Items Tagged with "Cyber Crime"


03b2ceb73723f8b53cd533e4fba898ee

FBI on Bitcoin: Cybercrime, Opportunity and Digital Choice

May 11, 2012 Added by:Pierluigi Paganini

The real danger of digital money, above the vulnerabilities in its processes, is the inability of governments to exert control over finances, which could lead to a distortion of the main mechanisms of economic control and taxation, bringing total chaos to the market...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

IC3 Releases 2011 Internet Crime Report

May 11, 2012

“Internet crime is a growing problem that affects computer users around the world and causes significant financial losses. The IC3 is an efficient mechanism for the public to report suspicious e-mail activity, fraudulent websites, and Internet crimes..."

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

The Fight Against Spam Might Get a Little Easier

May 11, 2012 Added by:Theresa Payton

Facebook recently announced efforts to stop spammers by creating the Antivirus Marketplace. The service will provide a free six month license to antivirus software. McAfee, Symantec, Sophos and others are teaming with Facebook to offer free antivirus software...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Busting the Ten Biggest Computer Security Myths

May 08, 2012 Added by:Headlines

While some of the myths addressed may seem to be common sense issues, they also represent widespread misconceptions that continue to be pervasive in the information technology world today, so a reminder that these notions are bunk seems in order...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Trojans Dominate New Malware Development Sampled

May 07, 2012 Added by:Headlines

In the first quarter of 2012 alone, six million new malware samples were created, following the trend of increasingly of previous years. Trojans set a record as the preferred category of cybercriminals for carrying out information theft, representing 80 percent of new malware...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Anonymous Reloaded: Yesterday, Today, and Tomorrow

May 04, 2012 Added by:Pierluigi Paganini

Anonymous must be analyzed with a multidisciplinary approach, it is an amorphous creature that quickly changes and is able to adapt its behavior to the context needed for successful attacks, thanks to the large and heterogeneous participation in its collective...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cybersecurity at the International Level

May 02, 2012 Added by:Headlines

Countries are drafting policies to combat cyber attacks, but what can be done on the multilateral level since the digital world routinely ignores national boundaries? So far, international initiatives are plagued by the lack of frameworks, institutions and procedures...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

On the Growth of Identity Theft

May 01, 2012 Added by:Pierluigi Paganini

It is clear that criminal organizations are devoting substantial resources in this sector. An increasing component of organized crime is specializing in this kind of activity characterized by high profits and low risks compared to traditional criminal activities...

Comments  (2)

94ae16c30d35ee7345f3235dfb11113c

Russian Cybercrime Pays

April 30, 2012 Added by:Joel Harding

Group iB has produced a report citing Russian cybercrime is responsible for almost one-third of all online crime. Not only are the details amazing, but the breakdown of the various types of crimes are illuminating. It t is a good primer on the various types of cybercrime...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Domains Selling Stolen Credit Card Numbers Seized

April 30, 2012 Added by:Headlines

“By seizing the websites the criminal underground uses to blatantly sell stolen personal information, Operation Wreaking hAVoC shows that we are committed to protecting individuals online and preventing criminals from using the Internet to line their pockets..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Russian Cybercrime: Not Just a Localized Threat

April 25, 2012 Added by:Pierluigi Paganini

The official estimates say that the global cyber crime market was worth $12.5 billion in 2011, and $4,5 billion of the market share is related to the Russian cybercrime market with $2.3 billion taking place in Russia alone. Compared to last year, the problem has doubled...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Why Taunting Computer Hackers Isn’t a Good Idea

April 25, 2012 Added by:Robert Siciliano

UFC President issued the challenge to hackers because he supports SOPA and PIPA, and UFC.com was hacked. Kicking a hornets’ nest isn’t advisable, and neither is taunting criminal hacktivists who have lots of time and resources to make your business network a target...

Comments  (1)

9f19bdb2d175ba86949c352b0cb85572

From Fraud to Infosec and Vice Versa... Part 2

April 23, 2012 Added by:Neira Jones

In my previous post I summarized fraud and how it relates to infosec. Key enablers used to defraud victims of all types cut across the landscape and often overlap, posing further challenges for quantifying their impact, but the classifications are nonetheless helpful...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Online Narcotics Marketplace Utilized TOR

April 23, 2012 Added by:Headlines

“The drug trafficking organization... was distributing dangerous and addictive drugs to every corner of the world, and trying to hide their activities through the use of advanced anonymizing on-line technology...”

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

On Cyber Threats in the Mobile Environment

April 20, 2012 Added by:Pierluigi Paganini

Mobile threats should alarm private industry, as the risk of data exposure is high due the growth of the mobile sector. Cyber criminals and governments are aware of the value of information to be gained from our mobile devices and are showing an increased interest in the sector...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

CIOs and Securing Data with Analytics

April 19, 2012 Added by:Bill Gerneglia

This expanding rate of potential threats call for a new way to approach corporate data security. The latest approach is one that is based on intelligence and BI tools. Security intelligence applies advanced analytics and automation technology to the collection of information from hundreds of sources across an organization...

Comments  (1)

Page « < 2 - 3 - 4 - 5 - 6 > »