Blog Posts Tagged with "Cyber Crime"

27ef2e87221c355f517e2824b19f7ca6

US Department of Justice and FBI Foil Botnet Operation

April 14, 2011 Added by:Jared Carstensen

The so called "massive fraud scheme" utilized software called Coreflood - which collected and stored system and application passwords, along with other financial information. The use of Coreflood was enabled by a Windows OS vulnerability which then allowed the botnet to spread rapidly...

Comments  (3)

37d5f81e2277051bc17116221040d51c

mCrime Takes A Leap Into Profitability For Criminals

April 11, 2011 Added by:Robert Siciliano

As smartphones continue replacing landlines and billions of new applications are downloaded, mobile crime, or mCrime, will inevitably increase. McAfee’s threat report for the fourth quarter of 2010 reveals steady growth of threats to mobile platforms...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Continually Plagued with Malware and Scams

April 05, 2011 Added by:Headlines

"An estimated 600,000 people have clicked onto the link, which falsely promises to show them a funny Photoshopped image of themselves. In reality users install a rogue application which sends messages to their contacts via the social network's IM feature, continuing the infection cycle..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Embarrassing Data Breach Events

April 05, 2011 Added by:Headlines

As the Epsilon data breach continues to grow to epic proportion, with the latest reports estimating that the client data of at least fifty major company's has been compromised, Tom Brewster has published an article with his list of the top ten most embarrassing data breaches to date...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Spyware and Keyloggers Pose Major Identity Theft Threat

April 04, 2011 Added by:Robert Siciliano

Spyware is sold legally in the United States. This software records chats, emails, browsing history, usernames, passwords, and basically everything a person does on that PC. Some spyware programs can record everything in a video file, which can then be accessed remotely...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Videos and Multimedia are Most Popular Malware Traps

April 01, 2011 Added by:Headlines

"Users continue to fall victim to malicious links offering to take them to an exciting video or the new episode of their favorite TV show. This technique has become a weapon of choice for hackers as it requires minimum investment and attracts a large number of victims..."

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch National Cyber Security Strategy - Blessing or Curse?

March 31, 2011 Added by:Don Eijndhoven

For now, very few experts take these measures seriously and fear that our National cyber defense posture will be weakened rather than strengthened. Let´s hope that this is not the case, because various research papers already point to The Netherlands as a haven for malware...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Hackers Focusing on Corporate Intellectual Capital

March 28, 2011 Added by:Headlines

Cybercriminals understand there is greater value in selling a corporations' proprietary information and trade secrets, which have little to no protection, making intellectual capital their new currency of choice...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Comodo Fingers Iranian Hackers in Digital Certificate Heist

March 24, 2011 Added by:Headlines

"We believe these are politically motivated, state-driven/funded attacks. One of the origins of the attack that we experienced is from Iran. What is being obtained would enable the perpetrator to intercept Web-based email/communication," said Melih Abdulhayoglu, the CEO and founder of Comodo...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

The Seven Deadly Sins of Cybercrime Victims

March 23, 2011 Added by:Global Knowledge

Cybercriminals are skilled at identifying their targets’ weak points. Today’s increasingly online and social world offers a host of techniques for preying on potential victims and their weaknesses. Following are seven weaknesses that you need to watch out for to avoid falling prey to these scams ..

Comments  (0)

37d5f81e2277051bc17116221040d51c

Cyber Criminals Target Online Gambling Sites

March 22, 2011 Added by:Robert Siciliano

As more people turn to online poker, bingo, sportsbooks, and betting sites, cyber criminals are developing more ways to take advantage. Financial fraud such as chargebacks and money laundering are major issues for gambling operators, not to mention player collusion and bonus abuse...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

South Florida Key to Romanian Cyber Crime Syndicates

March 21, 2011 Added by:Headlines

"In recent years, South Florida has become a hub for middlemen working for Romanian crime syndicates that post vehicles and other big-ticket items on auction sites in hopes of duping American bargain hunters who send off money and never get anything back, court records show..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

A Good Decade for Cyber Crime

March 15, 2011 Added by:Robert Siciliano

Cybercrime is one of the most lucrative industries, growing by double digits year after year. Over the last decade, cyber crooks have developed sophisticated ways to prey on an explosion of Internet users with little danger of being caught. A few famous exploits illustrate different eras of cybercrime...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Research Roundup: Cisco’s Annual Report 2010

March 08, 2011 Added by:Mike Meikle

Social Engineering or Trust Exploitation is most effective tool for cyber-criminals. Whether it is through Facebook, Twitter, LinkedIn or via an infected URL, Social Engineering is the key vector in gaining access to privileged information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ENISA Releases Comprehensive Study on Botnet Threat

March 08, 2011 Added by:Headlines

"Botnets: 10 Tough Questions” is a policy-level distillation of ENISA’s consultation with top experts from all sides of the fight against botnets, including Internet Service Providers, security researchers, law enforcement, Computer Emergency Response Teams and anti-virus vendors...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Cyber Crime Costs Over $1 Trillion Globally?

March 06, 2011 Added by:Danny Lieberman

The UK government report UK Cyber crime costs UKP 27BN/year published on the BBC’s website offers a top-level breakdown of the costs of cybercrime to Britain and is one of the most dubious reports I have seen recently in a long list of security-vendor and political hype around the cyber crime story...

Comments  (1)

Page « < 10 - 11 - 12 - 13 - 14 > »