The Cybercrime Herald

#cybercrime

Hackers steal millions of Minecraft passwords - BBC News

bbc.com - Hackers have stolen login data for more than seven million members of the Minecraft site Lifeboat. Lifeboat lets members run servers for customised, multiplayer maps for the smartphone edition of M...

Did you notice, preventing cyber crime too went cyber?

pakistantoday.com.pk - The Cybercrime Bill NA passed should get more attention than it currently has Since Panama Papers dawned upon us, all the political animals, regardless of age, sex, place, occupation, creed or comp...

Top web hacking techniques of 2015

Shared by NGenCode

techworm.net - Yesterday we brought out the list of top 6 password cracking techniques used by hackers and cyber criminals. In continuation of the same series we today bring out the 10 top hacking techniques used...

Crypto-Ransomware „Locky“ umgeht Sandbox-Technologien

secure-one.de - Die Hintermänner der Erpressersoftware „Locky“ haben die Tarnmechanismen ihres Computerschädlings erweitert. Der japanische IT-Sicherheitsanbieter Trend Micro hat eine neue Variante entdeckt, die z...

Cyber crime: The rise of the digital mafia - Al Jazeera English

aljazeera.com - Cyber theft has long replaced the 'traditional' concept of bank robberies. A much more sophisticated method of attack that has been in use for years has accelerated of late as a slew of hacks acros...

Bangladesh Bank heist gang used a malware and could strike again

securityaffairs.co - In March 2016, unknown hackers have stolen more than $100 million from the Bangladesh Bank account at the US Federal Reserve Bank. The experts confirmed that hackers breached the systems at the Ban...

Tackle Cyber Crime Using Hi-tech: Deputy CM - The New Indian Express

newindianexpress.com - VIJAYAWADA:  Expressing concern over the rise in cyber crimes, Deputy Chief Minister and Home Minister Nimmakayala China Rajappa exhorted the public prosecutors (PP) to use latest technology in gat...

Los menores son víctimas de uno de cada cuatro delitos informáticos investigados

Shared by Karina

laopiniondezamora.es - SUSANA ARIZAGA La protección a los menores de edad en Internet es "la máxima prioridad" para la Policía Nacional, que ha constatado que el 25% de los delitos denunciados e investigados afectan a es...

What the Tech: Cybercrime Black Market

texomashomepage.com - The place hackers go to buy stolen information is slashing prices. Dell SecureWorks which keeps tabs on the cyber crime black market, reports that stolen credit card numbers, counterfeit passports ...

Screen overlay malware on the rise as bot scum battle for dominance

Shared by wu zhou

theregister.co.uk - IBM malware murderer Limor Kessem says Android VXers are using legitimate screen overlay features to hose handsets. Screen overlays do what it says on the can: applications with appropriate permiss...

B.C. can't find hard drive containing 3.4M records, including many sensitive details

ctvnews.ca - British Columbia’s Ministry of Education has “misplaced” a hard drive containing records on 3.4 million people, including sensitive information on students, teachers and children who were in provin...

Key Findings from Symantec’s 2016 Internet Security Threat Report

Shared by Pat Mack

brighttalk.com - Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec Are you concerned about securing your users and data in cloud based collaboration applica...

Journalist Matthew Keys gets 2-Year Prison term for helping Anonymous Hackers

thehackernews.com - Former Reuters journalist Matthew Keys, who was convicted last year of helping the Anonymous group of hackers, has been sentenced to 24 months in prison for computer hacking charges. Keys was found...

Creators of SpyEye Trojan Aleksandr Panin, Hamza Bendelladj Sentenced

hackread.com - Malicious Banking Trojan SpyEye’s developer Aleksandr Panin has received a sentence of 9 and 1/2years in jail for creating a malicious banking Trojan that helped malicious actors drain millions fro...

What makes ATM machines easy to hack? | ITProPortal.com

Shared by Red B.

itproportal.com - Security researchers claim ATM machines are usually not that difficult for hackers to penetrate. Once they’re inside, they can steal money, or banking details from unsuspecting victims. Now, resear...

The Internet of Things and cybercrime

gamingtechlaw.com - The Internet of Things is expected to lead to 50 billion connected devices by 2020 collecting and exchanging personal data about their users, their lives, their preferences and tastes.  This will l...

NAMORONG REPORT: What #PNG needs to know about the O'Neill Regime's Secret Cybercrime laws

namorong.blogspot.com - The lack of Public Consultations with civil society stakeholders like myself raises serious questions about the intent and purpose of proposed regulation of the internet. The O'Neill government has...

Small Business IT Security: Save Money, Save Face

biztechmagazine.com - As a security analyst and licensed private investigator, I have often performed computer forensics work in the aftermath of a security breach. The work provides up-close-and-personal views of the m...

The ABC of APT

Shared by Deep Instinct

blog.deepinstinct.com - THIS WEBSITE, www.Deep Instinct.com (the “Site”), is owned and operated by Deep Instinct Ltd. (“Deep Instinct”, “we”, “us” or “our”). Any use of this Site or the services available on the site from...

Why Google is warning that ‘google.com’ is ‘partially dangerous’

washingtonpost.com - A screenshot of the the Google Safe Browsing Site Status page for "google.com" on Tuesday morning. (Google.com) Google is warning you to watch out for, well, Google. As of Tuesday morning, the sear...

Google Play infested with cash-stealing web apps

Shared by Mahmoud Samy

theregister.co.uk - Security researcher Joshua Shilko says phishing apps targeting some of the world's biggest payment services have slipped past screening and landed on Google Play. Shilko says he's aware of 11 well-...

Your identity is for sale – how much do you think it’s worth?

Shared by JohnJoyce

gbgplc.com - A post by Karyn Bright, Group Marketing Director at GBG. Dell have recently released their SecureWorks Underground Hacker Markets Annual Report 2016, revealing the going prices for cybercrime goods...

How prepared is air cargo for a cyber attack?

Shared by Thelma Etim

aircargoeye.com - WHILST the benefits of customers being able to book, keep track and monitor the transit of their cargo shipments around the world are numerous, the technology utilised to achieve this visibility an...

Dutch police seize the Ennetcom encrypted communication network

securityaffairs.co - Another success of the Dutch law enforcement against the cybercrime. The police arrested the owner of Ennetcom, a provider of encrypted communications with more than 19,000 customers. Prosecutors s...

Qatar National Bank says systems 'secure' after hack attack

Shared by Gulf-Times

gulf-times.com - Qatar National Bank said on Sunday that its systems were ‘fully secure’ following a cyber attack which potentially exposed the names and passwords of tens of thousands of customers. In a statement ...

Hackers don't just want your credit cards, now they want the pattern of your life | ZDNet

zdnet.com - While underground forum users and other crooks are still very much interested in stolen credit card numbers, they're also increasingly keen to trade in another type of information: personal data. R...

Unmasking cyber criminals: research unveils six cybercriminal personalities

itbrief.com.au - New research from BAE Systems has unveiled the six different cyber criminal personalities that represent the biggest threats to Australian businesses.  The company said it has released the research...

PLATINUM Hackers Hijack Windows Hotpatching to Stay Hidden

thehackernews.com - In Brief The Microsoft’s Windows Defender Advanced Threat Hunting team detected that a cyber espionage group of hackers, known as PLATINUM, has found a way to turn the Windows's Hotpatching techniq...

Bracing your browser: how to keep the fraudsters at bay

Shared by F5NetworksME

scmagazineuk.com - Whether through loss of financial assets or damage to an organisation's brand, online fraud is becoming more of a problem and has the capacity to significantly and negatively impact a business, say...

Tips for protecting hospitals from ransomware as cyberattacks surge

Shared by Roger Smith

healthcareitnews.com - One of the last things a healthcare CIO, CISO or CEO wants is to learn is that their organization has been victim to ransomware, like in the high-profile attacks that recently crippled Hollywood Pr...

Ransomware: What You Need to Know to Safeguard Your Data

Shared by Inder Barara

technologyevaneglist.wordpress.com - Recently, one of the extreme cases took place extracting ransom took place in February When Hollywood Presbyterian Medical Centre revealed that it paid 40 Bitcoins i.e. almost $17,000 in ransom to ...

The steps of a cyber criminal - Sera-Brynn

Shared by Sera Brynn

sera-brynn.com - Some cyber crime requires criminals to have high-level information security and technology skills to achieve the goal of a full data breach. In a world of virtual reality where it seems the sky’s t...

Understanding high Mpps DDoS attacks • /r/netsec

reddit.com - A community for technical news and discussion of information security and closely related topics. Always link to the original source. Titles should provide context. Content should focus on the "how...

These Hackers Have Your Back

atlanticcouncil.org - The Food and Drug Administration has begun a push for good-faith hacking in order to anticipate and address cyber security issues, particularly in the realm of medical devices, according to a senio...

