SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Cybercrime stories - Page 23

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Story image
Comodo opens up threat library to public – almost 100m incidents in Q217 alone
Fri, 11th Aug 2017
#
advanced persistent threat protection
#
cybersecurity
#
cyber threats
​Comodo has opened its ‘library’ to university, governmental, and non-profit educators and researchers in an industry-first.
Story image
HBO breach: Centrify says ‘winter is coming’ for passwords
Thu, 10th Aug 2017
#
cybersecurity
#
hackers
#
centrify
HBO’s soft underbelly was laid bare to the world after hackers stole 1.5 TB of data from its systems - Centrify says passwords' days are limited.
Story image
Cybercrime: What to expect for the rest of 2017 and how to prepare
Wed, 9th Aug 2017
#
malware
#
ddos
#
vpns
​So far this year we have already borne witness to a multitude of serious cybercrime. NordVPN has provided insights for what the second half may hold.
Story image
Want to cause chaos? ICIT says hacking elections is easy
Mon, 7th Aug 2017
#
ddos
#
cybersecurity
#
hackers
Hackers at DEFCON were able to exploit vulnerabilities in voting machines in a matter of minutes - ICIT breaks down just how easy it is.
Story image
Dicker Data: What NZ companies need to know about cybersecurity
Fri, 4th Aug 2017
#
malware
#
ransomware
#
cybersecurity
There is a significant weakness with cybersecurity in New Zealand – and according to Dicker Data, it stems from one of our strengths.
Story image
UK SMBs estimate average cost of cyberattack more than £730,000
Wed, 2nd Aug 2017
#
malware
#
ransomware
#
phishing
UK SMBs estimated the average cost of a cyberattack where their customer records or critical business data were stolen at an eye-watering £737,677.
Story image
HBO’s Game of Thrones treasure chest ransacked by hackers
Tue, 1st Aug 2017
#
malware
#
ransomware
#
cybersecurity
​It would seem winter has come for HBO after hackers have stormed the company’s servers and looted the jewels within to leak data online.
Story image
New report details exploits of notorious cyberespionage group with EMEA targets
Mon, 31st Jul 2017
#
malware
#
cybersecurity
#
trend micro
Known as CopyKittens, the group is politically-motivated and has increasingly been active in pursuing foreign espionage on strategic targets.
Story image
Nearly a quarter of ‘unsafe’ emails getting through to user inboxes
Fri, 28th Jul 2017
#
malware
#
ransomware
#
cybersecurity
There is a continuous challenge of securing organisations from malicious attachments, dangerous files type, impersonation attacks as well as spam.
Story image
Malware found prowling within every app of alternative Android store
Thu, 27th Jul 2017
#
smartphones
#
malware
#
cybersecurity
Malware researcher at ESET, Lukáš Štefanko says this is the first time he has ever seen an entire Android market infected like that.
Story image
The Dark Web: Is your company at risk?
Thu, 27th Jul 2017
#
risk & compliance
#
cybersecurity
#
cybercrime
Not only is information on a company’s assets available, but information about new techniques to compromise targets is for sale on the dark web.
Story image
Cisco reveals alarming findings from Midyear Cybersecurity Report
Wed, 26th Jul 2017
#
malware
#
ransomware
#
cybersecurity
The Cisco Midyear Cybersecurity Report warns of rapidly evolving threats and potential 'destruction of service' (DeOS) attacks.
Story image
Digital Shadows discovers credit card crime ring cashing in on $24b a year
Tue, 25th Jul 2017
#
risk & compliance
#
cybersecurity
#
digital shadows
A professional ecosystem has emerged that is providing e-learning courses to allow aspiring cybercriminals to make USD$12k in monthly earnings.
Story image
Hackers steal $32m of ethereum cryptocurrency – expert commentary and advice
Sat, 22nd Jul 2017
#
blockchain
#
cryptocurrency
#
ai security
​In the second heist this week, hackers have stolen around US$32 million - Webroot senior threat analyst shares his commentary and insights.
Story image
The malware that brought down Ukraine – is it really that sophisticated?
Wed, 21st Jun 2017
#
malware
#
cybersecurity
#
power blackouts
Tenable director says the significance of this malware as a stand-alone event is in fact quite small - but vendors have some catching up to do.
Story image
Arbor Networks digs deep into the Lazarus Group's DDoS attacks
Mon, 19th Jun 2017
#
ddos
#
cybersecurity
#
arbor networks
It is not clear whether the IPs listed in the report were part of a command and control infrastructure or simply bots - or both.
Story image
War of the words: How cybercriminals are selling fake news through the underground
Wed, 14th Jun 2017
#
cybersecurity
#
trend micro
#
cybercrime
Fake news is being sold as a service on the underground market, with criminals offering to manipulate public opinion for a price.
Story image
GCHQ deputy director - 'Cybersecurity vendors need to quit their scaremongering'
Wed, 7th Jun 2017
#
cybersecurity
#
cybercrime
#
gchq
Cybersecurity experts warn that the industry is far behind where it needs to be, making it too easy for cybercriminals to operate.
Story image
Cost of cybercrime for businesses to surpass $8 trillion over next five years
Thu, 1st Jun 2017
#
malware
#
ransomware
#
cybersecurity
New insights from Juniper Research have predicted a rather dire future for modern businesses in the constant war against cybercrime.
Story image
The need for internet security on your mobile
Mon, 29th May 2017
#
endpoint protection
#
phishing
#
email security
As hackers target mobile devices, it’s imperative to ensure that you are aware of the threats that are out there, and that your phone is protected.