The Cybercrime Herald

#cybercrime

Preparing for the Global Era of Cybercrime

securityintelligence.com - Rick Robinson is a writer and blogger, with a current 'day job' focus on the tech industry and a particular interest in the interplay of tech-driven factors and business... Computer crime is going ...

Associated Press sues FBI for impersonating its site to install spyware

Shared by Brook Conner

theregister.co.uk - The Associated Press is suing the FBI over allegations government agents used a fake news story to plant malware on the PCs of suspected criminals. The news agency, along with the Reports Committee...

Uber Hires Two Engineers Who Showed Cars Could Be Hacked - NYTimes.com

nytimes.com - Uber is continuing its hiring spree of top technical talent by recruiting two respected computer security engineers, Charlie Miller and Chris Valasek. Mr. Miller and Mr. Valasek will work in Uber’s...

Detoxransome the “Hacker”

Shared by Hakin9

informationsecuritybuzz.com - On July 24th 2015, Detoxransome tried to blackmail Bitdefender in exchange of a portion of their customer base. He threatened the company to leak the data he stole if he doesn’t receive the payment...

Thousands of WordPress sites host Neutrino Exploit Kit

Shared by CTIN

securityaffairs.co - According to the experts at the Zscaler security firm, cybercriminals have compromised more than 2,600 WordPress websites over the past month and deployed malicious iframes on 4,200 distinct pages....

Demystifying Threat Intelligence

Shared by Dave Trader

infosecurity-magazine.com - ‘Threat intelligence’ could be the answer to defeating dangerous cyber-threats. But what does it really mean? asks Adam Schoeman Threat intelligence’ has become a catchall term for a vast array of ...

Trend Micro and Booz Allen Take the Offensive on Cybersecurity -

blog.trendmicro.com - Organizations today hold a massive amount of highly sensitive information that is being targeted for cybercrime, corporate espionage and beyond. In this era of highly sophisticated attacks by well-...

Domain Mondo | domainmondo.com: Goldman Sachs Offices, Shenzhen, China: REAL and FAKE (video)

Shared by expVC

domainmondo.com - The REAL Goldman Sachs Office Location in Shenzhen, CHINA:  Beijing Gao Hua Securities Company Limited 1 Zhong Xin Si Road Suites 1602-1603A, 16th floor Kerry Plaza, Tower One Futian District Shenz...

4 Cybercrime Prevention Tips - markITwrite

Shared by Zynap Ltd

markitwrite.com - Cyber-criminals are like most human beings; they want an easy life. Easy money, or an easy path to their objectives. So, the best you can do to frustrate them is to make their job (and their life) ...

The Top Five Cybersecurity Vulnerabilities for Businesses | Hacked

Shared by Jabba le Hutt

hacked.com - Cyber crime is the biggest threat that any major financial or governmental organization face in today’s world. This form of crime is not physical, but ramifications of it are far more severe and gh...

Should You Worry About State-Sponsored Cybercrime? - Cryptzone Insight

Shared by Andrew Duplin

insight.cryptzone.com - If there’s one thing recent cyberattacks on compromised government personnel data should have taught us, it’s that state-sponsored cybercrime is far more than just a bogeyman story made up to frigh...

The relentless ascent of DDoS attacks

Shared by CTIN

securityaffairs.co - There has been a multiplying growth in the quantity of DDoS assaults year over year, as per Akamai. Keeping in mind assailants’ planer preferred less capable yet more length of time attacks this qu...

EUR-Lex - l14560 - EN - EUR-Lex

Shared by Esa Sorjonen

eur-lex.europa.eu - Towards a general policy on the fight against cybercrime As the internet has become part of our everyday lives, so too the internet user has become vulnerable to criminals often operating on other ...

Be aware enterprises, it’s time to block Tor network

securityaffairs.co - With the increase of Tor-based attacks, something needs to change, and IBM is advising companies to start blocking Tor. A research conducted by the IBM X-Force team reveals that SQL injection, dist...

Il est temps de prendre la mesure de l'impact du cybercrime !

journaldunet.com - Le site de rencontres extraconjugales Ashley Madison vient de subir un piratage massif de sa base de données. Une actualité qui, une fois de plus, nous rappelle le rôle central que peut jouer la sé...

Hackers revive Word macro malware in AutoIT RAT attack

Shared by Cris Galan

scmagazineuk.com - Hackers have launched phishing attacks on organisations using legitimate automated management tools, according to Cisco. In a blog post by Cisco's Talos security group, criminals have been discover...