The ransomware that knows where you live - BBC News

Shared by wu zhou

bbc.com - A widely distributed scam email that quoted people's postal addresses links to a dangerous form of ransomware, according to a security researcher. Andrew Brandt, of US firm Blue Coat, contacted the...

Business warned as survey finds rise in Irish cybercrime outstrips average

irishtimes.com - Whether they’re investing in security cameras, expensive alarm systems or personnel to patrol buildings, most firms see spending on crime prevention as a worthwhile investment that helps protect th...

How Analysts Can Deep Dive Into CVE Vulnerabilities

Shared by Social BuZz

recordedfuture.com - Patch management is a crucial part of information security, but the volume of patches can be difficult to manage. Many vulnerability managers need to oversee hundreds or even thousands of devices a...

Hackers scam homebuyers by pretending to be real estate agents

wkrn.com - CHICOPEE, Mass. (WWLP) – The Federal Trade Commission says criminals are hacking into email accounts and stealing money from people buying new homes. If you’re planning on buying a new home, you mi...

How One Cybercrime Gang Is Ratcheting Up PoS Attacks

Shared by Roger Smith

darkreading.com - Cybercriminals are doubling down their attacks on US point-of-sale systems (PoS) still using magnetic-stripe card transactions as the window for exploiting those weaker systems gradually closes. On...

Cybersecurity: Fighting the wrong battle with the wrong weapons

itbrief.com.au - The technology industry is going about cybercrime the wrong way, according to Nuix senior VP Chris Pogue.  In a new whitepaper, Pogue says the cyber security industry has been “fighting the wrong b...

Crooks abuse Facebook app platform for phishing attacks

securityaffairs.co - Security researchers at Netcraft spotted a new insidious phishing campaign that leveraged Facebook’s own trusted TLS certificate that is valid for all facebook.com subdomains. The phishing page is ...

Tech Support Scams: How you get trapped? - Website Vidya

Shared by Gary Kelly

websitevidya.com - Tech Support Scams: How you get trapped? Information technology has emerged so much that we rely so much on it. It has eased our life so much that we even shop online for clothing, movie tickets, a...

(Video) How to prove your Cybersecurity is working -

Shared by Roger Smith

rniconsulting.com.au - Roger Smith, CEO at R & I ICT Consulting Services Pty Ltd and Amazon #1 author on Cybercrime discusses why you need to prove your cybersecurity and digital security. Hi. Today I’d like to talk to y...

AfD-Parteitag: Hacker veröffentlichen Liste aller AfD-Parteitagsteilnehmer

Shared by SECbuddy

zeit.de - Die AfD wurde offensichtlich Opfer eines Hackerangriffs. Die Plattform Indymedia – die sich auf ihrer Internetseite als dezentrales, organisiertes, weltweites Netzwerk sozialer Bewegungen beschreib...

4 Cybercrime Prevention Tips - markITwrite

Shared by Brian Johnson

markitwrite.com - Cyber-criminals are like most human beings; they want an easy life. Easy money, or an easy path to their objectives. So, the best you can do to frustrate them is to make their job (and their life) ...

Businesses pay $100k to alleged Armada Collective to avoid DDoS

securityaffairs.co - A criminal organization made $100,000 from a number of businesses across the globe my threatening them of distributed denial-of-service (DDoS) attack. The criminals requested to the victims the pay...

Victims paid more than $24 million to ransomware criminals in 2015 — and that's just the beginning

finance.yahoo.com - Ransomware is a type of computer virus that scrambles its victim's files and demands a ransom in exchange for the code to restore them. The threat has become prominent in recent years as schools, h...

Calling the SWAT team on your neighbor could soon carry a 20-year prison sentence

Shared by Bradley Shear

washingtonpost.com - (Kiyoshi Ota/Bloomberg) A potentially lethal form of prank-calling could soon be banned  with stiffer penalties, under a piece of legislation that just passed a crucial vote in Congress. The bill t...

Hackers’ $81 Million Sneak Attack on World Banking

Shared by Bigcoin Me

nytimes.com - “The trend is moving from opportunistic crime to Hollywood-scale attacks,” said Mr. Nish, whose firm has analyzed the malware believed to have been used in the Bangladesh breach. In the United Stat...

FIN6 Cyber-crime Ring Steals Millions of Credit Cards

Shared by Lance Edelman

eweek.com -     FIN6 Cyber-crime Ring Steals Millions of Credit Cards     By Sean Michael Kerner  |  Posted 2016-04-22 Print             A FireEye report discloses the activities of a financial hacking group t...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →