The Cybercrime Herald

#cybercrime

New UK Cybercrime Report: Traditional Lawbreakers Trounced by Tech Thieves

securityintelligence.com - A freelance writer for three years, Doug Bonderud is a Western Canadian with expertise in the fields of technology and innovation. In addition to working for the IBM Midsize... It’s finally happene...

Watson is adding cybercrime fighting to its resume

developer.ibm.com - When I first joined developerWorks® and started working on the Security zone, it seemed to me that the topic area wasn’t as en vogue as other areas, such as Cloud or Mobile development. So you can ...

Cognitive Security Helps Defend Against Cybercrime

securityintelligence.com - Marc van Zadelhoff is the General Manager for IBM Security, the fastest-growing enterprise security company in the world. ... On any given day, cybersecurity analysts investigate ongoing incidents ...

Top 3 cybersecurity challenges, part 1: Ransomware

Shared by Ethan Wood

arcticwolf.com - Organizations in a variety of industries have come up against some pretty vicious cyberthreats over the years, but we may just be living in the golden age of cybercrime. There are more opportunitie...

Why AI could be the key to turning the tide in the fight against cybercrime | ZDNet

Shared by XVII Jem

zdnet.com - It's not unreasonable to suggest the cybersecurity battle is being lost - and on more than one front. Not only are more efficient and organised cybercriminals winning the security arms race against...

De Rijksoverheid zoekt: Beleidsmedewerker / projectleider cybercrime

werkenvoornederland.nl - Het Openbaar Ministerie zorgt voor een rechtvaardig en veilig Nederland door strafbare feiten op te sporen en verdachten voor de strafrechter te brengen. De aanpak van georganiseerde misdaad staat ...

Sixgill claims to crawl the Dark Web to detect future cybercrime

techcrunch.com - Sixgill, a self-proclaimed ‘cyber intelligence’ SaaS startup that analyses the Dark Web, is launching publicly today and announcing that it has closed a $5 million funding round led by Elron, an Is...

Cybercrime: Staying ahead of the hackers - FX-MM

Shared by Raed Ali

fx-mm.com - Financial services companies would do well to sharpen their focus on known vulnerabilities to help avoid cybercrime, writes FX-MM’s Paul Golden. One of the most interesting observations from Verizo...

Out of the Office? Not Quite — Old Microsoft Vulnerabilities Still Wreaking Havoc

Shared by Anjali Jain

securityintelligence.com - A freelance writer for three years, Doug Bonderud is a Western Canadian with expertise in the fields of technology and innovation. In addition to working for the IBM Midsize... Microsoft Office is ...

Hackers Selling FUD Stampado Ransomware for Just $39

Shared by Anonymous

hackread.com - The Dark Net is full of illegal products including drugs, fake id card, weapons, databases or even highly contemptible listings of child abuse images but now researchers have discovered complete ra...

How to stay ahead of cyber criminals in the data breach era

thenextweb.com - It’s no secret that cyber attackers are becoming increasingly sophisticated, stealthy, and motivated. As we’ve seen in high profile breaches at Target, JP Morgan and Home Depot, attackers can infil...

Latest crime survey shows extent of cyber crime threat

Shared by Mark Taylor

rsmuk.com - The latest crime survey from the Office of National Statistics has for the first time estimated the extent of fraud and cybercrime in England and Wales, and UK businesses should take note warns RSM...

Government serious about curbing rising cyber crime: Rijiju

Shared by GizBot

gizbot.com - At a time when cyber attacks are growing and cyber criminals are targeting organisations, there must be no compromise when it comes to security, Union Minister of State for Home Kiran Rijiju said o...

Fraud and Computer Misuse Crime on the Rise, Study Finds

tripwire.com - A new report from the Office for National Statistics (ONS) states that cybercrime is on the raise in England and Wales. According to the report, adults aged 16 and over experienced an estimated 5.8...

Trump Asks Russia to Dig Up Hillary’s Emails in Unprecedented Remarks

wired.com - Donald Trump’s schadenfreude in the DNC’s embarrassing email leak is standard practice in America’s messy electoral politics. Today, though, his casual request that Russian hackers dig up Hillary C...

Intrusion Detection and Prevention for Networks

blog.finjan.com - Being able to trust your corporate network to deliver information, services and support to whoever needs them is not only crucial to keeping your operations going – it’s a vital element in maintain...

Ransomware Gang Allegedly Dumps Rival's Crypto Keys

Shared by Scuttlebutt

bankinfosecurity.com - Honor among thieves? At least in the ransomware space, don't bet on it. See Also: Cyber Kill Chain: How To Keep Network Intruders At Bay Witness the Petya ransomware gang this week claiming to have...

10 The Most Dangerous Computer Viruses of the Decade 2007-2016

Shared by Scuttlebutt

techtwisted.com - Computer viruses may come and go irrespective of time, but they always exist. Some of them don’t get much attention, but the other ones do terrible damages to the computers and get famous among all...

Envisioning the Hack That Could Take Down New York City

nymag.com - On December 4, 2017, at a little before nine in the morning, an executive at Goldman Sachs was swiping through the day’s market report in the backseat of a hired SUV heading south on the West Side ...

Cyber Security Strategies For Small ISPs | Light Reading

Shared by Rosie

lightreading.com - The cyber security threats faced by small ISPs are typically not of the same order as those of their larger, more illustrious, peers in the ISP community. In part that explains why small ISPs typic...

5 'Mr. Robot' Hacks That Could Happen in Real Life

darkreading.com - Hollywood hacking films have given the job of hacker a sort of glamour, with their fast-fingered hacks taking over the world, while in picture perfect makeup. And the InfoSec community has hated ev...

Hacker Interviews – RazorBlade

securityaffairs.co - Could you tell me which his your technical background and when you started hacking? Which are your motivations? I started hacking about 2 years ago but my curiosity allowed me to gain Alot of exper...

Hail Hail the Gangs are here

Shared by Susan

xlcatlin.com - It was quite the disappearing act.  More than USD 80 million vanished from the Bank of Bangladesh, before anyone even noticed last February. Fortunately, that’s all that went missing. Originally, t...

Cyber crime is outpacing all other crime in the UK

fedscoop.com - There were more cybercrimes or cyber-enabled crimes last year in Britain than offline offenses, according to statistics in a new report from the UK's equivalent of the FBI. The National Crime Agenc...

Catching an Insider Data Thief

finops.co - Ten percent of employees will never commit a crime, ten percent of employees will, while 80 percent will only do so if the opportunity arises, predict fraud experts. It is that opportunity which as...

‘The cybercrime bill could be a nightmare for Internet users’

Shared by Pakistan News

dawn.com - Now that the controversial Prevention of Electronic Crimes Bill has been passed by the Senate, Dawn spoke to Haroon Baloch, a journalist and researcher at Bytes for All, on what happens next, and w...

Deer.io: Your One-Stop Shop for Cybercrime » Digital Shadows

Shared by Ian Cook

digitalshadows.com - Being a cyber criminal is becoming even easier as barriers to entry continue to be lowered. Digital Shadows’ research into deer.io, the site that hosted darkside.global, shows how this is playing o...

Ransomware targeting healthcare overshadows other sectors

Shared by Aneesh Nair

scmagazine.com - A new analysis of malicious threats tracked by managed security services provider Solutionary reported that ransomware attacks targeting healthcare companies comprised a whopping 88 percent of all ...

Security Researchers Allege Russian Ecommerce Firm Turns Blind Eye to Crime

Shared by Ian Cook

thewhir.com - Russian ecommerce shop provider Deer.io is allowing dark web activity out in the open, according to a report from threat intelligence and security analysis firm Digital Shadows. What is the differe...

The Holiday Season And ID Theft: The Cycle Continues

ibosocial.com - “If we don't act now to safeguard our privacy, we could all become victims of identity theft.” Bill Nelson “There are two kinds of people in America today: those who have experienced a foreign cybe...

Another email Hack: Should We Worry?

Shared by Kerry Butters

poweradmin.com - Each time a major email service or social media platform gets hacked, the incident generates exciting headlines in the media. But behind the hype there’s a very real tale of anxiety for all the use...

Array

Shared by CyberSecInt

cybersecurityintelligence.com - A criminal gang recently found an effective way to spread malware that drains online bank accounts. They bundled the malicious executable bug inside a file that installed a legitimate administrativ...

Here’s What We Know About Russia and the DNC Hack

wired.com - As the Democratic National Convention continues its week-long stay in Philadelphia, accusations of Russian hacking continue to cloud the proceedings. At this point, it seems likely that Russia is r...

The Effect of Brexit on the UK's Cyber Crime Activity

inhomelandsecurity.com - As most are aware, Brexit has happened and as a result cast us into some uncertain times. The media is saturated with news of “impending doom” with the spotlight being given to market volatility, f...

The FBI is investigating reported cyber intrusions at Clinton campaign

Shared by Hayes Domains

cbsnews.com - The FBI is investigating reported cyber intrusions at both Hillary Clinton's campaign and the Democratic Congressional Campaign Committee, which is tasked with raising money for House races, CBS Ne...

Malware Used in DNC Hack Has Roots in Chinese Open-Source Tool

Shared by Red B.

news.softpedia.com - One of the malware variants used to infiltrate and hack the Democratic National Committee (DNC) back in April 2016 is based on a piece of open source networking utility developed by a Chinese compa...

Spionage im Wahlkampf: Russland soll hinter neuem Hack von US-Demokraten stecken - Golem.de

Shared by SECbuddy

golem.de - Die US-Demokraten sind Ziel eines weiteren Hacker-Angriffs geworden. Auch auf das Wahlkampfkomitee der Demokraten im Repräsentantenhaus (DCCC) habe es eine Cyberattacke gegeben, berichtete eine Spr...

How to decrypt files encrypted by the Shade ransomware

Shared by Red B.

blog.kaspersky.com - Last year, we joined forces with Dutch law enforcement to launch the NoRansom website, which helps victims of CoinVault ransomware restore access to their data. Later, we enhanced the website with ...

Mildes Urteil für Verkäufer von gefälschten Windows Aktivierungs-Keys

Shared by SECbuddy

winfuture.de - Für einen ehemaligen Studenten ist der großangelegte, jahrelange Verkauf gefälschter Windows Aktivierungs-Schlüssel noch einmal relativ glimpfig ausgegangen. Der Schweizer verkaufte seit 2009 die i...

AuricVault Tokenization Service Protects Sensitive Data

Shared by Auric Vault

auricsystems.com - Tokenization & Data Storage Service for PCI and HIPAA Compliance While tokenization is a term commonly associated with credit card storage and security, it is not yet as popular in the HIPAA (Healt...

New course from Research and Markets

smartcitiesworld.net - Research and Markets will be running a new course called Cyber Security Threats, Assessment & Management at Bandar Seri Begawan, Brunei from August 17-19, 2016. This three-day event is delivered by...

These Are The Programs ISIS Uses To Remain Anonymous Online

Shared by Red B.

gizmodo.com - There’s a big push among ISIS members to enhance technical knowledge, specifically of software that could be used to counteract surveillance. According to a new report released Friday, discussion a...

Comodo: Zertifikatsausstellung mit HTML-Injection ausgetrickst - Golem.de

Shared by SECbuddy

golem.de - Der Sicherheitsforscher Matthew Byrant hat eine kritische Sicherheitslücke im Zertifikatsausstellungsprozess von Comodo entdeckt. In Verifikationsmails, die dazu dienen, den Domaininhaber zu authen...

New SpyNote Android RAT Revealed - Bat Blue Networks

Shared by Gillian

batblue.com - Posted: Jul. 29th, 2016 at 3:11 pm under Watch Desk Researchers discovered a new type of remote access trojan (RAT) targeting Android users after the developers discussed the malware on Darknet for...

The State of Malware on the Mac

Shared by Kerry Butters

cyberisk.biz - We often hear horror stories about the vulnerabilities and security shortcomings of Windows and its operating platforms across the board, but the same can’t be said about the Macintosh brand – unti...

Nigeria loses average of N127bn to cybercrime annually » TODAY.ng

today.ng - The cost to the national economy by activities of cyber criminals has been estimated at N127 billion annually, according to Information Security Society of Africa-Nigeria (ISSAN). The technology se...

Until We Reduce Cybercrime, Expect More Russian Meddling

Shared by iGloobe.info

defenseone.com - In 2015, there were over one million cyber attacks on individuals and companies every day — and that is why even the strongest U.S. response to the theft of the Democratic National Committee emails...

The Necessity of Cyber War Games

cyberisk.biz - In the event of a cyber-attack, an organization’s reaction to the occurrence, and the subsequent actions taken, may have as significant an impact as the severity of the attack, itself. A company’s ...

Clinton's Campaign Acknowledges It Was Affected by Hacking of DNC

Shared by Frank Peters

time.com - A computer service used by the campaign of Hillary Clinton was hacked as part of a broader breach of the Democratic National Committee, an intrusion for which the Russian government is the leading ...

Researchers have finally figured out how to stop ransomware before it infects a computer

technologyreview.com - Ransomware has become a menace that strikes companies and individuals alike, but researchers have offered tantalizing evidence that we may soon be able to stop it before it does any damage. The mos...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →