cybercrime
Cybercrime black market statistics
PandaLabs released an investigative report on the current cybercrime black market. They discovered a vast network selling stolen bank details along with other types of …
Cybercriminals shifting focus to non-Windows systems
In a major cybercrime turning point, scammers have begun shifting their focus away from Windows-based PCs to other operating systems and platforms, including smart phones, …
A global shift in cybercrime
The target of attacks has shifted from traditional infrastructure to mobile users and endpoint devices, according to a new report. Research from SpiderLabs found that …
DHS investigation uncovers cyber fraud ring members
Two Winona State University students are currently being investigated by the Department of Homeland Security and are suspected of having been members of a Vietnamese-based …
The evolution of cyber criminal operations
There is a concerning evolutionary step cyber criminal operations are taking to more effectively diversify the distribution of their ill-gotten gains, according to Fortinet. …
Underground toolkits will make cyber espionage easy
With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …
Increased collaboration on cybercrime syndicate crackdowns
As 2010 comes to a close, information security companies are trying to predict the amount of problems we’ll have to deal with next year. Below is a list of 5 security …
Experiment reveals how scammers earn huge money with simple scams
An interesting experiment conducted by UK-based scam-tracking organization Scam Detectives has revealed how online scams can earn scammers a lot of money in a short time …
Week in review: Online shopping safety, malware hybrids and Packet Wars
Here’s an overview of some of last week’s most interesting news, articles and reviews: Google Apps Script API flaw allowed attacker to impersonate Google Details …
Growing security crisis for mobile networks
The wireless nature of the cellular networks makes them more susceptible to criminal attack, according to a Heavy Reading report. “If anything, our research suggests …
Bruce Schneier on cyberwar and cybercrime
In this video, Bruce Schneier examined the future of cyberwar and cyber security. He explored the current debate on the threat of cyber war, asking whether or not the threat …
Malaysian hacker breached Federal Reserve and DoD contractor networks
When agents arrested Malasyian Lin Mun Poo on account of selling US$1,000 worth of stolen credit card numbers just hours after he arrived in the U.S., they probably …
Featured news
Resources
Don't miss
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams
- CERT-UA warns against “security audit” requests via AnyDesk