Blog Posts Tagged with "Cyber Crime"

37d5f81e2277051bc17116221040d51c

mCrime Perfectly Positioned to Pounce in 2011

February 28, 2011 Added by:Robert Siciliano

The initial concerns involve rogue apps and phishing messages designed to extract credit card numbers and login credentials. As mCrime evolves and criminals begin to make some money, they will have the resources to hire crackerjack programmers to do their deeds...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Thirty Percent of EU Internet Users Affected by Worm in 2010

February 26, 2011 Added by:Bill Gerneglia

These figures were reported by Eurostat, the European Union's office of statistics. They recently stated that 31% of all Internet users in the 27 EU member nations had contracted a computer virus that resulted in "loss of information or time" in the second quarter of 2010...

Comments  (0)

65d49ca4cbc75b022e39535c917d55d1

How Fast Do Cybergangs Use Stolen Credit Cards?

February 23, 2011 Added by:rebekah donaldson

Julie Fergerson recently published “Fraud Attacks Cross Industries,” co-authored with Dr. Daniele Micci-Barreca of Elite Analytics. The study is based on analysis of 25,188 cases of confirmed fraud involving 95 merchants that represent 61% of the top 500 Internet merchants...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

The Evolution of Endpoint Attacks

February 22, 2011 Added by:Don Eijndhoven

Endpoint protection will remain the name of the game, and what software vendors are doing right now isn't working. Its a failing approach that’s becoming increasingly obvious with each new report of a major breach. A change needs to be made before Organized Crime realizes its full potential...

Comments  (3)

0b8d1c9dc5f4a80e6646d8d18b8683fe

Norton Cybercrime Index

February 17, 2011 Added by:Ben Keeley

Norton (Symantec) released a new cybercrime tool, it's pitched as a tool that 'measures and warns people about cybercrime risks around the world'. At first glance the Internet version is a very slick and smooth interface, which displays recent trends for ID theft, malware, spam and fraud...

Comments  (1)

37d5f81e2277051bc17116221040d51c

How Does Device Reputation Protect Me?

February 16, 2011 Added by:Robert Siciliano

Device reputation spots online evildoers by examining the computer, smartphone, or tablet they are using to connect to any website. If a device is recognized as having previously committed some type of unwanted behavior, the website has the opportunity to reject the transaction...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Variants Infesting More Websites

February 07, 2011 Added by:Headlines

Security firm Trusteer reports that a recent survey has revealed that an increasing number of websites are now known to host Zeus variants. The report also shows that a growing number of networks are hosting command and control operations for Zeus-based botnets...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Drug Cartels Profiting from Malware and Pirated Software

February 04, 2011 Added by:Headlines

David Finn, associate general counsel at Microsoft, cites evidence that criminal organizations are finding software piracy to be lucrative. One Mexican cartel is thought to make as much as $2.2 million dollars per day distributing pirated software. That is big business...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Small Romanian Town Has Become Cyber Crime Central

February 03, 2011 Added by:Headlines

A fascinating article explores how a small Romanian town has evolved to become an international center for cybercrime operations. In Râmnicu Vâlcea, a remote village in the Southern Carpathian foothills, online predatory networks have brought a flood of new wealth to the once agrarian community...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Good Reasons to Secure Your Facebook Profile

January 25, 2011 Added by:Theresa Payton

Make sure you have a strong password on your accounts, and Review your Facebook profile to see how much information you share about yourself that could be used to impersonate you - high school attended, pet's name, favorite color, etc...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Soundminer Trojan Listens for Credit Card Numbers

January 23, 2011 Added by:Headlines

"We implemented Soundminer on an Android phone and evaluated our technique using realistic phone conversation data. Our study shows that an individual's credit card number can be reliably identified and stealthily disclosed. Therefore, the threat of such an attack is real..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Criminal Networks Thrive in Online Black Markets

January 21, 2011 Added by:Headlines

PandaLabs researchers have discovered that criminal networks are selling stolen credit card information for as little as $2.00. For a mere $700.00, someone can purchase account credentials that guarantee access to balances of at least $80,000.00 - just pennies on the dollar for the potential yield...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Steal Millions in EU Carbon Trading Credits

January 20, 2011 Added by:Headlines

The EU Emissions Trading Scheme has suspended all carbon emissions trading until January 26th after hackers breached networks and pilfered millions in pollution credits. The credits stolen form the Czech accounts are estimated to be worth as much as seven million Euros, according to reports...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Six Important Enterprise Security Lessons for Executives

January 19, 2011 Added by:Headlines

Information theft accounts for 42 percent of total external costs. Costs associated with disruption to business or lost productivity accounts for 22 percent of external costs... Tangential to these costs is the expense by damage from negative press and lost customer/shareholder confidence...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Spam is Down But New Scam Methods Will Be Up

January 18, 2011 Added by:Theresa Payton

Is your email inbox suddenly a little leaner? Less Viagra and Penny Stock emails getting through? It's all a great sign for the war against spam, but experts are worried that since criminals go where the action is, they are just up to new tricks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cybersecurity's 'Perfect Storm' Made Landfall

January 17, 2011 Added by:Headlines

Security expert Mandeep Khera warned that the next decade would see an escalation in cybercrime and the use of cyberwarfare tactics. In light of the rise of the Stuxnet, the Zeus Trojan and the shifting strategies employed by online criminals, Khera's predictions are worth a revisit...

Comments  (0)

Page « < 11 - 12 - 13 - 14 - 15 > »