Cybercrime stories - Page 21
Any use of network connected electronic devices such as computers or smartphones for criminal activity
is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as
‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers
and other malware, the download and use of malware produced by others, social engineering tactics
such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer
systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with
cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also
occasionally seeking to disrupt, embarrass or shame their targets.
LogRhythm divulges eight key predictions for cybersecurity in 2018
Tue, 5th Dec 2017
#
malware
#
ddos
#
ransomware
The predictions for the new year include both good news and bad news, like the biggest data breach settlement of all time and increased awareness.
How you can bolster cybersecurity in the IoT era
Fri, 1st Dec 2017
#
ddos
#
iot
#
cybersecurity
IoT will be present in 95% of electronic products for new product designs by 2020 - this means we need to make some drastic cybersecurity changes.
2017’s threat landscape report shows ransomware epidemic
Thu, 30th Nov 2017
#
malware
#
ransomware
#
breach prevention
Cyberthreats have changed significantly in 2017 - Bitdefender's annual report shows one in six spam emails now contain some form of ransomware.
Holiday alert: Cyberattacks can rise over 20 per cent starting now
Wed, 29th Nov 2017
#
cybersecurity
#
carbon black
#
cybercrime
As we approach the holidays organisations need to be on the lookout for cyber attacks if history offers an indication of what's to come.
Cybercrime selling like hotcakes: Ransomware sales soar 2500% in one year
Tue, 28th Nov 2017
#
malware
#
ransomware
#
cybersecurity
The way criminals ply their trade has changed dramatically since the rise of the digital era, and not for the better – at least for the victims.
Cisco & Interpol embark on rapid threat intelligence sharing partnership
Mon, 27th Nov 2017
#
cybersecurity
#
cisco
#
cybercrime
Cisco and INTERPOL’s Global Complex for Innovation (IGCI) are now working together to share threat intelligence.
Round 2: New line-up of cybersecurity maestros comment on Uber breach
Fri, 24th Nov 2017
#
firewalls
#
breach prevention
#
ai security
We covered an expert commentary story of the Uber breach - this is round 2 with Check Point, Barracuda, Digital Shadows, Mimecast, and Webroot.
Experts share their opinions on Uber breach - some supportive, some scathing
Thu, 23rd Nov 2017
#
firewalls
#
network infrastructure
#
network security
A number of experts have come forward to share their opinions on the huge Uber breach affecting 57m people that was kept under wraps for a year.
Why business is looking good for ransomware criminals
Wed, 22nd Nov 2017
#
malware
#
ransomware
#
cybersecurity
New findings from a report that Carbon Black has released show it is easier than ever for criminals to extort money from victims through ransomware.
A force multiplier solution – the answer to the security skills gap crisis
Wed, 22nd Nov 2017
#
risk & compliance
#
cybersecurity
#
cso / ciso
It’s no secret that there is a yawning skills gap in the cybersecurity industry - but now RSA has come up with a way to 'multiply' your staff.
Police say everyone in UK has been hacked – Expert says not quite
Tue, 21st Nov 2017
#
data privacy
#
cybersecurity
#
dark web
UK's Police representatives have revealed virtually everyone in the country has been hacked, however, High-Tech Bridge's CEO disagrees.
Expert says Cash Converters cybersecurity breach ‘yet ANOTHER wakeup call’
Tue, 21st Nov 2017
#
breach prevention
#
cybersecurity
#
data breach
Cash Converters breached, hackers have access to UK customer account details, usernames, passwords, addresses and partial credit card numbers.
Mobile security starts with a powerful AI-based scanning engine
Fri, 17th Nov 2017
#
smartphones
#
wireless networks
#
ai
This principal analyst from Camden Associates says the secret sauce to securing mobile users is AI-based zero packet inspection.
'Leaker' behind massive NSA breach possibly still working at agency
Wed, 15th Nov 2017
#
breach prevention
#
cybersecurity
#
nsa
A cybersecurity expert has said it is a ‘stunning admission’ by the former CIA director about the NSA breach that is being touted as catastrophic.
Current IT security not up to the job – time to make some changes
Tue, 14th Nov 2017
#
data protection
#
iot
#
breach prevention
IDC says billions of dollars are spent around the world every year on various forms of IT security, and yet, data breaches are still happening.
ESET survey: Lack of funding a major problem for Japan SMBs
Mon, 13th Nov 2017
#
malware
#
cybersecurity
#
smb
Small and medium-sized businesses (SMBs) in Japan are struggling to enhance their cybersecurity due to the high costs involved, according to a survey by ESET.
Lessons learned from the latest ransomware attacks - there's more to come
Fri, 10th Nov 2017
#
malware
#
ransomware
#
cybersecurity
According to Europol, Europe needs to prepare itself for a large increase in the number of cyber-attacks - an expert discusses what lies ahead.
Experts discuss implications of massive Paradise Papers leak
Fri, 10th Nov 2017
#
cybersecurity
#
data leak
#
cybercrime
Leaked Paradise Papers shed light on offshore secrets of the rich and powerful, sparking global debate and security concerns.
CASE STUDY: War on ransomware marching forward with Europol coalition
Tue, 7th Nov 2017
#
malware
#
firewalls
#
ddos
Authorities estimated global losses from ransomware in 2016 to be more than $200 billion - this coalition was formed to address this.
Expert says effective IT security starts with effective training
Tue, 7th Nov 2017
#
malware
#
it training
#
cybersecurity
Tony Glass, GM & VP EMEA at Skillsoft, discusses why effective training holds the key to robust IT security in a challenging business environment.