian student which has developed and distributed more than 100 Banking malware. The young cyber criminal, which used the pseudonym...

Source Code for KINS Malware Toolkit Leaked Online

Shared by NGenCode

securityweek.com - The source code for version 2.0.0.0 of a toolkit for the banking Trojan known as KINS was leaked last month, researchers revealed on Sunday. According to the MalwareMustDie research group, which le...

eHealth’s not secure enough

Shared by A.T.O.M

ehna.org - Cyber-security concerns have become high profile themes over the last few years. A report on performance by Veracode, a firm that deals with app security, says for authentication protocols, "80 per...

Nears One Year Anniversary, Porter Airlines Fined $150K

informationsecuritybuzz.com - Canada’s Anti-Spam Legislation (CASL) is about to mark its one year anniversary since going into effect. The law has worked to limit the amount of spam coming into Canada and this week, we see anot...

Voor deze vormen van cybercrime moet u oppassen - Elsevier.nl

Shared by Pim Brussee

elsevier.nl - Wat? Identiteitsdiefstal: anderen maken op internet misbruik van uw persoonsgegevens Slachtoffers? Consumenten Hoe? Allereerst kunnen daders onder andermans naam lasterlijke uitspraken doen op soci...

Banks not liable in most vishing fraud, says Ombudsman - BBC News

Shared by Edwin Jacobs

bbc.com - People who are the victims of so-called "vishing" scams cannot always rely on their bank to compensate them, a study has suggested. In nearly two-thirds of cases the Financial Ombudsman Service (FO...

Security Expert Comments on U.S. Healthcare 'Stegoloader' Malware

informationsecuritybuzz.com - Carmine Clementelli of PFU, a Fujitsu company, commented this afternoon on a new report from Trend Micro that North American healthcare organizations appear to be getting hit the hardest by the Ste...

The Best Defence Against Targeted Threats

informationsecuritybuzz.com - Hackers’ increasing sophistication means perimeter security is failing. Organisations must switch tactics and turn to tools which can stop intruders once they’re inside the network, argues Tufin’s ...

$38 an hour is the cost of destructive DDos Attacks

securityaffairs.co - Incapsula revealed in its annual Report of DDoS Threat-Landscape that there are two  main offender archetypes responsible for the DDoS perpetrators, first being none other than professional crimina...

Mobile App Security – Emerging Threat Landscape

informationsecuritybuzz.com - Mobile apps have been increasingly gaining ground in the communication industry. Enterprises are rapidly adopting innovative mobile applications to transform their business capabilities as the mobi...

MERS News Used in Targeted Attack against Japanese Media Company

blog.trendmicro.com - Attackers used news of the Middle East Respiratory Syndrome (MERS) outbreak as hook in a spear-phishing email sent to an employee of a popular Japanese mass media company. Using a free account from...

Cybercrime and How It Affects You – markITwrite

markitwrite.com - When you buy a new car, you expect it to come with 3-5 doors that all lock securely. Each time before you walk away from your vehicle, you will lock those doors, and, the sensible among you will ac...

Ponemon Institute, quali sono i costi di una violazione di dati? | Tech Economy

techeconomy.it - Ogni anno il Ponemon Institute pubblica una studio relativo al costo affrontato dalle organizzazioni a seguito di una violazione dei dati. Lo studio è tra i più interessanti nel suo genere e approc...

Police 'Skimming The Surface' On Cybercrime

Shared by Northern Cell

news.sky.com - Police are just "skimming the surface" in their efforts to tackle cybercrime, according to Britain's most senior policeman. In an interview hosted by Sky News with six young people from children's ...

Animal Farm Adds Dino Trojan to Menagerie

Shared by Shupel Ichaka

infosecurity-magazine.com - The Animal Farm, an espionage group believed to be part of a French intelligence agency, has added to its zoo of tools with Dino, a backdoor espionage Trojan that uses complex methods to execute co...

Hacked Routers exploited to serve the Dyre banking trojan

Shared by asciiwarrior

securityaffairs.co - According to the popular security expert Brian Krebs, criminals are exploiting a new technique to spread the Dyre banking malware, they are leveraging hacked wireless routers. Dyre is usually downl...

What is the Dark Web and Why is it so popular?

Shared by charlie

securityaffairs.co - Let’s begin by explaining what the so called “Dark Web” actually is. This is a term used to describe a collection of websites that may be publicly visible, but they hide information like the IP add...

