cybercrime
PureVPN users receive fake email saying authorities closed down the service
Over the weekend, customers of Hong Kong-based VPN service PureVPN were taken aback by an email that was seemingly sent by the company’s founder Uzair Gadit, saying that …
Adobe breached, customer info and source code compromised
Hackers have breached Adobe’s network and have made off with personal, account, and encrypted financial information of nearly 3 million Adobe customers, as well as the …
Cybercrime service providers arrested in Europe
The European Cybercrime Centre (EC3) at Europol has supported Spanish National Police in arresting two Ukrainian criminals in Madrid who sold cybercriminals access to a huge …
Icefog cyber espionage campaign exposed
Kaspersky Lab’s security research team discovered Icefog, a small yet energetic Advanced Persistent Threat (APT) group that focuses on targets in South Korea and Japan, …
Websites of energy sector companies compromised in watering hole attack
The websites of nearly a dozen energy sector companies have been compromised to serve as so-called “watering holes”, where visitors would be served with malware or …
Eight arrested over £1.3 million theft from Barclays bank
Eight men have been arrested by the Metropolitan Police’s Central e-Crime Unit (PCeU) in connection with a £1.3 million theft by a gang who stole the money by …
30 Percent of transactions conducted from Tor are fraudulent
iovation announced that 30.2 percent of transactions conducted from Tor (the onion router) in August were fraudulent. This compared with an overall fraud rate of 1 percent for …
One in ten consumers lost money to online fraud
More than one in ten consumers globally have been victims of online fraud that cost them money, according to a recent F-Secure survey which fleshed out consumer concerns about …
Medical identity theft affects 1.84 million U.S. victims
Medical identity theft is a national healthcare issue with life-threatening and hefty financial consequences. According to the 2013 Survey on Medical Identity Theft conducted …
Timing is an influential risk-factor for cyber attacks
There are several dates throughout the year that are notorious for wreaking havoc on businesses via DDoS attacks, data breaches and even malware or botnet assaults. According …
Placing the Suspect Behind the Keyboard
There are many books addressing the subject of computer forensics out there, but this tome is one of the rare ones that approaches cybercrime investigations in a holistic …
Most security managers don’t trust their apps
Application vulnerabilities are a major factor in the cybercrime game. More than 500 CISOs and Security managers have been interviewed by Quotium about the security state of …
Featured news
Resources
Don't miss
- Attackers target retailers’ gift card systems using cloud-only techniques
- Attackers turn trusted OAuth apps into cloud backdoors
- Life, death, and online identity: What happens to your online accounts after death?
- OpenFGA: The open-source engine redefining access control
- For blind people, staying safe online means working around the tools designed to help