Campanhas Malvertising Aumentam 325 por Cento

Shared by Camilla Lemke

under-linux.org - A Cyphort investigou as práticas utilizadas pelos criminosos virtuais, para injetar anúncios maliciosos em legítimas redes de publicidade online. Os pesquisadores descobriram que as campanhas de Ma...

FBI warns that Business Email Scams are raising

Shared by Mark Priess

securityaffairs.co - Yesterday the FBI warned the world that Business Email Scams (BEC) victims are growing, making companies losing money. The law enforcement highlights that frauds use to start with crooks spoofing c...

For second year, Maharashtra a cyber crime hotspot - The Times of India

timesofindia.indiatimes.com - PUNE: Maharashtra reported the highest number of cyber crimes in the country in 2014 for the second year in a row. The recent National Crime Records Bureau (NCRB) data has revealed that cyber crime...

Warning! How Hackers Could Hijack Your Facebook Fan Page With This Trick

Shared by Jabba le Hutt

thehackernews.com - Facebook bounty hunter Laxman Muthiyah from India has recently discovered his third bug of this year in the widely popular social network website that just made a new record by touching 1 Billion u...

Terror Goes Cyber: Capabilities of Boko Haram

batblue.com - Boko Haram is an Islamist militant group that aims to establish a fully Islamic state in Nigeria. The group was loyal to Al Qaeda until 2015, when it declared allegiance to ISIS. Since then, the gr...

BitTorrent Fixes Reflective DDoS Attack Security Flaw

thehackernews.com - Two weeks ago, we reported how a serious flaw in the popular peer-to-peer BitTorrent file sharing protocols could be exploited to carry out a devastating distributed denial of service (DDoS) attack...

Getting tough on cybercrime | Security, data and privacy | Subject areas | Publishing and editorial

Shared by Neira Jones

bcs.org - Charlotte Walker-Osborn, Commercial Partner and TMT Sector Head, and Ben McLeod, Commercial Solicitor, both of Eversheds LLP, discuss the recent toughening of cybercrime legislation in the UK throu...

UK Police Detail DDoS-for-Hire Arrests

Shared by Neira Jones

bankinfosecurity.com - British police have arrested four teenagers on charges that they used "Lizard Stresser," a distributed denial-of-service tool, to disrupt multiple websites. See Also: Tackling Cloud Infrastructure ...

Large Enterprises : "Automate or Suffer the Consequences"

informationsecuritybuzz.com - The Nexus of Forces has introduced a Nexus of Menace, and security pros must face it head on with automation. Large enterprises have a lot of systems to secure. Some are decrepit legacy ancients op...

Legal Firms Turning the Tide on Cybercrime

Shared by iBridge LLC

ibridgellc.com - With cybercrime-related problems showing no signs of stopping, whether legal firms will be affected moves from if into the realm of when. Nobody expects that he or she will become a victim of cyber...

Xkeyscore: the secret Germany’s deal with the NSA

securityaffairs.co - The German weekly Die Zeit disclosed documents that reveal how the German Intelligence did a deal with the NSA to get the access to the surveillance platform XKeyscore. Internal documents show that...

A rare detailed look inside the IRS’s massive data breach, via a security expert who was a victim

qz.com - Michael Kasper thought he was ahead of the game when he sat down to do his taxes this year. It was a Friday in February, more than two months before the mid-April filing deadline, and snow still co...

Fortune 5: The biggest organized crime groups in the world

fortune.com - It’s tough to go even a few months without seeing the effects of organized crime on the economy and everyday life. The most salient example these days is the rash of thefts of credit card data from...

iPhone and Android accessory can help thieves steal your PIN code at ATMs

Shared by Pinkerton

ibtimes.co.uk - An iPhone accessory that costs less than £200 can be used to easily steal your PIN code up to a minute after you have left a cash machine, according to UK security researchers. The method of obtain...

The Pursuit of Cybersecurity - Deloitte CFO - WSJ

Shared by MIR3, Inc.

deloitte.wsj.com - CFOs in North America view cyberattacks as a serious threat, but many have doubts about their organization’s level of preparedness, according to findings from Deloitte’s Q2 2015 CFO Signals™ survey...

Report Phishing costs average organization 3.7 million per year

scmagazine.com - The extrapolated total annual cost of phishing for the average organization is more than $3.7 million, a number that could be shaved down by $1.8 million with the right training, according to findi...

Email Hacking - Is your business at risk? - Jumble.io

Shared by Jon Law

blog.jumble.io - Business Email hacking is on the rise. What are the chances of your business’s emails getting hacked? Due to increases in cyber crime and regulation businesses, now more than ever, need to secure t...

