TechDay India - India's technology news network
India
Search

Cybercrime stories - Page 24

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Story image
Expert spells out how businesses can 'block the spears'
Tue, 12th Sep 2017
#
malware
#
email security
#
cybersecurity
There is no doubt about it, but spear-phishing is big business in 2017 - Menlo Security's Jason Steer explains how businesses can protect themselves.
Story image
EU to invest more into cybersecurity – expert says it’s not enough
Mon, 11th Sep 2017
#
cybersecurity
#
fujitsu
#
cybercrime
Rob Norris says further investment in cyber security technology is an unsurprising but welcome move by the European Commission - but more is needed.
Story image
Cybercriminals caught targeting gamers with sneaky malware
Fri, 8th Sep 2017
#
malware
#
gaming
#
ddos
Spread via hacked games on unofficial websites, the malware can download and install virtually any other malicious code on the victim's computer.
Story image
What’s up with Your mobile apps? Identifying and mitigating digital risk
Thu, 7th Sep 2017
#
smartphones
#
cybersecurity
#
apps
I’ll venture to guess you’re using a mobile device to read this - while mobile apps offer a host of new opportunities, they also introduce risk.
Story image
Once prominent infection method now declining - short blip or for good?
Wed, 30th Aug 2017
#
malware
#
cybersecurity
#
software development
An expert from Digital Shadows dissects the once prominent method of infection known as exploit kits and whether they remain a threat.
Story image
BT says investing in all the latest cybersecurity is no silver bullet
Tue, 29th Aug 2017
#
malware
#
ransomware
#
cybersecurity
Throwing money at cybersecurity is a mistake that can make firms a target not just for cyber criminals but also for over-zealous IT salespeople.
Story image
Survey reveals digital transformation playing into cybercriminals’ hands
Thu, 24th Aug 2017
#
digital transformation
#
cybersecurity
#
cybercrime
Digital transformation has many positives but it also benefits cybercrime as organisations are trying to walk before they can crawl.
Story image
New report reveals hackers weaponising old vulnerabilities
Wed, 23rd Aug 2017
#
malware
#
ddos
#
cybersecurity
Akamai's Q2 2017 report shows a 28% increase in DDoS attacks, with the PBot malware being a major contributor.
Story image
Two dark web markets shut down but expert says ‘one door closes, a window opens’
Tue, 22nd Aug 2017
#
cybersecurity
#
market
#
dark web
The recent shutdown of AlphaBay and Hansa has left dark web marketplaces on shaky ground, says Digital Shadows CEO Alastair Paterson.
Story image
Global cybersecurity spending to reach USD$93b in 2018 – GDPR a main driver
Wed, 16th Aug 2017
#
devops
#
dlp
#
apm
Gartner’s latest findings reveal a burgeoning cybersecurity market that is in line with growing awareness and the imminent GDPR.
Story image
FireEye uncovers Russian cybercriminal group targeting EMEA hotels
Mon, 14th Aug 2017
#
malware
#
breach prevention
#
wireless networks
The hospitality sector is a frequently attacked target by cybercriminals - one of the most prominent has been attributed to a Russian group.
Story image
Comodo opens up threat library to public – almost 100m incidents in Q217 alone
Fri, 11th Aug 2017
#
advanced persistent threat protection
#
cybersecurity
#
cyber threats
​Comodo has opened its ‘library’ to university, governmental, and non-profit educators and researchers in an industry-first.
Story image
HBO breach: Centrify says ‘winter is coming’ for passwords
Thu, 10th Aug 2017
#
cybersecurity
#
hbo
#
centrify
HBO’s soft underbelly was laid bare to the world after hackers stole 1.5 TB of data from its systems - Centrify says passwords' days are limited.
Story image
Cybercrime: What to expect for the rest of 2017 and how to prepare
Wed, 9th Aug 2017
#
malware
#
ddos
#
vpns
​So far this year we have already borne witness to a multitude of serious cybercrime. NordVPN has provided insights for what the second half may hold.
Story image
Want to cause chaos? ICIT says hacking elections is easy
Mon, 7th Aug 2017
#
ddos
#
cybersecurity
#
elections
Hackers at DEFCON were able to exploit vulnerabilities in voting machines in a matter of minutes - ICIT breaks down just how easy it is.
Story image
Dicker Data: What NZ companies need to know about cybersecurity
Fri, 4th Aug 2017
#
malware
#
ransomware
#
cybersecurity
There is a significant weakness with cybersecurity in New Zealand – and according to Dicker Data, it stems from one of our strengths.
Story image
UK SMBs estimate average cost of cyberattack more than £730,000
Wed, 2nd Aug 2017
#
malware
#
ransomware
#
phishing
UK SMBs estimated the average cost of a cyberattack where their customer records or critical business data were stolen at an eye-watering £737,677.
Story image
HBO’s Game of Thrones treasure chest ransacked by hackers
Tue, 1st Aug 2017
#
malware
#
ransomware
#
cybersecurity
​It would seem winter has come for HBO after hackers have stormed the company’s servers and looted the jewels within to leak data online.
Story image
New report details exploits of notorious cyberespionage group with EMEA targets
Mon, 31st Jul 2017
#
malware
#
cybersecurity
#
government
Known as CopyKittens, the group is politically-motivated and has increasingly been active in pursuing foreign espionage on strategic targets.
Story image
Nearly a quarter of ‘unsafe’ emails getting through to user inboxes
Fri, 28th Jul 2017
#
malware
#
ransomware
#
cybersecurity
There is a continuous challenge of securing organisations from malicious attachments, dangerous files type, impersonation attacks as well as spam.