4 Cybercrime Prevention Tips - markITwrite

Shared by paul wickers

markitwrite.com - Cyber-criminals are like most human beings; they want an easy life. Easy money, or an easy path to their objectives. So, the best you can do to frustrate them is to make their job (and their life) ...

New Espionage Malware from Animal Farm

informationsecuritybuzz.com - ESET offers the first analysis of the latest cyber-espionage threat from the group responsible for Babar and Bunny ESET®, a global pioneer in IT security for more than two decades, has today publis...

Malware as a service – cyber crime’s new industry | ITProPortal.com

Shared by Empiric Cyber

itproportal.com - Organised criminal gangs (OCGs) are increasingly using software services of the type more usually associated with legitimate corporations to grow their operations. By offering ‘malware as a service...

11 Countries with the Highest Rates of Identity Theft in the World

insidermonkey.com - In 11 countries with the highest rates of identity theft in the world, this crime has become rampant. Developed countries has been facing this problem for some time now, but as other countries deve...

TorrentLocker Surges in the UK, More Social Engineering Lures Seen

Shared by CliffSull

blog.trendmicro.com - We’ve noticed a recent increase in TorrentLocker-related emails being sent to users in several countries, particularly the United Kingdom and Turkey. From the latter half of May until June 10, ther...

The 5 Critical Elements for Successful Compliance Change

informationsecuritybuzz.com - Corporate lifecycles are shrinking. The way to sustain a company is to constantly innovate and evolve. Change is therefore inevitable, if not essential. As I wrote in a recent blog, changing everyd...

Reveals 22 Percent Rise in Pirated Software and Digital Media Releases

informationsecuritybuzz.com - Mobile Gaming Applications Hit Hardest, With Close to 2 Million Unauthorised Releases Expected in 2015 Arxan Technologies, the leading provider of application protection solutions, today announced ...

Malware Must Die!: MMD-0036-2015 - KINS (or ZeusVM) v2.0.0.0 tookit (builder & panel source code) leaked.

blog.malwaremustdie.org - KINS (or ZeusVM to be precised) v2.0.0.0 tookit (builder & panel source code) was leaked and spread in all over the internet. On Jun 26th 2015 we were informed (thank you Xylit0l) about this and af...

(Video) Will IOT impact your SME - www.rniconsulting.com.au

Shared by Roger Smith

rniconsulting.com.au - Hello. My name is Roger and today I’d like to talk to you about will the Internet of Things (IoT) have an impact on your small business? Internet of Things is a new technology that’s coming out and...

Ushers in The Era of the Programmable Enterprise

informationsecuritybuzz.com - New Virtual f(n) Delivers Router and Firewall Capabilities Entirely in Software Masergy Communications Inc., a global leader in secure networking and cloud services, today announced Virtual f(n), i...

TRACE concept to deliver holistic enterprise security

networksasia.net - As cyber-attacks become more sophisticated, harder to detect, and are able to bypass traditional security tools, it is a necessity that enterprises today assess their overall security strategy, whi...

Wirtschaftsspionage: Unternehmen schützen sich zu wenig vor der NSA

Shared by PSW GROUP

faz.net - Der amerikanische Geheimdienst NSA interessiert sich längst nicht nur für Angela Merkel. Die jüngsten Enthüllungen der Internetplattform Wikileaks belegen: Auch Wirtschaftsthemen stehen bei den Spä...

A move towards cyber resilience in a world without borders

networksasia.net - Earlier this year during the Cyber Security Agency launch, Minister for Communications and InformationYaacob Ibrahim said “significant breaches continue to make headlines around the world, as such ...

Hurricane Season: Electronic Protection Tips

informationsecuritybuzz.com - June 1st marked the start of hurricane season and tropical storms are top of mind for companies in prime locations. Taking preventative measures that businesses can take to protect important data i...

(Video) How playing a game can improve your DR - www.rniconsulting.com.au

rniconsulting.com.au - Hi. My name is Roger. Today I’d like to talk to you about how playing a game can improve your disaster recovery. Disaster recovery is understanding what your business is going to do when everything...

Britain is paying the price of cybercrime | Information Age

information-age.com - The Centre for Economics and Business Research estimates that cybercrime costs British businesses £34 billion per year, including £18 billion from lost revenue The past few years have seen a stagge...

Surveillance Software Firm Hacking Team Suffers Data Breach

securityweek.com - Hacking Team, a controversial Italy-based company that develops and sells surveillance technology to governments worldwide, has been breached. The attackers have leaked hundreds of gigabytes of sen...

Network Security Solutions For Your Business

Shared by CoranetCorp

coranet.com - SPOTLIGHT ON CYBERCRIME -- A Growing Threat to Your Business Welcome again to Straight Talk, one of the ways Coranet shares perspectives on important issues and opportunities in network installatio...

Violato l'Hacking Team italiano che aiutava lo spionaggio dei governi - Data Manager Online

datamanager.it - Il gruppo che favoriva le incursioni digitali dei governi con i loro software sarebbe stato hackerato qualche ora fa Noi li conoscevamo soprattutto perché italiani ma l’hacking team ha più di un mo...

What is the True Cost of a Data Breach?

infosecurity-magazine.com - Laurance Dine explains Verizon’s assessment model for gauging the financial impact of a security breach The motives for cyber-attacks still remain varied. Attackers may be looking for payment card ...

Malware Abuses Android Accessibility Feature to Steal Data

Shared by SenseCy

securityweek.com - Researchers at mobile security firm Lookout have come across a piece of malware that abuses the accessibility service in Android to steal sensitive data from infected smartphones. The threat, detec...

L’evoluzione del Ransomware - BlackBerry4Business

blackberry4business.it - Il ransomware è una tipologia di malware che infetta i computer in modo impercettibile, criptando i file con una chiave asimmetrica e rendendoli inaccessibili. Dopo aver terminato la fase di infezi...

Dude Founds Flaw in World's Biggest Gambling Site, Steals $1M in Bitcoin

Shared by SenseCy

hackread.com - An online gaming/gambling site lost $1 million in bitcoin to an attacker who exploited its random number generation (RNG) system. A leading and apparently the biggest online gambling website Primed...

Getting the best firewall product for your business

Shared by Roger Smith

rniconsulting.com.au - Recommending products to clients is always a tricky proposition.  When most of us hear someone suggest we spend a lot of our own money, we tend to think, “that’s easy for you to say.”  That’s doubl...

Europol Arrests Gang Behind Zeus And SpyEye Banking Malware

Shared by Empiric Cyber

thehackernews.com - The Law enforcement agencies from six different European countries have taken down a major Ukrainian-based cyber criminals gang suspected of developing, distributing and deploying Zeus and SpyEye b...

$400-B lost annually to global cyber crime

philstar.com - MANILA, Philippines - Global cybercrime is costing the world economy over $400 billion yearly, according to Standard & Poor’s Ratings Services (S&P). Cyber risk has emerged as a pivotal concern for...

Password Management Software And Driver Management Software Are Critical

Shared by John Cosstick

identity-theft-scout.com - Password management software, for strong passwords, and driver management software, for up to date software drivers are essential for cyber security. Here we are looking at how to lock the cyber cr...

Cyberspace : A Fast-growing Area of Crime - InfoSec Institute

Shared by CyberSecIntel

resources.infosecinstitute.com - Caught in a growing Internet community, many users have already seen the downside of being dependent on the web for many daily activities. Many may have been victim to a virus or Trojan; this malic...

The FBI is offering $4.3m for the world's most notorious cyber criminals

Shared by Eric Bellamy

digitaltrends.com - The FBI has updated its cyber-crime most wanted list with $4.3m in rewards for the capture of a number of notorious cybercriminals, and they’re particularly interested in one Russian hacker – Evgen...

(Video) What is the cloud? - www.rniconsulting.com.au

Shared by Roger Smith

rniconsulting.com.au - Hi. My name is Roger and today I would just like to do a brief synopsis of what the cloud is and why we are using the cloud. Well the cloud we are using nowadays has a number of reasons. 1) It’s in...

CAK new regulations to require registration for use of public Wi-Fi - TechTrendsKE

techtrendske.co.ke - The Communications Authority of Kenya (CAK) is drafting regulations that will soon require anyone accessing wireless Internet (Wi-Fi) through public hot spots to log in using their personal details...

Protect Your Business Data by Training Your Staff

Shared by James Bull

itsupport365.co.uk - But with so many spam emails being automatically spotted and marked as dangerous, it’s easy to let your guard down when a malicious message slips through the net, dropping into your inbox and looki...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more →