Israeli charged in Overstock.com computer attack

tucson.com - SALT LAKE CITY — Federal prosecutors have charged an Israeli man they say tried to hack into the servers at Overstock.com, causing an estimated $450,000 in damage. Kirill Alekseyevich Chudinov is a...

FBI: Social Engineering, Hacks Lead to Millions Lost to Wire Fraud

threatpost.com - U.S. businesses are losing millions in fraudulent wire transfers that have their root in email compromises of accounts belonging to top executives. An FBI advisory issued Thursday warns businesses ...

Ashley Madison Scams: Extremely Convincing and Dangerous

hotforsecurity.com - 37 million people were registered to online dating site Ashley Madison before it got hacked. Intimate details about millions of users were exposed to the world. Embarrassment, million-dollar lawsui...

China Beefs Up Anti-cybercrime Campaign; 300 Websites Deleted and 1.15 Million Accounts Closed

Shared by iGloobe.info

en.yibada.com - Men surf the Internet using their laptops and smartphone. (Photo : Reuters) China's State Internet Information Office has declared that they have seen outstanding results during their six-month cam...

Michigan’s Catholic workers are latest cyber victims

freep.com - A Catholic agency in Lansing that handles payroll processing and employee benefits across Michigan is the state’s latest victim of a major cyber attack . The Michigan Catholic Conference sent lette...

The WhatsApp of Wall Street

net-security.org - by Cathal McDaid - Head of the Threat Intelligence Unit at AdaptiveMobile - Friday, 28 August 2015. On August 21, a pump and dump penny stock scam targeting US users, and spread using WhatsApp, dro...

Password Management Software And Driver Management Software Are Critical

Shared by John Cosstick

identity-theft-scout.com - Password management software, for strong passwords, and driver management software, for up to date software drivers are essential for cyber security. Here we are looking at how to lock the cyber cr...

A Sophisticated Gmail Phishing Scam Is Linked to Iranian Hackers

blog.lifars.com - Iranian hackers are actively trying ways to circumvent Gmail’s two-step verification system and infiltrate Gmail, with their targets being political dissidents and activists. According to a new rep...

(Video) Using Cyber security as your USP - SME Security Framework

Shared by Roger Smith

smesecurityframework.com.au - Hi. My name is Roger. Today I’d like to talk to you about using security as your unique selling proposition or your USP. Most people used to say their unique selling point is something to do with t...

IRS hack: What to do when your Social Security number is exposed

latimes.com - Consumers are prodded to reset online passwords after they’re leaked in a cyberattack. But what to do when a Social Security number becomes public? This week’s revelation that fraudsters accessed a...

iTWire - Kaspersky catches the phishes

Shared by Joe Boulis

itwire.com - The AV-Comparatives test assessed the anti-phishing protection offered by 10 security products from different vendors in a simulation that replicated typical web browsing conditions. During the tes...

Ashley Madison founder and chief executive Noel Biderman quits following hack - Telegraph

telegraph.co.uk - It comes after a hacker group named The Impact Team stole the personal details of 37m Ashley Madison clients - including 1.2m Britons - and posted them online. Victims allegedly included 124 civil ...

9 People Accused In $30 Million Hacking And Insider-Trading Scheme

npr.org - Federal authorities have charged nine people in connection with an elaborate trading scheme involving hackers from Ukraine and securities traders in the U.S. that generated more than $30 million in...

List of computer criminals - Wikipedia, the free encyclopedia

Shared by John Cosstick

en.wikipedia.org - Convicted computer criminals are people who are caught and convicted of computer crimes such as breaking into computers or computer networks.[1] Computer crime can be broadly defined as criminal ac...

How to Combat the Global Cybercrime Wave (Op-Ed)

livescience.com - Dmitri Alperovitch is a computer security researcher and co-founder & CTO of CrowdStrike Inc., which provides cloud-based endpoint protection. With expertise incybersecurity technology, policies an...

Ashley Madison CEO Resigns in Wake of Hack, News of Affairs

Shared by Dawn Kristy

wired.com - It’s been a month since news first broke that cheating site Ashley Madison was hacked. During that time Noel Biderman, CEO of the site’s parent company Avid Life Media, has remained confident in hi...

Reality Check: Cyber Liability for PEOs

assuranceagency.com - You can’t escape it. Cyber-attacks are everywhere from Sony Pictures to Target to the 50-employee company in suburban Chicago. So what does this have to do with PEOs? In reality, no company is safe...

This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →