Items Tagged with "Cyber Crime"


69dafe8b58066478aea48f3d0f384820

Researchers Uncover 4.5 Million Device Super-Botnet

June 30, 2011 Added by:Headlines

“The development of TDSS will continue. Active reworkings of TDL-4 code, rootkits for 64-bit systems, the use of P2P technologies, proprietary anti-virus and much more make the TDSS malicious program one of the most technologically developed and most difficult to analyze..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Phishing Ring Leader Sentenced to Thirteen Years

June 29, 2011 Added by:Headlines

Operation Phish Phry revealed how Egyptian hackers obtained account numbers and personal identification information from bank customers through phishing — a technique that involves sending e-mail messages that appear to be official correspondence from banks or credit card vendors...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Authorities Bust $72 Million Dollar Conficker Fraud Ring

June 27, 2011 Added by:Headlines

"The Security Service of Ukraine, in coordination with the law enforcement agencies of United States, Great Britain, Netherlands, France, Germany, Latvia, Cyprus and other countries (10 in total), defeated illegal activity of the international criminal group of hackers..."

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

One in Four Cyber Criminals Turn In Their Friends

June 26, 2011 Added by:Lee Munson

You are not going to find much sympathy by most people since you are out there doing something illegal. So you must be just like the rest of the criminal world and prepare to live your life by trusting very few people and always be aware that anyone can turn on you...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

FBI Disrupts International Scareware Crime Ring

June 23, 2011 Added by:Headlines

“The FBI, collaborating with our international law enforcement and prosecution partners, have worked tirelessly to disrupt two significant cybercriminal networks. Their efforts demonstrate that no matter the country, Internet criminals will be pursued, caught and prosecuted...”

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

The Security Industry’s Dirty Linen

June 02, 2011 Added by:Luis Corrons

In the security industry we don’t usually look at copyright violations, but at cybercriminals that want to steal money and information. The fight takes place in a number of fields, but we shouldn’t forget that we are not police officers even though we are fighting against the same bad guys...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Research Reveals Widespread Vulnerability to Phishing

May 24, 2011 Added by:Headlines

Small and medium-sized organizations have become the primary targets of the Eastern European hacker gangs behind this frightening new crime wave. These cybercriminals tend to prey on smaller businesses and banks that lack the cyber-fraud controls many larger institutions have in place...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

OTA Scorecard: 74% Fail to Protect Consumers Online

May 18, 2011 Added by:Headlines

While the number honored in 2011 represents a promising 3-fold increase from this time last year, 74% of the top websites analyzed did not qualify and remain vulnerable to the increased levels of cybercrime and online fraud...

Comments  (0)

485f5553442ebdfbfa4926166697c319

The Problem with Two-Factor Authentication Solutions

May 15, 2011 Added by:Roman Yudkin

It's great news that more websites are strengthening online authentication. When one considers how much sensitive, personal information people share on the Web, relying on a single layer of password protection simply is not enough...

Comments  (7)

69dafe8b58066478aea48f3d0f384820

Source Code for Zeus Crimeware Toolkit Disclosed

May 11, 2011 Added by:Headlines

"With the source code in the wild it's likely we'll see an increase in attacks since lots of potential criminals might have been lacking both financials and trustworthiness to obtain their own license of this kit. Now being available as source code we'll likely see rebranding and modifications..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI: Tips for Avoiding Charitable Contribution Scams

May 11, 2011 Added by:Headlines

Criminals exploit tragedies like the recent tornadoes that affected several Southern states for their own gain by sending fraudulent e-mails and creating phony websites designed to solicit contributions. The FBI has already received complaints alleging fraudulent schemes...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Cyber Crime Skills in High Demand

May 10, 2011 Added by:Headlines

"The cyber underground now consist of subject matter experts that can focus all their time and energy on improving their techniques, their goods and services," said Steven Chabinsky, deputy assistant director in the FBI's cyber division...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Hackers Cheat a Stock Market Game

May 04, 2011 Added by:Robert Siciliano

Many gaming sites have increased efforts to detect suspicious players, but savvy criminals have learned to mask their true identities, changing account information to circumvent conventional methods of fraud detection...

Comments  (0)

Ebb72d4bfba370aecb29bc7519c9dac2

Notes on the Verizon 2011 Data Breach Investigations Report

April 30, 2011 Added by:Anton Chuvakin

Log reviews detect breaches LESS OFTEN than “happenstance discovery by unrelated 3rd party”. Why? Because you ain’t doing that log review, and so random people stumbling on your weeks-old breach evidence is more "effective" than your log analysis. This is how bad things really are...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Hackers Go After Points, Credits, and Virtual Currency

April 25, 2011 Added by:Robert Siciliano

These virtual dollars and virtual goods have real value. Virtual currency includes the points customers receive from retailers, merchants, airlines, hotels, and credit card companies through loyalty programs. These points are the second most traded currency on the planet...

Comments  (0)

27ef2e87221c355f517e2824b19f7ca6

European Cybercrime 10 Years On - Why It’s Not Working

April 19, 2011 Added by:Jared Carstensen

The recent economic growth in Europe (bank bailouts aside), upgrades to infrastructure, communications, and internet speeds, coupled with the reduced costs of equipment required for cyber criminals to operate, has greatly assisted cyber criminals and cartels in their mission...

Comments  (2)

Page « < 9 - 10 - 11 - 12 - 13 > »