Blog Posts Tagged with "Cyber Crime"


On the New Generation of P2P Botnets

June 18, 2012 Added by:Plagiarist Paganini

"Every peer in the botnet can act as a C&C server, while none of them really are one. Bots are now capable of downloading commands, configuration files, and executable from other bots -- every compromised computer is capable of providing data to the other bots..."

Comments  (2)


Cyber Black Market: The Underground Economy

June 18, 2012 Added by:gaToMaLo r. amores

On April 24 the FBI released a report on Bitcoin. At that time Bitcoins were going for $4.25. As of June 17 they were trading at $6.26. Traders will be taking a look at Bitcoin, and once they get a whiff of the virtual money, they will strike... and it looks like the commercial criminals are already doing it...

Comments  (1)


Cyber Criminals Hiding Behind Travel Emails

June 17, 2012 Added by:Theresa Payton

Cyber criminals love to be where the action is, and they know this is a peak travel season, so they have found the perfect hiding place: Travel confirmations. They realize that more people are booking travel online and receiving their travel confirmations via email...

Comments  (0)


The FBI's Most Wanted Cyber Criminals

June 13, 2012 Added by:Headlines

While the objective of criminal elements largely remains the same, the ubiquity of the digital systems that pervade every aspect of our culture present a new set of challenges for law enforcement, and new breed of criminal. The following are the Federal Bureau of Investigations "most wanted" cyber crooks...

Comments  (0)


POS Skimming: Bad News for Banks and Merchants

June 12, 2012 Added by:Robert Siciliano

EFTPOS skimming — which stands for “electronic funds transfers at the point of sale” — involves either replacing the self-swipe point of sale terminals at cash registers with devices that record credit and debit card data, or remotely hacking a retailer’s POS server...

Comments  (0)


LinkedIn Breach Part II: What You Need to Prepare for Next

June 09, 2012 Added by:Jason Clark

The LinkedIn breach made headlines, but I want to go deeper and provide practical advice for organizations on how they can anticipate DLP consequences and tighten network security. You need a strategy to protect against attack scenarios. Here’s a seven-step check list for mitigating your risk...

Comments  (4)


Hierarchy Exploit Pack: New Crimeware for the Gangs

May 31, 2012 Added by:Jorge Mieres

Despite being a package for criminal exploitation within a vast range of alternatives, it remains a real risk for any information system. Consider that the Hierarchy Exploit Pack in the criminal markets has reached a stage where it is found among the best crimeware available...

Comments  (0)


Programmer Pleads Guilty to Stealing Code from Federal Reserve

May 30, 2012 Added by:Headlines

“Bo Zhang may have thought that he left no fingerprints when he engaged in his high-tech thievery—stealing proprietary government software worth nearly $10 million using little more than a mouse—but he was mistaken. He was caught in his tracks and now he will be punished for his cyber-thievery"...

Comments  (0)


What is the Deep Web? A Trip into the Abyss...

May 25, 2012 Added by:Plagiarist Paganini

The Deep Web is considered the place where everything is possible, you can find every kind of good and service for sale, but most of them are illegal. The hidden web offers cybercrime great business opportunities, hacking services, malware, stolen credit cards, weapons, etc...

Comments  (0)


Malware Threats: Save Your Company Now

May 21, 2012 Added by:Bill Gerneglia

As the severity of cyber-crimes continues to grow, it’s important to understand the types of malware involved and how they work. Many forms of malware might be familiar, but they evolve as counter measures force adaptation. Today, the adaptation is driven by professional criminals...

Comments  (0)


OS X Flashback Botnet Analysis from Symantec

May 17, 2012 Added by:Headlines

"Utilizing less than 2% of the entire botnet the attackers were able to generate $14,000 in three weeks, meaning that if the attackers were able to use the entire botnet, they could potentially have earned millions of dollars a year..."

Comments  (0)


Zeus Malware Targeting Facebook, Gmail and Yahoo Users

May 16, 2012 Added by:Headlines

"We've recently discovered a series of attacks being carried out by a P2P variant of the Zeus platform against some of the internet’s leading online services... The attacks are targeting users of Facebook, Google Mail, Hotmail and Yahoo – offering rebates and new security measures..."

Comments  (0)


IC3: 2011 Internet Crime Report

May 15, 2012 Added by:Plagiarist Paganini

IC3 represents a perfect example of how technological services could help in the prevention and analysis of criminal activities, and highlights that the real weapon against Internet crime is awareness and information sharing...

Comments  (0)


Manager of Phishing Ring Sentenced to Five Years in Prison

May 15, 2012 Added by:Headlines

A principal figure in the domestic arm of an international “phishing” operation that used spam e-mails and bogus websites to defraud American banks was found guilty of bank and wire fraud, identity theft, computer fraud, and money laundering and sentenced to five years in federal prison...

Comments  (0)


Cybercrime Does(n't?) Pay

May 14, 2012 Added by:Beau Woods

Although many studies fail at basic science, I'm hopeful that the information security industry will get better both at true academic research and at coming up with accurate metrics for the most important data. We'll get there as we mature as an industry, but it will take a while...

Comments  (0)


FBI on Bitcoin: Cybercrime, Opportunity and Digital Choice

May 11, 2012 Added by:Plagiarist Paganini

The real danger of digital money, above the vulnerabilities in its processes, is the inability of governments to exert control over finances, which could lead to a distortion of the main mechanisms of economic control and taxation, bringing total chaos to the market...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »