SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Cybercrime stories - Page 16

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Story image
Global cybercrime lord busted, but expert says just a drop in the ocean
Thu, 29th Mar 2018
#
cryptocurrency
#
blockchain
#
malware
Cybereason's senior director says the arrest of the Carbanak gangleader will just look like a 'rounding error' for overall cybercrime profits.
Story image
Monash University researchers scour dark web to understand cybercrime
Wed, 28th Mar 2018
#
cybersecurity
#
dark web
#
cybercrime
IT researchers at Monash University have exposed activity on the dark web that could spell the end for some cybercriminals.
Story image
Mastermind of EUR 1 BILLION global cybercrime gang arrested
Tue, 27th Mar 2018
#
malware
#
cybersecurity
#
cybercrime
Europol has arrested the suspected leader of the Carbanak gang with the cooperation of law enforcement around the world, but experts remain sceptical.
Story image
New cybersecurity export strategy from UK govt to bolster global defences
Tue, 27th Mar 2018
#
cybersecurity
#
government
#
cybercrime
The UK government today announced the launch of a new strategy to support the export of the nation’s cybersecurity technologies.
Story image
EXCLUSIVE: Continuum leaders share insights on state of cybercrime
Mon, 26th Mar 2018
#
partner programmes
#
cybersecurity
#
continuum
We were able to catch up with two of Continuum's executives after its sold out European Partner day - they both see danger ahead for SMBs.
Story image
SURVEY: 70% of customers would leave a business after a breach
Mon, 26th Mar 2018
#
encryption
#
breach prevention
#
data privacy
A recent study from Gemalto proves it’s not just data that is lost following a breach – you’ll lose most of your customers too.
Story image
Report finds legacy cybersecurity a cinch for modern cybercrime
Fri, 23rd Mar 2018
#
ransomware
#
malware
#
phishing
Data collected in 2017 shows that attacks like ransomware and cryptojacking are easily bypassing legacy security solutions due to lax businesses.
Story image
Zuckerberg admits “we made mistakes” in Facebook data breach
Fri, 23rd Mar 2018
#
breach prevention
#
cybersecurity
#
security breaches
Facebook founder Mark Zuckerberg has released a statement following the revelation that data from 50 million people was misused.
Story image
Report uncovers big business of cybercrime – but just how big?
Thu, 22nd Mar 2018
#
ddos
#
cybersecurity
#
threatarmor
'Would you like anything else with your $10 DDoS attack-as-a-service sir?' Armor's report paints a disturbing picture of the cybercrime market.
Story image
Not a Bitcoin owner? You're still fair game for a cryptomining attack
Wed, 21st Mar 2018
#
cryptocurrency
#
blockchain
#
cybersecurity
Check Point has released a 'cryptomining 101' document that details how cybercriminals hack into devices to steal their CPU power for illicit mining.
Story image
Expert explains fighting cloud’s ‘biggest security risk’ – the user
Tue, 20th Mar 2018
#
cybersecurity
#
cloud security
#
forrester research
Routed's director says while cloud providers are responsible for securing the cloud, only the organisation can secure how they use it.
Story image
Cryptomining malware affected 42% organisations worldwide in Feb
Tue, 20th Mar 2018
#
malware
#
cybersecurity
#
cryptomining
This persistent threat not only continues to chip away at enterprise CPU power, but once inside a network can carry out other malicious acts.
Story image
Facebook breach of 50 MILLION profiles: What we know so far
Mon, 19th Mar 2018
#
data analytics
#
martech
#
planning
A whistleblower has uncovered the practices of his illicit company, which include stealing the details of 50m Facebook users to help Trump's campaign.
Story image
Decrypted: Phantom Secure takedown a 'significant blow' against Australia's organised crime networks
Mon, 19th Mar 2018
#
encryption
#
cybersecurity
#
cybercrime
Australian, US and Canadian law enforcement agencies collaborate to bust Canadian security firm providing encrypted communications to organised crime market.
Story image
Qrypter Remote Access Trojan targeting NZ & Australia web domains
Mon, 19th Mar 2018
#
malware
#
casb
#
cybersecurity
A RAT called Qrypter has been used to target organisations around the globe, including those in New Zealand and Australia.
Story image
Cybercriminals laundering $200b in ill-gotten gains – here’s how
Sat, 17th Mar 2018
#
blockchain
#
cryptocurrency
#
cybersecurity
​A new report from Bromium has landed with a number of startling findings, including the confirmation of a bustling cybercrime laundry market.
Story image
New report finds race to the cloud in EMEA outpacing cybersecurity
Fri, 16th Mar 2018
#
network infrastructure
#
firewalls
#
network security
The relentless rush to cloud adoption is coming at the detriment to cybersecurity with some countries in EMEA worse than others.
Story image
Sophos unveils new phishing attack simulation solution
Thu, 15th Mar 2018
#
firewalls
#
network infrastructure
#
network security
The new solution from Sophos allows organisations to run trial phishing 'attacks' on employees to see who is most susceptible and offer training.
Story image
New study details how easy it is for hackers to steal your data
Thu, 15th Mar 2018
#
malware
#
cybersecurity
#
chrome
It’s no secret that web browsers store a substantial amount of sensitive information about their users - hackers are taking advantage of this.
Story image
Asia's security professionals wary of Russia, China, North Korea
Wed, 14th Mar 2018
#
ransomware
#
malware
#
cybersecurity
Attendees at this year’s Black Hat Asia conference are wary of what’s ahead from some of the world’s most notorious countries behind cyber attacks.