The Cybercrime Herald

#cybercrime

Cybercrime

Shared by OzSSISudEst

police-nationale.interieur.gouv.fr - L'échange massif de données sur internet a entraîné l'apparition de nouvelles infractions. Pour répondre à cette nouvelle cybercriminalité, la police nationale dispose de 389 investigateurs en cybe...

Malicious version of PuTTY is spreading in the wild

Shared by sn0wm4k3r

securityaffairs.co - Be careful, there is an unofficial version of Putty in the wild and it seals information. This version was compiled from the legitimate source, but isn’t hosted on the official website project, ins...

IRS breached, hackers access data of more 100,000 taxpayers

securityaffairs.co - According to the Associated Press, the Internal Revenue Service (IRS) suffered a data breach, hackers “used an online service provided by the agency” to access data for more than 100,000 taxpayers....

Facebook Predator sentenced to 29 years on child pornography, sexual offenses

Shared by Aysha Moolla

hackread.com - Waqas Amir is a Dubai based blogger with passion for covering latest happenings in cyber security and tech world. In addition to being the founder of this website, Waqas is also into gaming, readin...

The Island

island.lk - The Foreign Affairs Ministry together with the ICT Agency of Sri Lanka (ICTA), has fast-tracked Sri Lanka’s entry into the Council of Europe (CoE) Cybercrime Convention, aka the Budapest Convention...

Former CIA Operations Officer Valerie Plame Joins Advisory Board of Global Data Sentinel

Shared by Gemma Turner

globaldatasentinel.com - NEW YORK, NY, MAY 28, 2015 — Former career covert CIA operations officer, Valerie Plame joins the advisory board of Global Data Sentinel (GDS), the cyber defense platform that secures, encrypts and...

Expert Comments for Follow on Coverage - CareFirst breach

informationsecuritybuzz.com - Krebs points out the potential initial culprit in gaining credentials to access the CareFirst network and data may have been similar to the Doppelgänger attacks Proficio discussed in our April 23, ...

Phishing Gang is Audacious Manipulator — Krebs on Security

Shared by Army Chief P

krebsonsecurity.com - Cybercriminals who specialize in phishing — or tricking people into giving up usernames and passwords at fake bank and ecommerce sites — aren’t generally considered the most sophisticated crooks, b...

Sicurezza informatica e cybercrime nelle PMI - PMI.it

Shared by Arnold Offner

pmi.it - I furti di proprietà intellettuale e di identità e le violazioni relative alla sicurezza informatica appartengono alla più ampia sfera del cybercrime, su cui annualmente riferisce il comparto intel...

A student hired hackers to attack schools of the West Ada school district

securityaffairs.co - I have decided to write about this story because it is the demonstration of the interference of cybercrime with the teenager’s life, a 17-year old high school student might be accused of attacking ...

NitlovePoS, The New PoS Malware is being spread by Spam

securityaffairs.co - A new malware called NitlovePoS has the capability of capture and exfiltrate track one and two from payment cards, and to accomplish that it scans the running processes of the infected machine. Fir...

Why Carbanak C&C points to Russia Federal Security Service?

securityaffairs.co - Maxim Goncharov, security expert at Trend Micro, revealed that one of the most sophisticated malware used by the popular gang Carbanak is now pointing to Russia’s Federal Security Service (FSB). Th...

North Korean hackers 'could destroy cities' (Wired UK)

wired.co.uk - The fact that North Korea has a sizeable capacity for launching hacking attacks outside its borders is not exactly news -- even if the exact dimensions of the threat remain somewhat in the shadows....

How 'zero knowledge' stops hackers in their tracks | Information Age

Shared by DocuSign

information-age.com - Knowledge is power to the hacker. Every day they are being equipped for their next attack, as users are trusting organisations with their personal information online. High profile security breaches...

Profile Of A Cybercrime Petty Thief

cyberattacksquad.com - Although the cybercrime game is dominated by organized criminals –according to IBM X-Force, 80 percent of cyber attacks are driven by highly organized crime rings — there are one-man operations get...

NCSC-2015-0100 [1.04]

ncsc.nl - 29-05-2015 - Er is een kwetsbaarheid verholpen in Apache Tomcat.

NCSC-2015-0162 [1.02]

ncsc.nl - 29-05-2015 - Er zijn een tweetal kwetsbaarheden verholpen in glibc.

Olesja Darnopiha

ibm.com - Welcome! My name is Olesja Darnopiha and I’m a Team Leader/ Appliance Subscription & Support Renewals Specialist covering the UK and Ireland regions. Contact me by phone, online chat or email and I...

NCSC-2015-0396 [1.12]

ncsc.nl - 29-05-2015 - Er is een kwetsbaarheid verholpen in de Qemu, KVM Xen en Virtualbox virtualisatie-software.

The 7 Most Hated Internet Innovations of All Time

Shared by hexforensics

informationsecuritybuzz.com - Did you know that the very first spam email was sent out in 1978? Email spam isn’t just annoying; it causes real damage damage — and it’s more effective than you might than. Spam email can damage y...

Security and Privacy: Best Practices on Building a Chrome Extension

informationsecuritybuzz.com - As Chrome continues to eat the marketshare of browsers, the security and privacy implications of Chrome extensions will become every more prominent. Chrome extensions can be powerful because they c...

Profile Of A Cybercrime Petty Thief

Shared by David Rostie

darkreading.com - Although the cybercrime game is dominated by organized criminals -- according to IBM X-Force, 80 percent of cyber attacks are driven by highly organized crime rings -- there are one-man operations ...

NCSC-2015-0430 [1.00]

ncsc.nl - 29-05-2015 - Er is een kwetsbaarheid in de SAP Netweaver XML parser waarvoor op dit moment nog geen updates beschikbaar voor zijn.

Hackers Steal Personal Data From US Tax Agency IRS

Shared by Etical Faker

securityweek.com - Hackers stole information on 100,000 taxpayers from the online computers of the US Internal Revenue Service, the federal tax agency said Tuesday. The IRS said the unidentified cyber thieves used in...

Cybercrime rate on the rise as hackers cash in - Fiji Times Online

fijitimes.com - THE Fiji Financial Intelligence Unit has received 45 cybercrime cases in the past five years, of which 15 cases were related to internet banking fraud. FIU director Razim Buksh said the internet ba...

Federal authorities on to healthcare cybercrime

searchhealthit.techtarget.com - Trainor's sentiments were echoed on a HIMSS 2015 security panel by Department of Homeland Security (DHS) contractor Kevin Hemsley, project manager at the Idaho National Laboratory supporting the DH...

Online crime fuels 27 percent spike in UK identity theft

Shared by Ian

brica.de - UK identity fraud spiked 27 percent in the first quarter of 2015 compared to a year earlier and now makes up nearly half of all reported fraud crimes, fraud service Cifas has reported, glumly. Draw...

Special Report: Staying Cyber Safe in Industry

informationsecuritybuzz.com - Automation company publishes industry report on information security The close of 2014 bought with it a spate of high profile cyber-attacks. In light of the current cyber climate,industrial automat...

Unsecured Voice Calls Leave the Door Wide Open

informationsecuritybuzz.com - The UK’s SMEs are increasingly using Voice over Internet Protocol (VoIP) in order to cut call costs.  Alongside cloud computing, VoIP is a key component in today’s flexible, low cost infrastructure...

Hunting crooks on a digital playground

Shared by Mister Rabbit

arnnet.com.au - Interpol digital crime officer national cyber review management, Steve Honiss In a world filled with cybercriminals unimpeded by national borders, Interpol digital crime manager, Steve Honiss, and ...

Why i Wrote the Open Organization

informationsecuritybuzz.com - The Open Organization (available here)– is about creating a successful business in today’s enormously fast-moving technology climate. The only way to do that is by eschewing the old ways of doing b...

'New Frontier' of Bitcoin Cybercrime Explored at Barcelona Event

Shared by SBRC

coindesk.com - Bitcoin attackers present "a new frontier" for cybercrime, a gathering of top security specialists heard in Barcelona this week. Government agencies, banks, universities, private companies and cons...

Now there's a program that lets novices hijack other people's computers for ransom

businessinsider.com - A security researcher has discovered a startling web tool making it possible for anyone to become a hacker.  The program, called Tox, lets users build their own ransomware, which they then send to ...

Ransomware para Android se hace pasar por aviso del FBI

seguridad.unam.mx - Los cibercriminales han lanzado una nueva oleada de ransomware para Android, el malware se hace pasar por un aviso (bastante convincente) del FBI referente a navegación en sitios pornográficos. Más...

