Blog Posts Tagged with "Cyber Crime"
February 28, 2011 Added by:Robert Siciliano
The initial concerns involve rogue apps and phishing messages designed to extract credit card numbers and login credentials. As mCrime evolves and criminals begin to make some money, they will have the resources to hire crackerjack programmers to do their deeds...
February 26, 2011 Added by:Bill Gerneglia
These figures were reported by Eurostat, the European Union's office of statistics. They recently stated that 31% of all Internet users in the 27 EU member nations had contracted a computer virus that resulted in "loss of information or time" in the second quarter of 2010...
February 23, 2011 Added by:rebekah donaldson
Julie Fergerson recently published “Fraud Attacks Cross Industries,” co-authored with Dr. Daniele Micci-Barreca of Elite Analytics. The study is based on analysis of 25,188 cases of confirmed fraud involving 95 merchants that represent 61% of the top 500 Internet merchants...
February 22, 2011 Added by:Don Eijndhoven
Endpoint protection will remain the name of the game, and what software vendors are doing right now isn't working. Its a failing approach that’s becoming increasingly obvious with each new report of a major breach. A change needs to be made before Organized Crime realizes its full potential...
February 17, 2011 Added by:Ben Keeley
Norton (Symantec) released a new cybercrime tool, it's pitched as a tool that 'measures and warns people about cybercrime risks around the world'. At first glance the Internet version is a very slick and smooth interface, which displays recent trends for ID theft, malware, spam and fraud...
February 16, 2011 Added by:Robert Siciliano
Device reputation spots online evildoers by examining the computer, smartphone, or tablet they are using to connect to any website. If a device is recognized as having previously committed some type of unwanted behavior, the website has the opportunity to reject the transaction...
February 07, 2011 Added by:Headlines
Security firm Trusteer reports that a recent survey has revealed that an increasing number of websites are now known to host Zeus variants. The report also shows that a growing number of networks are hosting command and control operations for Zeus-based botnets...
February 04, 2011 Added by:Headlines
David Finn, associate general counsel at Microsoft, cites evidence that criminal organizations are finding software piracy to be lucrative. One Mexican cartel is thought to make as much as $2.2 million dollars per day distributing pirated software. That is big business...
February 03, 2011 Added by:Headlines
A fascinating article explores how a small Romanian town has evolved to become an international center for cybercrime operations. In Râmnicu Vâlcea, a remote village in the Southern Carpathian foothills, online predatory networks have brought a flood of new wealth to the once agrarian community...
January 25, 2011 Added by:Theresa Payton
Make sure you have a strong password on your accounts, and Review your Facebook profile to see how much information you share about yourself that could be used to impersonate you - high school attended, pet's name, favorite color, etc...
January 23, 2011 Added by:Headlines
"We implemented Soundminer on an Android phone and evaluated our technique using realistic phone conversation data. Our study shows that an individual's credit card number can be reliably identified and stealthily disclosed. Therefore, the threat of such an attack is real..."
January 21, 2011 Added by:Headlines
PandaLabs researchers have discovered that criminal networks are selling stolen credit card information for as little as $2.00. For a mere $700.00, someone can purchase account credentials that guarantee access to balances of at least $80,000.00 - just pennies on the dollar for the potential yield...
January 20, 2011 Added by:Headlines
The EU Emissions Trading Scheme has suspended all carbon emissions trading until January 26th after hackers breached networks and pilfered millions in pollution credits. The credits stolen form the Czech accounts are estimated to be worth as much as seven million Euros, according to reports...
January 19, 2011 Added by:Headlines
Information theft accounts for 42 percent of total external costs. Costs associated with disruption to business or lost productivity accounts for 22 percent of external costs... Tangential to these costs is the expense by damage from negative press and lost customer/shareholder confidence...
January 18, 2011 Added by:Theresa Payton
Is your email inbox suddenly a little leaner? Less Viagra and Penny Stock emails getting through? It's all a great sign for the war against spam, but experts are worried that since criminals go where the action is, they are just up to new tricks...
January 17, 2011 Added by:Headlines
Security expert Mandeep Khera warned that the next decade would see an escalation in cybercrime and the use of cyberwarfare tactics. In light of the rise of the Stuxnet, the Zeus Trojan and the shifting strategies employed by online criminals, Khera's predictions are worth a revisit...
Don’t Let Your Guard Down: Tragedies Pave ... shahbaz ocpfsd1 on 04-24-2014
Stopping Remote Access Breaches with “Hone... Pakhi Chopra on 04-24-2014
Interoperability: A Much Needed Cloud Comput... ryan mccarthy on 04-23-2014