Items Tagged with "Cyber Crime"


94ae16c30d35ee7345f3235dfb11113c

Let’s Put Real War In To Cyberwar

April 19, 2012 Added by:Joel Harding

Why isn’t infosec effective? Because we already admitted defeat. Hackers have nothing to fear. Their computer might be confiscated, they might spend a few cozy months in some minimum security prison, and then they will get recruited by an offensively oriented corporation...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

From Fraud to Infosec and Vice Versa... Part 1

April 18, 2012 Added by:Neira Jones

To all of you infosec professionals out there: one way to show you add value is get closer to your fraud colleagues and try to understand what their big ticket items are. You can even ask them the right questions as the big ticket items are more than likely those detailed here...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Dismisses Zeus Botnet Takedown Criticism

April 17, 2012 Added by:Headlines

"The chief criticism is that the Microsoft operation exposed sensitive information that a handful of researchers had shared in confidence, and that countless law enforcement investigations may have been delayed or derailed as a result..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

A Detailed Analysis of the DDoS Phenomena

April 16, 2012 Added by:Pierluigi Paganini

The report showed 19.1TB of data and 14 billion packets of malicious traffic were aimed at financial services during Q4 2011, and that the traffic increased during Q1 2012, with 65TB of data and 1.1 trillion packets that were identified and mitigated. The figures are amazing...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Botnets a Growing National Security Concern

April 13, 2012 Added by:Pierluigi Paganini

There is no clear line between cybercrime and cyber warfare, and botnets are a serious threat with tremendous offensive potential. Through a botnet it is possible to attack the nerve centers of a country, and isolated attacks can target critical infrastructure...

Comments  (1)

Bd623fa766512fdf6b57db66f522b741

A Navy SEAL Provides Lessons on Security

April 12, 2012 Added by:Ali-Reza Anghaie

Powerful Peace absolutely applies in our field. Information Security professionals can draw out the roadmap to economic and potential physical catastrophe. In this field we won't have the benefit of hindsight, we need to get it right before it gets out of control...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Takes Aim at Cloud Payroll Services

April 12, 2012 Added by:Headlines

"Zeus captures a screenshot of a Ceridian payroll services web page when a corporate user whose machine is infected... visits this website. This allows Zeus to steal the user id, password, company number and the icon selected by the user for the image-based authentication system..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Officials Warn of Global Cyber Arms Race

April 11, 2012 Added by:Headlines

"What we're looking at is a global cyber arms race. It's not proceeding at a leisurely or even a linear fashion but in fact is accelerating. I wouldn't claim that it's following Moore's law, but the curve looks kind of similar," said U.S. Cyber Command's Rear Admiral Samuel Cox...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

European Union Set to Establish Cybercrime Center

April 11, 2012 Added by:Headlines

The European center will warn of major cybercrime threats and weaknesses in online defenses. It will identify organized cyber-criminal networks and will provide operational support in concrete investigations and provide forensic assistance...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The FBI Discusses Internet Social Networking Risks

April 05, 2012 Added by:Infosec Island Admin

Social networking sites have created a revolution in connectivity. However, con artists, criminals, and other actors are exploiting this capability for nefarious purposes. There are primarily two tactics used to exploit social networks. In practice, they are often combined...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS: Don’t be Fooled by Too Good to be True Websites

April 03, 2012 Added by:Headlines

According to a recent report, the fan craze created by the film The Hunger Games has created the perfect opportunity for devious cybercriminals to take advantage of Internet users. While clicking on a link may seem innocent enough, it can actually infect your device...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Criminals Top Secret Service Most Wanted List

April 02, 2012 Added by:Headlines

The majority of fugitives on the Secret Service's top ten most wanted list can be described as "cyber criminals". While the objectives remain the same, the ubiquity of the digital systems that pervade every aspect of our culture presents a new set of challenges for law enforcement...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Video: FBI's Top Cyber Official Discusses Threats

March 30, 2012

"Those early attacks were much more intermittent. We are seeing literally thousands of attacks a day. The ones people hear about are often because victims are coming forward. And there are more substantial attacks that people don’t ever see or hear about..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

OTA Updates April Fool’s List to Combat Spear Phishing

March 29, 2012 Added by:Headlines

“While businesses are making efforts, all too often they are overlooking the fundamentals which could curb upwards of 90% of online threats to their data. We have a shared responsibility to harden our systems and those of our customers..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Majority of SpyEye Trojan C and C Located in United States

March 28, 2012 Added by:Headlines

"SpyEye, along with ZeuS, are notorious banking Trojans that have helped thieves steal more than $100 million around the world. Without an end-user PC solution, banks face great difficulty protecting individual customers from the sophisticated threats posed..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Reflections on the Zero-Day Exploits Market

March 26, 2012 Added by:Pierluigi Paganini

Once the vulnerability and exploit are found, the researcher must be able to in a short time identify the possible customers, then contact them for negotiating the price and completing the sale. There are concrete risks...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »