Blog Posts Tagged with "cybercrime"


The 5 Motives of Ransomware

January 04, 2018 Added by:Joseph Carson

Who would have foreseen the impact of both WannaCry and NotPetya

Comments  (0)


Security of IIoT Devices: Time to Operate in Tandem with the Drive for Productivity?

December 22, 2016 Added by:Jalal Bouhdada

Manufacturers are increasingly adopting IIoT technology with the goal of boosting manufacturing productivity, but are security practices falling by the wayside?

Comments  (0)


The Home of Cyber Security Best Practice: Public or Private Sector?

December 15, 2016 Added by:Bernard Parsons

There are areas where private and public sector can take a leaf out of each other’s books, as the security challenges facing both continue to escalate.

Comments  (0)


SCADA Systems Offered for Sale in the Underground Economy

June 22, 2015 Added by:Idan Aharoni

Access to such compromised SCADA systems that control various real-world equipment is being sold in the underground economy.

Comments  (0)


Can Hackers Use FraudFox VM to Defeat Your Fraud Prevention?

January 22, 2015 Added by:Robert Siciliano

So how worried should your business—and customers—be about FraudFox VM ? I sat down with Scott Waddell the Chief Technology Officer of iovation, the fraud prevention experts, to find out what the reality is behind the media headlines.

Comments  (5)


Webcast: Using Global Intelligence Data to Prevent Online Fraud and Cybercrime

December 12, 2014 Added by:InfosecIsland News

Please join ThreatMetrix and SecurityWeek on Thursday, Dec. 18th, 2014 at 1PM ET for a Live Webcast.

Comments  (0)


Cybercriminals Use Patriotic Russians to Revive Kelihos Botnet

August 30, 2014 Added by:Eduard Kovacs

Cybercriminals seem to be well aware that many Russian nationals are unhappy with the sanctions imposed by foreign governments against their country, so they're relying on them to revive the Kelihos (Waledac) botnet

Comments  (0)


New Insights into Email Spam Operations

June 01, 2014 Added by:Gianluca Stringhini

Recently, we have been working on gaining a better understanding of spam operations and of the actors involved in this underground economy. We believe that shedding light on these topics can help researchers develop novel mitigation techniques, and identifying which of the already-existing techniques are particularly effective in crippling spam operations, and should therefore be widely deployed.

Comments  (0)


Why are Cybercrimes NOT Always White-collar Crimes?

June 17, 2013 Added by:DHANANJAY ROKDE

A generic definition of a crime would be an act that is in violation of the applicable laws.

Comments  (0)


Don’t Let Your Guard Down: Tragedies Pave Way for Phishing Attacks

April 16, 2013 Added by:Jake Garlie

Tragic events such as what happened during the Boston Marathon creates an opportunity for attackers in the digital world as well. With everyone scrambling for more information, the success rate of a phishing attack at this time can skyrocket.

Comments  (37)


Just One of Many Internet Scams

March 05, 2013 Added by:Robert Siciliano

A good friend of mine called me recently to ask what I knew about scams from online sales. He had placed an ad on CraigsList for something he was trying to sell and had asked for $150 for the item. He had received a call from a woman and she offered to send him a check for the item....

Comments  (0)


What ‘Identity Thief’ The Movie Gets Wrong

February 13, 2013 Added by:Kelly Colgan

The movie “Identity Thief” opened nationwide last weekend, and while we love a good laugh, this flick comes at a cost: the truth. Here are five major plot points that do a disservice to an often-misunderstood crime...

Comments  (1)

Most Liked