Cybercrime is Now Big Business

Shared by DigitalShare

infosecurity-magazine.com - Cyber-attacks, no longer the actions of a few rogue individuals, are now big business. It’s a growth industry crying out for serious countermeasures If you think the recent massive cyber-attacks on...

Online warzone

politico.eu - Ryan Heath's must-read briefing on what's driving the day in Brussels. ‘Operation Armageddon’ included malware sent to Ukrainian officials. Microsoft Executive Briefing Center - Rue Montoyer 51 - 1...

The Internet Badly Needs Rules And Regulations

Shared by Rich Opara

forbes.com - Last week, U.S. Secretary of State John Kerry proposed five basic principles of global Internet regulation for universal adoption, an initiative I can only applaud. He was speaking at Seoul Univers...

Security and the Internet of Things

Shared by SMM in Dubai

informationsecuritybuzz.com - The Internet of Things includes both traditional electronics and everyday “things” embedded with sensors, computing, and networking capabilities. The Internet of things is growing faster than our a...

Cyber Security - The internet arms race - SME Security Framework

smesecurityframework.com.au - About Roger Smith Roger Smith is an independent ICT and business security consultant, Amazon #1 Best Selling Author | Experienced Cybercrime and CyberSecurity Expert | Speaker | Consultant | Traine...

Envision Consulting is Proud to Announce Envision Cybershield

prweb.com - In response to the fast-evolving cybercrime landscape faced by businesses, Envision Consulting, LLC is proud to announce Envision Cybershield. This new offering combines best-in-class malware prote...

Cybercrime rate on the rise as hackers cash in

hackersamurai.com - THE Fiji Financial Intelligence Unit has received 45 cybercrime cases in the past five years, of which 15 cases were related to internet banking fraud. FIU director Razim Buksh said the internet ba...

Cyber Crime: A Modern Threat to Retail Security

Shared by KPMG Canada

storeconference.ca -  Christopher K. Stangl began his career as a special agent with the FBI in 2003. After attending the FBI Academy in Quantico, Virginia, Stangl was assigned to the FBI's Oklahoma City Field Office w...

Comments on Security Breach Telstra's Asian telecommunications Provider PacNet

informationsecuritybuzz.com - A security breach has been detected at Telstra’s Asian telecommunications provider, Pacnet data centre. The breach occurred prior to Telstra taking ownership of Pacnet, and Telstra was made aware o...

Teenage hacker admits to stalking and 'swatting' female gamers who turned him down

Shared by Stash

businessinsider.com - The teen had been targeting "mostly young female gamers" who had resisted his advances and denied his friend requests on the popular video game "League of Legends." The hacker, whose name has not b...

A Deeper Look At Logjam - And Why You Should Care

Shared by NexGen

blog.fortinet.com - The so-called Logjam vulnerability has been making headlines in both the tech and mainstream press since it was announced last week and for good reason. Potentially tens of thousands of websites an...

Ransomware Removal Kit available online for free

securityaffairs.co - CryptoLocker, CoinVault, and TeslaCrypt are the names of some of the most dreaded ransomware that infected million of users worldwide. The extortion is a very common practice in the cyber criminal ...

Cost of data breach increases to average of $3.8 million

Shared by USI Affinity

businessinsurance.com - (Reuters) — The cost of data breaches is rising for companies around the world as sophisticated thieves target valuable financial and medical records, according to a study released on Wednesday. Th...

“Il futuro del cyber crimine è nei chip sottopelle”

lastampa.it - Dopo venti minuti di cifre, dati e report sulla sicurezza informatica delle banche, una domanda stupida ma che frulla nella testa di chiunque abbia mai avuto un computer viene spontanea: è vero o n...

The Ultimate Guide to Internet Safety Second Edition by Victoria Roddel (Paperback) - Lulu

lulu.com - The Digital Millennium Copyright Act ("DMCA") is a United States copyright law that provides guidelines for online service providers in case of copyright infringement. Below is the information that...

The Ultimate Guide to Internet Safety (English Edition) eBook: Victoria Roddel: Amazon.fr: Boutique Kindle

amazon.fr - Présentation de l'éditeur Anyone who uses a home computer connected to the internet needs "The Ultimate Guide to Internet Safety" Second Edition. This is an updated reference manual for internet sa...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. By continuing to browse the site you are agreeing to our use of cookies. Find out more →