Cybercrime stories - Page 37
Any use of network connected electronic devices such as computers or smartphones for criminal activity
is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as
‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers
and other malware, the download and use of malware produced by others, social engineering tactics
such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer
systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with
cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also
occasionally seeking to disrupt, embarrass or shame their targets.
New cybersecurity export strategy from UK govt to bolster global defences
Tue, 27th Mar 2018
#
martech
#
cybersecurity
#
government
The UK government today announced the launch of a new strategy to support the export of the nation's cybersecurity technologies.
SURVEY: 70% of customers would leave a business after a breach
Mon, 26th Mar 2018
#
encryption
#
breach prevention
#
data privacy
A recent study from Gemalto proves it's not just data that is lost following a breach – you'll lose most of your customers too.
Report finds legacy cybersecurity a cinch for modern cybercrime
Fri, 23rd Mar 2018
#
malware
#
ransomware
#
phishing
Data collected in 2017 shows that attacks like ransomware and cryptojacking are easily bypassing legacy security solutions due to lax businesses.
Report uncovers big business of cybercrime – but just how big?
Thu, 22nd Mar 2018
#
ddos
#
cybersecurity
#
dark web
'Would you like anything else with your $10 DDoS attack-as-a-service sir?' Armor's report paints a disturbing picture of the cybercrime market.
Not a Bitcoin owner? You're still fair game for a cryptomining attack
Wed, 21st Mar 2018
#
crypto
#
blockchain
#
cybersecurity
Check Point has released a 'cryptomining 101' document that details how cybercriminals hack into devices to steal their CPU power for illicit mining.
Cryptomining malware affected 42% organisations worldwide in Feb
Tue, 20th Mar 2018
#
malware
#
cybersecurity
#
cybercrime
This persistent threat not only continues to chip away at enterprise CPU power, but once inside a network can carry out other malicious acts.
Facebook breach of 50 MILLION profiles: What we know so far
Mon, 19th Mar 2018
#
data analytics
#
martech
#
planning
A whistleblower has uncovered the practices of his illicit company, which include stealing the details of 50m Facebook users to help Trump's campaign.
Qrypter Remote Access Trojan targeting NZ & Australia web domains
Mon, 19th Mar 2018
#
malware
#
casb
#
cybersecurity
A RAT called Qrypter has been used to target organisations around the globe, including those in New Zealand and Australia.
Cybercriminals laundering $200b in ill-gotten gains – here's how
Sat, 17th Mar 2018
#
gaming
#
crypto
#
blockchain
A new report from Bromium has landed with a number of startling findings, including the confirmation of a bustling cybercrime laundry market.
New report finds race to the cloud in EMEA outpacing cybersecurity
Fri, 16th Mar 2018
#
firewalls
#
network infrastructure
#
network security
The relentless rush to cloud adoption is coming at the detriment to cybersecurity with some countries in EMEA worse than others.
New study details how easy it is for hackers to steal your data
Thu, 15th Mar 2018
#
malware
#
cybersecurity
#
hackers
It's no secret that web browsers store a substantial amount of sensitive information about their users - hackers are taking advantage of this.
NHS staff breaking data security policies every day with WhatsApp
Wed, 14th Mar 2018
#
cybersecurity
#
healthtech
#
whatsapp
The 'unsustainable' issue of NHS staff using consumer instant messaging services is actually much bigger than has been previously reported.
RSA Security director dissects identity & access management industry
Tue, 13th Mar 2018
#
iam
#
cybersecurity
#
cybercrime
As well as emerging technologies, Steve spoke about the future, the implications of GDPR, & strategies that businesses can use to overcome challenges.
New research finds China tampering with public vulnerability data
Mon, 12th Mar 2018
#
cybersecurity
#
fraud
#
cybercrime
Recorded Future believes China has been altering public vulnerability data to allow the Ministry of State Security to play with it first.
Engineer says Emirates is virtually handing customer data to hackers
Fri, 9th Mar 2018
#
storage
#
breach prevention
#
wireless networks
After the allegations about Emirates' customer data policies emerged, High-Tech Bridge ran a test on the site's security - with interesting results.
Blueliv makes plea for cybercrime intelligence sharing across industries
Thu, 8th Mar 2018
#
malware
#
uc
#
data privacy
With malware continually evolving, Blueliv says it's crucial that the 'good guys' begin to collaborate in the fight against cybercrime.
Are remote workers really the answer? Report finds huge security issues
Wed, 7th Mar 2018
#
network infrastructure
#
wireless networks
#
hybrid & remote work
The swelling generation of mobile workers is causing headaches for IT staff with more than half connecting to unsecured networks every week.
REPORT: Ransomware decreasing in quantity but increasing in potency
Wed, 7th Mar 2018
#
malware
#
ransomware
#
supply chain
A new report from SonicWall has shed light on the current threat landscape with the company recording an astonishing 9.32b malware attacks in 2017.
GDPR is imminent but 69% of businesses can't secure customer data
Wed, 7th Mar 2018
#
storage
#
data protection
#
data privacy
GDPR is looming (May 25) over the heads of IT staff throughout Europe and beyond but this survey found data is still not being managed properly.
Cybercriminals likely to attempt GDPR extortion for greater ROI
Thu, 1st Mar 2018
#
malware
#
ransomware
#
phishing
Trend Micro says cybercriminals are becoming more business-minded and are likely to target organisations that are trying to comply with GDPR.