Blog Posts Tagged with "Cyber Crime"
May 11, 2012 Added by:Theresa Payton
Facebook recently announced efforts to stop spammers by creating the Antivirus Marketplace. The service will provide a free six month license to antivirus software. McAfee, Symantec, Sophos and others are teaming with Facebook to offer free antivirus software...
May 08, 2012 Added by:Headlines
While some of the myths addressed may seem to be common sense issues, they also represent widespread misconceptions that continue to be pervasive in the information technology world today, so a reminder that these notions are bunk seems in order...
May 07, 2012 Added by:Headlines
In the first quarter of 2012 alone, six million new malware samples were created, following the trend of increasingly of previous years. Trojans set a record as the preferred category of cybercriminals for carrying out information theft, representing 80 percent of new malware...
May 04, 2012 Added by:Pierluigi Paganini
Anonymous must be analyzed with a multidisciplinary approach, it is an amorphous creature that quickly changes and is able to adapt its behavior to the context needed for successful attacks, thanks to the large and heterogeneous participation in its collective...
May 02, 2012 Added by:Headlines
Countries are drafting policies to combat cyber attacks, but what can be done on the multilateral level since the digital world routinely ignores national boundaries? So far, international initiatives are plagued by the lack of frameworks, institutions and procedures...
May 01, 2012 Added by:Pierluigi Paganini
It is clear that criminal organizations are devoting substantial resources in this sector. An increasing component of organized crime is specializing in this kind of activity characterized by high profits and low risks compared to traditional criminal activities...
April 30, 2012 Added by:Joel Harding
Group iB has produced a report citing Russian cybercrime is responsible for almost one-third of all online crime. Not only are the details amazing, but the breakdown of the various types of crimes are illuminating. It t is a good primer on the various types of cybercrime...
April 30, 2012 Added by:Headlines
“By seizing the websites the criminal underground uses to blatantly sell stolen personal information, Operation Wreaking hAVoC shows that we are committed to protecting individuals online and preventing criminals from using the Internet to line their pockets..."
April 25, 2012 Added by:Pierluigi Paganini
The official estimates say that the global cyber crime market was worth $12.5 billion in 2011, and $4,5 billion of the market share is related to the Russian cybercrime market with $2.3 billion taking place in Russia alone. Compared to last year, the problem has doubled...
April 25, 2012 Added by:Robert Siciliano
UFC President issued the challenge to hackers because he supports SOPA and PIPA, and UFC.com was hacked. Kicking a hornets’ nest isn’t advisable, and neither is taunting criminal hacktivists who have lots of time and resources to make your business network a target...
April 23, 2012 Added by:Neira Jones
In my previous post I summarized fraud and how it relates to infosec. Key enablers used to defraud victims of all types cut across the landscape and often overlap, posing further challenges for quantifying their impact, but the classifications are nonetheless helpful...
April 23, 2012 Added by:Headlines
“The drug trafficking organization... was distributing dangerous and addictive drugs to every corner of the world, and trying to hide their activities through the use of advanced anonymizing on-line technology...”
April 20, 2012 Added by:Pierluigi Paganini
Mobile threats should alarm private industry, as the risk of data exposure is high due the growth of the mobile sector. Cyber criminals and governments are aware of the value of information to be gained from our mobile devices and are showing an increased interest in the sector...
April 19, 2012 Added by:Bill Gerneglia
This expanding rate of potential threats call for a new way to approach corporate data security. The latest approach is one that is based on intelligence and BI tools. Security intelligence applies advanced analytics and automation technology to the collection of information from hundreds of sources across an organization...
April 19, 2012 Added by:Joel Harding
Why isn’t infosec effective? Because we already admitted defeat. Hackers have nothing to fear. Their computer might be confiscated, they might spend a few cozy months in some minimum security prison, and then they will get recruited by an offensively oriented corporation...
April 18, 2012 Added by:Neira Jones
To all of you infosec professionals out there: one way to show you add value is get closer to your fraud colleagues and try to understand what their big ticket items are. You can even ask them the right questions as the big ticket items are more than likely those detailed here...
Expect More Internet Anarchy with Dawn of Sc... Neeraj kumar on 01-26-2015
Dark Technology: Are You (Unknowingly) Putti... ut ut on 01-26-2015
Security Spending Wasted When Software Goes ... ut ut on 01-26-2015