Items Tagged with "Cyber Crime"
June 30, 2011 Added by:Headlines
“The development of TDSS will continue. Active reworkings of TDL-4 code, rootkits for 64-bit systems, the use of P2P technologies, proprietary anti-virus and much more make the TDSS malicious program one of the most technologically developed and most difficult to analyze..."
June 29, 2011 Added by:Headlines
Operation Phish Phry revealed how Egyptian hackers obtained account numbers and personal identification information from bank customers through phishing — a technique that involves sending e-mail messages that appear to be official correspondence from banks or credit card vendors...
June 27, 2011 Added by:Headlines
"The Security Service of Ukraine, in coordination with the law enforcement agencies of United States, Great Britain, Netherlands, France, Germany, Latvia, Cyprus and other countries (10 in total), defeated illegal activity of the international criminal group of hackers..."
June 26, 2011 Added by:Lee Munson
You are not going to find much sympathy by most people since you are out there doing something illegal. So you must be just like the rest of the criminal world and prepare to live your life by trusting very few people and always be aware that anyone can turn on you...
June 23, 2011 Added by:Headlines
“The FBI, collaborating with our international law enforcement and prosecution partners, have worked tirelessly to disrupt two significant cybercriminal networks. Their efforts demonstrate that no matter the country, Internet criminals will be pursued, caught and prosecuted...”
June 02, 2011 Added by:Luis Corrons
In the security industry we don’t usually look at copyright violations, but at cybercriminals that want to steal money and information. The fight takes place in a number of fields, but we shouldn’t forget that we are not police officers even though we are fighting against the same bad guys...
May 24, 2011 Added by:Headlines
Small and medium-sized organizations have become the primary targets of the Eastern European hacker gangs behind this frightening new crime wave. These cybercriminals tend to prey on smaller businesses and banks that lack the cyber-fraud controls many larger institutions have in place...
May 18, 2011 Added by:Headlines
While the number honored in 2011 represents a promising 3-fold increase from this time last year, 74% of the top websites analyzed did not qualify and remain vulnerable to the increased levels of cybercrime and online fraud...
May 15, 2011 Added by:Roman Yudkin
It's great news that more websites are strengthening online authentication. When one considers how much sensitive, personal information people share on the Web, relying on a single layer of password protection simply is not enough...
May 11, 2011 Added by:Headlines
"With the source code in the wild it's likely we'll see an increase in attacks since lots of potential criminals might have been lacking both financials and trustworthiness to obtain their own license of this kit. Now being available as source code we'll likely see rebranding and modifications..."
May 11, 2011 Added by:Headlines
Criminals exploit tragedies like the recent tornadoes that affected several Southern states for their own gain by sending fraudulent e-mails and creating phony websites designed to solicit contributions. The FBI has already received complaints alleging fraudulent schemes...
May 10, 2011 Added by:Headlines
"The cyber underground now consist of subject matter experts that can focus all their time and energy on improving their techniques, their goods and services," said Steven Chabinsky, deputy assistant director in the FBI's cyber division...
May 04, 2011 Added by:Robert Siciliano
Many gaming sites have increased efforts to detect suspicious players, but savvy criminals have learned to mask their true identities, changing account information to circumvent conventional methods of fraud detection...
April 30, 2011 Added by:Anton Chuvakin
Log reviews detect breaches LESS OFTEN than “happenstance discovery by unrelated 3rd party”. Why? Because you ain’t doing that log review, and so random people stumbling on your weeks-old breach evidence is more "effective" than your log analysis. This is how bad things really are...
April 25, 2011 Added by:Robert Siciliano
These virtual dollars and virtual goods have real value. Virtual currency includes the points customers receive from retailers, merchants, airlines, hotels, and credit card companies through loyalty programs. These points are the second most traded currency on the planet...
April 19, 2011 Added by:Jared Carstensen
The recent economic growth in Europe (bank bailouts aside), upgrades to infrastructure, communications, and internet speeds, coupled with the reduced costs of equipment required for cyber criminals to operate, has greatly assisted cyber criminals and cartels in their mission...