cybercrime
Proposed bill will deny foreign hackers entry into the U.S.
A day before U.S. President’s scheduled meeting with Chinese President Xi Jinping, a new act that aims to punish criminals engaging in cyber spying and theft on behalf …
Pirate Bay founder suspected of hacking police databases
Pirate Bay co-founder Gottfrid Svartholm, who has been extradited from Cambodia to Sweden to answer for allegedly hacking of Swedish IT company Logica and the Nordea bank …
Microsoft and FBI disrupt global cybercrime ring
Microsoft, the FBI, Agari, financial services industry leaders FS-ISAC, NACHA, and other industry partners, managed to break up a massive cybercrime ring which was stealing …
Most small businesses can’t restore all data after a cyber attack
Almost one-third of U.S. small businesses surveyed by the Ponemon Institute had a cyber attack in the previous year, and nearly three-quarters of those businesses were not …
Cyberespionage campaign targeting government-affiliated organizations
Kaspersky Lab experts published a new research report about NetTraveler, which is a family of malicious programs used by APT actors to successfully compromise more than 350 …
Liberty Reserve laundered $6 billion through illegal transactions
An indictment has been unsealed on Tuesday charging Liberty Reserve, a company that operated one of the world’s most widely used digital currency services, and seven of …
Liberty Reserve founder arrested, site and service inaccessible
When the website of Liberty Reserve, a Costa Rica-based payment processor popular with cyber criminals, became inaccessible late last week, speculation about what caused were …
Fighting cybercrime is on the right track
Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs. …
Commission wants to minimize U.S. IP theft economic impact
As the long awaited first meeting between China’s new president Xi Jinping and U.S. president Barack Obama draws near, the problem of cyber espionage and theft of …
Aurora attackers were looking for Google’s surveillance database
When in early 2010 Google shared with the public that they had been breached in what became known as the Aurora attacks, they said that the attackers got their hands on some …
Private messages of Bloomberg clients end up online
Mere days after Bloomberg News admitted that its journalists could access some client information via the company’s financial terminals, it has been revealed that the …
Mobile crimeware and the global criminal marketplace
The sprawling mobile devices marketplace has spawned an industrialized mobile financial fraud plexus that today drives increasingly sophisticated criminal technical innovation …
Featured news
Resources
Don't miss
- Only Cynet delivers 100% protection and detection visibility in the 2024 MITRE ATT&CK Evaluation
- Shaping effective AI governance is about balancing innovation with humanity
- Exposed APIs and issues in the world’s largest organizations
- Keycloak: Open-source identity and access management
- Microsoft enforces defenses preventing NTLM relay attacks