cybercrime
Data breaches in higher education
TeamSHATTER reports on data breaches in the higher education vertical throughout the United States. The past year has seen a substantial uptick in the amount of total records …
Identity fraud is up, but banks are up to the security challenge
In 2012, the total losses resulting from account takeover and new account fraud each rose by approximately 50% over the previous year. These two fraud types impact consumers …
Mandiant threat report on advanced targeted attacks
Mandiant released its fourth annual M-Trends report, which details the tactics used by threat actors to compromise organizations and steal data. It also highlights incident …
Asian network of on-line card fraudsters dismantled
Finnish law enforcement authorities, working closely with the European Cybercrime Centre (EC3) at Europol, have dismantled an Asian criminal network responsible for illegal …
BitInstant back online following breach, Bitcoin theft
BitInstant, one of the online Bitcoin exchange services, has been down and unaccessible from Thursday evening to Monday due to a “sophisticated attack,” which …
Malicious Java applet uses stolen certificate to run automatically
A signed but malicious applet that will apparently fool even the latest Java 6 update has been discovered on a German online dictionary website infected by the g01pack exploit …
Gang arrested for hacking and stealing from exchange companies
The Dubai police has arrested three people allegedly belonging to a crime gang that managed to steal nearly $2 million from Dubai exchange companies with the help of hackers. …
Evernote breached, forces service-wide password reset
The popular notetaking and archiving service Evernote has notified its 50+ million users that the service’s internal network has been breached by attackers and that they …
Microsoft also victim of recent watering hole attack
Microsoft has followed in the steps of Twitter, Facebook and Apple, and has confirmed on Friday that it has recently experienced a security intrusion. “During our …
The sophistication of risky apps, mobile misbehavior and spyware
McAfee released the results of a new report, documenting sophisticated and complex risky apps containing multi-faceted scams, black market crimes, drive-by downloads and …
Antibot: Network-based botnet removal tool
Botnets are flourishing with new packaging, new methods and new business models. ZeroAccess, the world’s fastest-growing botnet, infected millions of computers in 2012, …
Successful ways of undermining cybercrime ecosystems
Most cybercrime is carried out by a loose confederation of independent contractors who work together when necessary through online forums and “partnerkas” that …
Featured news
Resources
Don't miss
- AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged
- Using lightweight LLMs to cut incident response times and reduce hallucinations
- Fractional vs. full-time CISO: Finding the right fit for your company
- Product showcase: iStorage datAshur PRO+C encrypted USB flash drive
- Apple fixes zero-day vulnerability exploited in “extremely sophisticated attack” (CVE-2025-43300)