cybercrime
Malaysian hacker breached Federal Reserve and DoD contractor networks
When agents arrested Malasyian Lin Mun Poo on account of selling US$1,000 worth of stolen credit card numbers just hours after he arrived in the U.S., they probably …
Week in review: Cybercrime victims, PayPal phishing and Moxie Marlinspike
Here’s an overview of some of last week’s most interesting news and interviews: Top 10 security threats for 2011 Imperva announced their predictions for the top …
Two thirds of Internet users have fallen victim to cybercrime
When reading about instances of cybercrime, we often get caught in the numbers and think about the details of a particular attack or exploitation of a technology, and actually …
The 12 most dangerous online scams
Consumers would be wise to beware of the most common scams of the season before heading online to book travel and do holiday shopping. McAfee revealed the 12 most dangerous …
Top 10 security threats for 2011
Imperva announced their predictions for the top ten security trends for 2011 which have been compiled to help IT security professionals defend their organization against the …
Two FBI fugitives wanted on federal cyber crime charges captured
On November 3, 2010, Dorin Codreanu and Lilian Adam were arrested in Portage, Wisconsin by FBI agents. Codreanu and Adam have been fugitives since September 30 when FBI agents …
.com is the most dangerous domain
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to McAfee’s “Mapping the Mal Web” report released today. Fifty-six …
Global e-crime gang transitions to crimeware
The world’s most prolific phishing gang has completed a transition from using conventional phishing to massively propagating stealthy password-stealing crimeware that …
Suspected money mule arrested in London
Members of the Police Central e-crime Unit arrested a 34-year-old man suspected of organizing money mules to open drop accounts in order to launder the proceeds of online …
Featured news
Sponsored
Don't miss
- US exposes scheme enabling North Korean IT workers to bypass sanctions
- The importance of access controls in incident response
- Organizations struggle to defend against ransomware
- Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)
- Google fixes third exploited Chrome zero-day in a week (CVE-2024-4947)