The Cybercrime Herald

#cybercrime

LinkedIn and the story how crooks can use it for spear phishing

Shared by brainx

securityaffairs.co - In November 2014, Kaspersky’s researchers warned LinkedIn about a security flaw that could put at risk their 360 million users. This was a big concern at the time because LinkedIn has many people f...

Meet the woman protecting Wells Fargo from cybercrime—without a tech degree

Shared by iGloobe.info

fortune.com - Jennifer Spratley is on the front lines of the war against cybercrime. As Wells Fargo’s wholesale fraud prevention and authentication SVP, Spratley and her team spend their days combing through the...

Building a Loyalty Program That Doesn't Reward Cybercriminals

Shared by Ayush Arya

securityintelligence.com - Rick Robinson is a writer and blogger, with a current 'day job' focus on the tech industry and a particular interest in the interplay of tech-driven factors and business... Loyalty or rewards progr...

4 Cybercrime Prevention Tips - markITwrite

markitwrite.com - Cyber-criminals are like most human beings; they want an easy life. Easy money, or an easy path to their objectives. So, the best you can do to frustrate them is to make their job (and their life) ...

Cybercrime forum Darkode returns with security, admins intact

Shared by James Stewart

theregister.co.uk - Crime forum Darkode has relaunched with renewed security two weeks after it was obliterated in a global police raid that shut down the site and saw members arrested. The English-speaking forum, est...

Job security: Opportunities in combating cyber crime

hackersamurai.com - The cyber attack on Sony Pictures late last year revealed not only the lengths that determined hackers will go to in targeting a company, but also the devastating impact they can have. The aggressi...

Teradata Vulnerability Announced: Big Potential Headaches For Big Data Solution

blog.fortinet.com - Last week, FortiGuard Labs announced a remote denial of service vulnerability in the Teradata Gateway and Teradata Express. Teradata is a leading provider of big data solutions including business i...

Cybercriminals Use Angler Exploit Kit to Target PoS Systems

Shared by Ahmad Alemari

securityweek.com - Cybercriminals have been using the Angler exploit kit to identify and infect point-of-sale (PoS) systems. According to Trend Micro, the attackers are using Angler to deliver a reconnaissance Trojan...

Darkode black market back online with security improvements

Shared by perthtones

securityaffairs.co - A few days ago Darkode, a black market specialized in the sale of exploit kits and hacking tool was shut down by an international operation of law enforcement. A joint operation run by the FBI and ...

Viruses And Spyware

Shared by RainbowBiz

getsafeonline.org - A worm, for example, can exploit security vulnerabilities to spread itself automatically to other computers through networks. A Trojan horse (or simply ‘Trojan’) is a program that appears harmless ...

Lessons Learned from OPM: Prioritize Your Activities, Focus on Your Crown Jewels

informationsecuritybuzz.com - We’ve all read about the cyberattack on the Office of Personnel Management (OPM). The records of 22.1 million people were compromised in what is now considered the worst cyberattack in U.S. history...

China cranks up fight against cybercrime

Shared by Jon Avila

cyberattacksquad.com - Authorities responsible for Internet security in China say they’re stepping up their fight against cybercrime and that there are three kinds of online attacks that pose the greatest security threat...

Cybercrime worries banks

Shared by iGloobe.info

bangkokpost.com - Most Asia-Pacific bankers feel unprepared for cyberattacks even though incidents of cybercrime are on the rise, according to a survey by California-based Fair Isaac Corporation (Fico). In a survey ...

Operation Shrouded Horizon: Darkode and its Ties to Bulletproof Hosting Services

Shared by Ayush Arya

blog.trendmicro.com - One of the challenges in fighting cybercrime is that it is borderless; cybercriminals can conduct their malicious activities in countries that do not have strict implementation of cybercrime laws. ...

Cybercriminal Sharpshooters: Nigerian Scammers Use Hawkeye to Attack Small Businesses

Shared by VK

blog.trendmicro.com - It doesn’t take an advanced malware to disrupt a business operation. In fact, even a simple backdoor is enough to do it. Earlier this year the Trend Micro Forward-Looking Threat Research Team close...

Three steps to a successful cloud migration

Shared by Ayush Arya

net-security.org - by John Hodges - VP of Global Account Product Management, AvePoint - Monday, 27 July 2015. People are hoarders by nature. Year after year, we accumulate new things – some that we need, and some tha...

Cyber Threats Evolving Too Fast to Keep Up With

informationsecuritybuzz.com - The survey, which was carried out at RSA Conference 2015, studied the attitudes of nearly 200 IT security professionals and it revealed that 67 percent of organisations are now employing more IT se...

Connecting InfoSec with Jobs

informationsecuritybuzz.com - Today, Information Security Buzz launches its specialized job board (www.isbuzz.jobs) for information security industry. You can access the site here. ISbuzz.jobs is a site that connects employers ...

Cybercrime Kingpin Pleads Guilty — Krebs on Security

Shared by ID Experts

krebsonsecurity.com - An Estonian man who ran an organized cybercrime ring that infected more than four million PCs in over 100 countries with moneymaking malware has pleaded guilty in New York to wire fraud and compute...

The Top 5 Hacking Methods You Need To Know - Wolf Group

wolfgroup.co.uk - Social engineering includes non-technical methods of intrusion that hackers use. Reliant upon human interaction social engineering tricks people into breaking normal security procedures. It is one ...

The Green Sheet :: E-Magazine :: Outsmarting cyber predators

greensheet.com - Just like businesses, cyber threats come in all shapes and sizes, and any business with an email address or a bank account is vulnerable. If a business handles private customer information, electro...

Busting cybersecurity jargon: 20 need-to-know terms to protect your enterprise - Computer Business Review

cbronline.com - Laurance Dine, Managing Principal at Verizon Enterprise Solutions, goes from detection deficits to VERIS in this guide to cybersecurity jargon. Do you know what a detection deficit is? Do you know ...

Pakistan to Ban BlackBerry Enterprise Service Over Security Fears

Shared by LIFARS

infosecurity-magazine.com - Pakistan is set to ban the BlackBerry Enterprise Service (BES) over government concerns that state spooks can’t tap conversations made over the corporate communications platform. The Ministry of In...

UK government launches cybersecurity initiatives for SMEs and students

scmagazineuk.com - The UK government today launched a new set of initiatives designed to improve SME information security, public and private sector cooperation and to encourage more people to join the industry. Thes...

Hacking Team: We're Victim of a Criminal Cyber Attack

thehackernews.com - Hacking Team, the Italy-based spyware company that sells spying software to law enforcement agencies worldwide, says the company has always operated with the law and regulation in an ethical manner...

Staying Ahead of Cybercrime

Shared by AlanHHeyman

bankinfosecurity.com - At a time when organizations can be under cyberattack and not even know it, it is imperative for cybersecurity practitioners to find new ways to get ahead of cybercrime. Ken Allan, cybersecurity le...

Terror Goes Cyber: Capabilities of Boko Haram

batblue.com - Boko Haram is an Islamist militant group that aims to establish a fully Islamic state in Nigeria. The group was loyal to Al Qaeda until 2015, when it declared allegiance to ISIS. Since then, the gr...

DATAKONTEXT - Fachinformationsdienstleister für Personalarbeit, Entgeltabrechnung, Datenschutz und IT-Sicherheit [Einblicke in die DDoS-Erpressungen von DD4BC]

datakontext.com - Die Ziele sind wie schon in anderen Ländern Großunternehmen im Finanzsektor sowie SaaS- und Hosting-Unternehmen. Aktuell erpresst die cyberkriminellen Gruppierung DD4BC (DDoS for Bitcoins) Unterneh...

31 foreigners nabbed in Medan cybercrime case

Shared by iGloobe.info

thejakartapost.com - The police apprehended 31 foreigners at an upscale residence in the Tasbih housing complex in Medan on Monday for their alleged roles as members of an international cybercrime network. North Sumatr...

Cited as a Leader by Independent Research Firm

informationsecuritybuzz.com - Imperva Incapsula DDoS Protection received highest score in Current Offering category Imperva Inc. (NYSE:  IMPV), committed to protecting business-critical data and applications on-premises and in ...

CYB3RCRIM3: The (Only?) Butt Dial Case

Shared by Iván Acosta

cyb3rcrim3.blogspot.com - Monday, July 27, 2015 The (Only?) Butt Dial Case  After I found the pocket dial case, I did a search in Westlaw for "butt dial" cases . . . and found one, which was decided a few weeks ago:  Dieten...

Custo Crescente de Contenção das Ocorrências de Malware

Shared by Camilla Lemke

under-linux.org - Custo Crescente na Contenção das Ocorrências de Malware As organizações em todo o mundo, estão lidando com quase 10.000 alertas de malware por semana. No entanto, apenas 22% destes alertas são cons...

« La cybercriminalité est la nouvelle menace du XXIe siècle »

latribune.fr - Commissaire de police depuis 1976, Mireille Ballestrazzi s'impose, à 61 ans, comme la deuxième femme à occuper le prestigieux poste de directrice générale de la Police judiciaire. Également préside...

What is cybercrime? A Complete Guide: Includes The Latest Threats

Shared by Barbara Jones

webhosting.uk.com - It is a crime in which the computer is used either as an instrument or target or may be used as both. Cybercrime includes any unlawful act dealing with computers and computer networks. Many crimes ...

Anonymous Hacks US Census Bureau

Shared by Ana Marques

infosecurity-magazine.com - Anonymous has claimed responsibility for a cyber-attack on the US Census Bureau which resulted in the posting of personal employee data online. The online collective ‘fessed up in a tweet on Wednes...

Introducing the Infoblox DNS Threat Index: Measuring Cybercrime Infrastructure Build-up before the Attacks

blog.infoblox.com - Today Infoblox is announcing the launch of a unique new measure of cybercrime attacks: The Infoblox DNS Threat Index, powered by IID. The index is unique because it tracks the creation of malicious...

Phishing Attacks Drive Spike In DNS Threat

Shared by Gate 15

darkreading.com - The domain name service (DNS) continues to be a favorite tool of cyber criminals: the DNS threat index jumped nearly 60% in the second quarter of this year. The Infoblox DNS Threat Index is measure...

Security flaws discovered in popular Smart Home Hubs

net-security.org - Security flaws discovered in popular Smart Home Hubs Smart Home Hubs are used to control lighting, heating, locks and cameras in people’s homes. Unsurprisingly, many security experts worry about th...

Fiat Chrysler Recalls 1.4M Vehicles to Prevent Hacking

forensicmag.com - Fiat Chrysler has decided to recall about 1.4 million cars and trucks in the U.S. just days after two hackers revealed that they took control of a Jeep Cherokee SUV over the Internet. The company a...

Invite to Activate Free WhatsApp Without Internet: Scam

Shared by Silensec

hoaxorfact.com - Hey, I am inviting you to activate ?? WhatsApp without Internet. Click here to activate --> http://www.WhatsAppForFree.com. Internet Free WhatsApp Activation. FOLLOW OUR INSTRUCTIONS BELOW! Step 1:...

Forget the Ashley Madison or Sony hacks – a crippling cyberattack is imminent in the US

Shared by Stuart Nash

theguardian.com - Computer experts have long warned about a catastrophic cyber-attack in the US, a sort of Web 3.0 version of 9/11 that would wreak enormous damage throughout the country. Like most Americans, I shru...

Five Men Arrested in Connection with the 2014 JPMorgan Hack

Shared by Johnny

tripwire.com - In August of 2014, it was reported that a group of hackers had exploited a vulnerability in the websites of JPMorgan. After breaking into the company’s network, the attackers then allegedly staged ...

Cyber-Threat Puts Oil and Gas Majors on Edge

Shared by Denise Carson

pipelineandgasjournal.com - The massive cyber-breach of the U.S. Government’s Office of Personnel Management (OPM) systems is the latest in a string of high-profile cyber-attacks in the last couple of years. Before OPM, media...

Simple Text Message to Hack Any Android Phone Remotely

Shared by Johnny

thehackernews.com - Own an Android phone? Beware, Your Android smartphones can be hacked by just a malformed text message. Security researchers have found that 95% of Android devices running version 2.2 to 5.1 of oper...

Key Findings from the 2015 US State of Cybercrime Survey

Shared by Deana Mary

usblogs.pwc.com - By David Burg.  PwC published this week the key findings from the 2015 US State of Cybercrime Survey, which we co-sponsored with CSO, the CERT® Division of the Software Engineering Institute at Car...

CIO-Asia - Windows Server 2003 EOS puts one-in-five businesses at risk: Dell SecureWorks

Shared by Karen M.

cio-asia.com - Dell's security arm, SecureWorks, has sent out a warning to the 20 per cent of Australian businesses still running Windows Server 2003. Microsoft officially ended support for Windows Server 2003 on...

US intelligence community report: America's weak response to cyber attacks will encourage more breaches

Shared by Victoria_A

freebeacon.com - The United States will continue to suffer increasingly damaging cyber attacks against both government and private sector networks as long as there is no significant response, according to a recent ...

Cybercriminals Clone EMV Cards – No Longer a Theoretical Threat - Inteller

inteller.solutions - The EMV (a.k.a Chip-and-PIN) standard, which introduced smart chips to payment cards, continues to get adopted worldwide, with the United States nearing an important milestone of its adoption on Oc...

Combat Threats in Real Time with ThreatTrack

threatintelligencetimes.com - ThreatTrack Security, a cyber threat prevention leader, launched ThreatSecure Network today, a single solution to provide enterprise cybersecurity teams with the ability to combat active advanced t...

The cost of security for UK business

computerweekly.com - First announced during The Queen’s Speech in 2012, the Draft Communications Data Bill, as it was known then, was met with widespread criticism, before it was ultimately dropped during the coalition...

Carlos Andrés Muñoz

Social researcher by passion and also sociologist, methodological expert and, finally CM :-)

Editor's note

If you are interested about  Fear Of Crime   research this is for you ► http://bit.ly/FearCrimeBlog  my blog about this category in refereed papers from recognized databases, around the world after 9/11 .
This site uses cookies for an optimal experience. We also allow third party cookies by trusted partners. By continuing to browse the site you are agreeing to our use of cookies. To learn more and disable some specific cookies, check our Privacy policy →