April 17, 2012
CeCOS VI: The Counter eCrime Operations Summit: A cybercrime conference I can't get to, but heartily recommend
March 30, 2012
Is jail time for the crime of visiting the wrong websites the answer to terrorism?
November 04, 2011
The security industry, and the media that covers it, would be better served focusing on the tried-and-true motives for cybercrime, not conspiracy theories.
Businesses in North America are expected to lose $210 million this year to corporate bank account takeovers, according to a new report from financial research and consulting firm Aite Group. The report, "Banks and Business in the Crosshairs: Cybercrime and Its Impact," estimates that losses from these seizures, by which hackers gain control of online bank accounts to make unauthorized transfers, will grow to $371 million by 2015. Moreover, the number of new, unique strains of malware released each year is expected to increase - from 25 million by the close of 2011 to 87 million by the end of 2015.
September 01, 2011
Today's flurry of cybercrimes rely on an array of motivations, techniques and technologies, making the job of an investigator to track down the offender that much more difficult.
Activists, hacktivists, cyberwar and cybercrime: What are the differentiators?
Despite a new report warning of a sharp increase in automated web application attacks, this doesn't necessarily signal a rise in cybercrime.
The Anonymous hacking collective on Monday released tens of thousands of military credentials, in addition to details on alleged questionable business practices at consulting firm Booz Allen Hamilton.
The International Monetary Fund (IMF) has suffered a major cyberattack, the latest incident in a string of cyberattacks against high-profile organizations.
Police in Greece have arrested an 18-year old man suspected of hacking into computer systems belonging to the Pentagon, National Security Agency, FBI and Interpol, according to reports. The unnamed hacker, who used the alias "nsplitter," faces charges of hacking, fraud and illegal weapons possession. In addition to infiltrating government sites, the man also is reportedly accused of participating in credit card fraud. Greek police arrested the teen in his home in Athens on Monday. U.S. and French authorities aided in the investigation.
In a potentially precedent-setting court ruling, a U.S. magistrate judge has ruled that a bank is not responsible for covering the loss of nearly $300,000 that was illegally wired out of the bank account belonging to a Maine construction company.
A free copy of the BlackHole exploit kit is available on several file-sharing sites, lowering the cost of entry for budding cybercriminals, experts warned this week.
The FBI must bolster its information sharing and cybersecurity expertise to effectively investigate and combat the most serious cyber intrusions, according to a new audit.
Phishing is not the only possible motivation for breaching Epsilon.
Federal authorities have taken over the control hub of the prolific Coreflood botnet and filed a civil complaint against 13 unnamed defendants.
Attack toolkits have been refined to the point where they are producing high success rates for their criminal users.
For many small and midsize businesses, neglecting IT security is a thing of the past, reports Angela Moscaritolo.
Cybercriminals have shifted their efforts from targeting individuals' personal information to the intellectual capital of global corporations, according to a report released Monday.
The number of cyber incidents affecting U.S. federal agencies shot up 39 percent in 2010, according to a new report from the Office of Management and Budget (OMB), but experts said the increase is partly a reflection of improved discovery capabilities within government.
There re many types of cybercriminals beyond the ones who garner the most headlines.
Exxon Mobil, Royal Dutch Shell and BP were among the oil companies targeted by hackers believed to be from China to steal proprietary information about oil and gas field bids and operations, according to Bloomberg News. McAfee earlier this month disclosed details about the intrusions, dubbed "Night Dragon." The security firm, however, did not list any of the victim companies. According to Bloomberg, citing unnamed individuals familiar with the investigations, the list of targeted companies also includes Marathon Oil, ConocoPhillips and Baker Hughes. — AM
Typically fraud is considered unacceptable in other industries yet 80 percent of banks failed to catch fraud prior to wire transfer, according to a recent study. Two experts answer five hard questions.
Sophisticated hackers, believed to be from China, have broken into the networks of several global oil, energy and petrochemical companies.
February 01, 2011
The $1 trillion cybercrime industry is expertly - and competitively - run. Take a peek into the inner workings of these syndicates and how the good guys are closing in.
Experi-Metal v Comerica Bank: Banking Trojan Litigation Analyzed. Is today's authentication sufficient to protect against the latest ZeuS banking trojan attacks?
Cybercrime attack toolkits are now used in the majority of internet attacks, according to a report released Tuesday by Symantec.
The number of breaches affecting Canadian organizations grew last year, but the cost associated with these incidents decreased by more than $654,000 - or almost 80 percent - during the same period.
As the holiday season continues, users should be on high alert for scams such as malware-laden electronic greeting cards and screensavers, US-CERT has warned. In addition, phishing attacks may be disguised as requests for charitable donations, credit card applications and online shopping advertisements. US-CERT recommends that users avoid opening unexpected email attachments or following untrusted links. When donating to charities, individuals should verify the organization's authenticity with the Better Business Bureau. — AM
Though some have labeled the website attacks surrounding the WikiLeaks controversy to be the first-ever global cyberwar, security experts say the truth is much less sensational.
Could a cargo ship's thwarted piracy reveal more than bullet holes and bloodstains? A theoretical view of why compromised shipping cargo information could make pirates and hijackers rich.