The Cybercrime Herald

#cybercrime

How to keep a business safe from cybercrime | ANZ BlueNotes

Shared by BlueNotes

bluenotes.anz.com - Not a day passes now without us being reminded digital technology can be both friend and foe. Cloud computing, centralisation of IT resources and greater connectivity are just some of the developme...

Android Linux Security Flaw Impacts Billions | PYMNTS.com

Shared by 99 BarbWire

pymnts.com - A flaw that was previously discovered in the Android operating system’s Linux kernel is now believed to impact four in five devices, an estimated 1.4 billion Android devices. The vulnerability allo...

How artificial intelligence is aiding the fight against cybercrime | Information Age

information-age.com - Instances of reported cybercrime are growing astronomically – and yet many successful attacks are still not reported, or even detected. In response to the escalating threat, detection capabilities ...

Every sixth cybercrime in India committed through social media: NIA

hindustantimes.com - Amit Sahay’s worst nightmare came true when someone hacked into his Facebook account and started posting pornographic content. Amit first warned his friends and then tried changing his password. Bu...

Future iPhones might grab a thief’s photo and fingerprint when stolen

nakedsecurity.sophos.com - Apple may be working on anti-theft technology to protect iPhones that would covertly snap a photo of (what the device assumes is potentially) the thief, capture their fingerprint, shoot some video ...

Fighting cybercrime: The complicated politics of international cooperation

lowyinterpreter.org - By Nicholas Welsh, an intern in the Lowy Institute's International Security Program. In April, Prime Minister Turnbull unveiled the National Cyber Security Strategy, outlining five key themes of ac...

SAP - Please Register

global.sap.com - Previous 2016 SAP Cybersecurity Summit Learn how you can Run Simple to secure your business Please fill out the short form to register for this event. Country United States Canada Afghanistan Åland...

Ransomware: The evolution of cybercrime, a roundtable

Shared by john pearce

scmagazine.com - The threat from ransomware continues to grow and the situation will only get darker before mitigation efforts prove reliable and the miscreants move on to another attack vector. This was just one o...

Wondershare Data Recovery Review – Best File Recovery Software

fossbytes.com - But this isn’t the world’s end. There are many file recovery software available that you can use to get the important data back. Deleted data doesn’t mean that it’s totally removed from a computer....

Russia's Mail.ru Hacked Again; 27 million Accounts Stolen

hackread.com - A group comprising of just two hackers hacked Russia’s biggest internet company Mail.ru and stole a trove of data from forums hosted on the company’s server between July and August 2016. The total ...

Sony enables two-factor authentication for PlayStation

scmagazine.com - In a tweet sent out at after midnight on Wednesday night, Sony announced it was enabling two-factor authentication (2FA) for its PlayStation Network (PSN). The initiative is being made to improve s...

How data science fights modern insider threats

Shared by Qwince

techcrunch.com - Ben Dickson is a software engineer and freelance writer. He writes regularly on business, technology and politics. Insider threats are the biggest cybersecurity threats to firms, organizations and ...

Apple fixes security flaw after UAE dissident's iPhone targeted

Shared by PolarbearPC

uk.reuters.com - SAN FRANCISCO Apple Inc issued a patch on Thursday to fix a dangerous security flaw in iPhones and iPads after researchers discovered that a prominent United Arab Emirates dissident's phone had bee...

Iran reports cyberattack targeted its petrochemical centers

Shared by Neira Jones

worldtribune.com - Iran said that a cyberattack on two of its petrochemical plants is not related to recent fires at the facilities. A military official said on Aug. 27 that malware was discovered and removed from tw...

Are Data Breaches Becoming More Common?

Shared by Michael Long

motherboard.vice.com - The reported number of data breaches on Vigilante.pw since 2007. Source: Vigilante.pw. Image: Che Saitta-Zelterman It feels as if data breaches are becoming more and more frequent. Pretty much ever...

OpenAI Is Calling for Techie Cops to Battle Code Gone Rogue

Shared by opengov20

wired.com - OpenAI, the Elon Musk-backed startup that wants to give away its artificial intelligence research, also wants to make sure AI isn’t used for nefarious purposes. That’s why it wants to create a new ...

Got big data? Check out these 100 best practices for keeping it secure

Shared by John Heijmann

csoonline.com - Big data is best known for its volume, variety, and velocity -- collectively referred to as the "3 Vs" -- and all three of those traits make security an elusive goal. Targeting companies grappling ...

India has emerged as one of the favourite countries among the cyber criminals: Survey - The Economic Times

economictimes.indiatimes.com - NEW DELHI: India saw a nearly 350% surge in cyber crime cases registered under the Information Technology (IT) Act, 2000 between 2011 and 2014, according to a study conducted by industry lobby Asso...

Ransomware mobile: principali minacce e migliori metodi di protezione

Shared by Quorum EMEA

blog.kaspersky.it - La settimana scorsa abbiamo parlato dei ransomware che colpiscono i computer, davvero una spina nel fianco. Tuttavia i ransomware non si trovano solo sui computer, ma anche sui dispositivi mobili, ...

Filling IoT Connectivity and Security Gaps

Shared by OXITS

blog.fortinet.com - We’ve all heard about the growing proliferation of IoT devices. They are a critical component of the new digital economy, collecting and sharing information about a myriad of things - from smart ap...

Anti-forensic Techniques - eForensics

eforensicsmag.com -   If you are not a subscriber, unlock access here    Download free magazine preview Dear Readers, Welcome to April’s issue! We’re very happy we can share with you this publication and we hope you e...

Wall Street's Biggest Banks Are Banding Together Against Cybercrime

Shared by Quorum EMEA

fortune.com - The biggest banks are forming an alliance against a common enemy: hackers. A team of eight banks, including J.P. Morgan, Goldman Sachs, and Bank of America, are reportedly forming a team to tackle ...

SWIFT banking execs admit to ignoring security before hacks

searchsecurity.techtarget.com - Current and former board directors and senior managers for SWIFT banking admitted security was not a priority for the financial messaging system, and experts are not surprised to hear it. A report ...

Recent POS Attacks: Are They Linked?

Shared by Quorum EMEA

bankinfosecurity.com - Just days after POS systems and services provider Oracle MICROS revealed a breach impacting its legacy POS systems, Visa issued an alert warning merchants to be on the lookout for malware attacks l...

Are You Protected? 4 Tips to Avoid Losing $154 Per Record Stolen in a Corporate Data Breach

business.com - Securing your company’s data is critical for both your bottom-line and brand reputation. When a breach occurs, your customers lose faith in your organization. With the cost of a data breach estimat...

How worried should your business be about cybercriminals?

Shared by 20spokes

techradar.com - Business in the UK is booming right now. Last year alone, 608,100 new firms were launched, an increase of 4.6% compared to the 581,173 that were formed in 2014. These statistics, compiled by Compan...

Gartner includes Blueliv in 2016 Innovation Insight for Machine Readable Threat Intelligence Report - Blueliv

Shared by Daniel Solis

blueliv.com - MRTI can significantly increase threat visibility and improve the security posture of an organization by providing better threat context to security technology, processes and people. Learn why Blue...

Nach Angriff auf Opera Sync-Server: Nutzerdaten kompromittiert

Shared by SECbuddy

winfuture.de - Anfang der zurückliegenden Woche hat der Webbrowser-Entwickler Opera laut eigenen Angaben einen großangelegten Angriff auf seine Sync-Server bemerkt und erfolgreich abgewehrt. Nun fordert Opera sei...

Neue Betrugsmasche: Polizei warnt vor Rechnungsstellung per E-Mail | ZDNet.de

Shared by SECbuddy

zdnet.de - Bei der neuen Betrugsmasche, vor der das Landeskriminalamt Baden-Württemberg jetzt vor allem Firmen gewarnt hat, täuschen Kriminelle mit Mails und teilweise zusätzlich auch per Briefpost vor, dass ...

Cybercrime cases up 350% in India - EE Times Asia

Shared by Hacked Again

eetasia.com - India has seen a 350% surge in cybercrime cases from 2011 to 2014, according to a recent study. The Indian Computer Emergency Response Team (CERT-In) has also reported handling close to 50,000 secu...

Slimme stopcontacten lekken wifi-wachtwoorden

infosecuritymagazine.nl - Slimme stopcontacten waarmee standaard apparaten slim kunnen worden gemaakt blijken ernstige beveiligingsrisico’s met zich mee te nemen. De stopcontacten lekken het wifi-wachtwoord van gebruikers, ...

5 ways your kids can get you hacked

blog.credit.com - For adults, home is a refuge, but for children it is a never-ending treasure hunt. While you’re out — you know, paying for the place — it’s a safe bet your kids are getting into your stuff, and whe...

This Hacker Found a Way to Get Free Domino's Pizza for Life

Shared by James Stewart

fortune.com - Extra cheese, pepperoni….and software vulnerabilities? Paul Price, a computer security researcher based in the United Kingdom, three years ago hit the pizza jackpot. He found a computer bug affecti...

Tools of the Trade - eForensics

eforensicsmag.com - Product Description Dear Readers, In this issue we invite you to explore the world of tools used in digital forensics with us. Although we can’t dream of including everything, we did our best to br...

Guy hacks app to score free beers | News | Geek.com

Shared by James Stewart

geek.com - Wouldn’t it be nice if you could treat yourself to a nice, cold beer after a hard day of work without actually paying for it? It turns out you can: just hack a loyalty app! Kuba Gretzky is a securi...

Cyber crime in India up 300% in 3 years: Study

Shared by Cyber-DB

indianexpress.com - Cyber crime cases in the country registered under the IT Act surged nearly 300 per cent between 2011 and 2014, according to a study, which cautioned that cyber attacks around the world are occurrin...

RIPPER ATM Malware Linked to Thailand Heist

Shared by SecurityWeek

securityweek.com - The malicious software used earlier this month to steal 12 million baht ($346,000) from ATMs at banks in Thailand might be a new ATM malware variant called RIPPER, FireEye researchers reveal. The n...

Global Cost of Cybercrime Predicted to Hit $6 Trillion Annually By 2021, Study Says

Shared by Daniel Buys

darkreading.com - A report out by Cybersecurity Ventures predicts global annual cybercrime costs will grow to $6 trillion by 2021.  While a $6 trillion estimate might be a little high, “a trillion dollars plus is a ...

Cybercrime damages expected to cost the world $6 trillion by 2021

Shared by Parthiv

csoonline.com - Cybercrime will continue its stratospheric growth over the next five years, according to a recent report published by Cybersecurity Ventures. (Disclaimer: Steve Morgan is the Founder and CEO at Cyb...

Cybersecurity | DiploFoundation

diplomacy.edu - Today’s headlines often feature the word ‘cyber’, reporting on threats related to the virtual world: online child abuse, stolen credit cards and virtual identities, malware and viruses, botnets and...

Cyber threat grows for bitcoin exchanges

Shared by Manu Dagar

reuters.com - NEW YORK When hackers penetrated a secure authentication system at a bitcoin exchange called Bitfinex earlier this month, they stole about $70 million worth of the virtual currency. The cyber theft...

Alarming cybercrime

Shared by Secure Cyber

dailyexcelsior.com - We have the IT Act in the country which registers cybercrimes for prosecution under law.  The cybercrime in our country has shown over 300 per cent increase for the period 2011-2014. It is not only...

Chinese hackers behind Defence, Austrade security breaches

Shared by SenseCy

abc.net.au - Sensitive Australian Government and corporate computer networks — including those holding highly confidential plans for a privately financed geostationary communications satellite — have been penet...

Emergency communications for the modern age

Shared by arbornetworks

cloudcomputingintelligence.com - Organisations can and will always face crisis situations. Although critical events cannot be avoided, the physical, financial and reputational damage of a crisis can be managed and minimised by put...

Cybercrime in Africa: Facts and figures

scidev.net - Cybercrime in Africa: Facts and figures By Jean Shiloh, Amzath Fassassi According to a widely accepted estimate, cybercrime costs the world economy the sum of US $ 500 billion, more than the GDP of...

Locky Ransomware Distributed Via DOCM Attachments in Latest Email Campaigns « Threat Research Blog

Shared by Quorum EMEA

fireeye.com - Throughout August, FireEye Labs has observed a few massive email campaigns distributing Locky ransomware. The campaigns have affected various industries, with the healthcare industry being hit the ...

The 7 Essentials for Cyber Security - ACUTEC

Shared by Quorum EMEA

acutec.co.uk - With cybercrime making news headlines all of the time it has never been more important to make sure that your business is protecting itself. When it comes to cyber security we recommend a checklist...

Why we should all care about cyber crime: the risk to you and me

Shared by Steven Kirby

abc.net.au - In today's world, the reality is that all individuals and organisations connected to the internet are vulnerable to cyber attack. The number, type and sophistication of attacks continues to grow, a...

New team to tackle cybercrime

thehindu.com - The office of the Banking Ombudsman for Kerala, Lakshadweep, and Mahe, and the Kerala Police are working on creating a channel for constant information exchange to deal with cybercrimes and online ...

A deeper look at business impact of a cyberattack

csoonline.com - Few would dispute that cyberattacks are increasing in frequency and in intensity, and most organizations confirm they have now suffered at least one cyber incident. But do those organizations have ...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →