Blog Posts Tagged with "Cyber Crime"
June 18, 2012 Added by:Pierluigi Paganini
"Every peer in the botnet can act as a C&C server, while none of them really are one. Bots are now capable of downloading commands, configuration files, and executable from other bots -- every compromised computer is capable of providing data to the other bots..."
June 18, 2012 Added by:gaToMaLo r. amores
On April 24 the FBI released a report on Bitcoin. At that time Bitcoins were going for $4.25. As of June 17 they were trading at $6.26. Traders will be taking a look at Bitcoin, and once they get a whiff of the virtual money, they will strike... and it looks like the commercial criminals are already doing it...
June 17, 2012 Added by:Theresa Payton
Cyber criminals love to be where the action is, and they know this is a peak travel season, so they have found the perfect hiding place: Travel confirmations. They realize that more people are booking travel online and receiving their travel confirmations via email...
June 13, 2012 Added by:Headlines
While the objective of criminal elements largely remains the same, the ubiquity of the digital systems that pervade every aspect of our culture present a new set of challenges for law enforcement, and new breed of criminal. The following are the Federal Bureau of Investigations "most wanted" cyber crooks...
June 12, 2012 Added by:Robert Siciliano
EFTPOS skimming — which stands for “electronic funds transfers at the point of sale” — involves either replacing the self-swipe point of sale terminals at cash registers with devices that record credit and debit card data, or remotely hacking a retailer’s POS server...
June 09, 2012 Added by:Jason Clark
The LinkedIn breach made headlines, but I want to go deeper and provide practical advice for organizations on how they can anticipate DLP consequences and tighten network security. You need a strategy to protect against attack scenarios. Here’s a seven-step check list for mitigating your risk...
May 31, 2012 Added by:Jorge Mieres
Despite being a package for criminal exploitation within a vast range of alternatives, it remains a real risk for any information system. Consider that the Hierarchy Exploit Pack in the criminal markets has reached a stage where it is found among the best crimeware available...
May 30, 2012 Added by:Headlines
“Bo Zhang may have thought that he left no fingerprints when he engaged in his high-tech thievery—stealing proprietary government software worth nearly $10 million using little more than a mouse—but he was mistaken. He was caught in his tracks and now he will be punished for his cyber-thievery"...
May 25, 2012 Added by:Pierluigi Paganini
The Deep Web is considered the place where everything is possible, you can find every kind of good and service for sale, but most of them are illegal. The hidden web offers cybercrime great business opportunities, hacking services, malware, stolen credit cards, weapons, etc...
May 21, 2012 Added by:Bill Gerneglia
As the severity of cyber-crimes continues to grow, it’s important to understand the types of malware involved and how they work. Many forms of malware might be familiar, but they evolve as counter measures force adaptation. Today, the adaptation is driven by professional criminals...
May 17, 2012 Added by:Headlines
"Utilizing less than 2% of the entire botnet the attackers were able to generate $14,000 in three weeks, meaning that if the attackers were able to use the entire botnet, they could potentially have earned millions of dollars a year..."
May 16, 2012 Added by:Headlines
"We've recently discovered a series of attacks being carried out by a P2P variant of the Zeus platform against some of the internet’s leading online services... The attacks are targeting users of Facebook, Google Mail, Hotmail and Yahoo – offering rebates and new security measures..."
May 15, 2012 Added by:Pierluigi Paganini
IC3 represents a perfect example of how technological services could help in the prevention and analysis of criminal activities, and highlights that the real weapon against Internet crime is awareness and information sharing...
May 15, 2012 Added by:Headlines
A principal figure in the domestic arm of an international “phishing” operation that used spam e-mails and bogus websites to defraud American banks was found guilty of bank and wire fraud, identity theft, computer fraud, and money laundering and sentenced to five years in federal prison...
May 14, 2012 Added by:Beau Woods
Although many studies fail at basic science, I'm hopeful that the information security industry will get better both at true academic research and at coming up with accurate metrics for the most important data. We'll get there as we mature as an industry, but it will take a while...
May 11, 2012 Added by:Pierluigi Paganini
The real danger of digital money, above the vulnerabilities in its processes, is the inability of governments to exert control over finances, which could lead to a distortion of the main mechanisms of economic control and taxation, bringing total chaos to the market...
Interoperability: A Much Needed Cloud Comput... ryan mccarthy on 04-17-2014
On Secure and Agile Collaboration... Kylie Wilson on 04-17-2014
Achieving Code Compliance in an Agile Enviro... Kylie Wilson on 04-17-2014