Cybercrime

Twitter has shut down 125K accounts amid terrorism concerns since mid-2015

Twitter has shut down 125K accounts amid terrorism concerns since mid-2015

By

In an effort to help curb terrorism, Twitter has suspended 125,000 accounts since mid-2015 that it said threatened or promoted terrorist acts.

Energy sector execs see successful cyberattack as likely

Energy sector execs see successful cyberattack as likely

By

A cyberattack on a company in the energy, utility, oil and gas sectors is fully capable of causing harm to the physical plant, according to a Tripwire survey of IT professionals working in these fields.

Private sector can't ignore threat intel

By

As IT security decision-makers wrestle with how to evaluate threat intelligence solutions, especially in light of the recent demise of intel provider Norse Corp., a new report highlighted the perils of ignoring threat intelligence.

Student SSNs exposed in University of Central Florida breach

Student SSNs exposed in University of Central Florida breach

By

The University of Central Florida today publicly acknowledged a data breach in which the Social Security (SSN) numbers of 63,000 current and former students were illegally accessed.

WeatherWizard app delivers tech support scam, not a forecast

WeatherWizard app delivers tech support scam, not a forecast

By

Malwarebytes has discovered that amateur meteorologists get more than a weather forecast when they download the deceptive WeatherWizard app.

New research reveals 71 percent of UK organisations not cyber-resilient

New research reveals 71 percent of UK organisations not cyber-resilient

Study of 450 UK IT and security professionals uncovers insufficient planning and lack of clear ownership as major inhibitors to achieving cyber resilience.

Ransomware DMA Locker's encryption may be weak, but its flaws are dangerous

Ransomware DMA Locker's encryption may be weak, but its flaws are dangerous

By

An amateurish ransomware known as DMA Locker could crash while encrypting files, leaving users confused as to why their machines aren't operational.

Fast and furious: breaches keep rolling in, orgs must act quickly

Fast and furious: breaches keep rolling in, orgs must act quickly

By

The threat landscape and nature of data breaches are constantly changing, requiring lightning fast response and throwing organizations into an nearly perpetual state of transformation, a panelist told attendees at the LegalTech Show in New York on Tuesday.

Landry's concludes breach probe, lists affected locations and attack timeframes

Landry's concludes breach probe, lists affected locations and attack timeframes

By

Landry's Inc., the dining and hospitality chain operator that discovered a long-running data breach in December, said it has completed its internal investigation into the incident, and has fortified its point-of-sale operations with encryption technology to prevent future cyberattacks.

 Cybercrime for sale

Cybercrime for sale

By

William Noonan, U.S. Secret Service, says organizations must work together to prevent new threats.

Liberty Reserve mastermind pleads guilty to money laundering

Liberty Reserve mastermind pleads guilty to money laundering

By

The founder of Liberty Reserve virtual currency pleaded guilty to running an enterprise that laundered more than $250 million obtained by criminals through identity theft, credit card fraud, computer hacking and other illicit activities.

Blackshades malware co-author sentenced to five years probation

Blackshades malware co-author sentenced to five years probation

By

Following a guilty plea in 2013 for distributing malware and conspiring to commit computer hacking, Michael Hogue was sentenced to five years probation.

Mitigating ransomware

Mitigating ransomware

Ransomware is a complex threat, but its impact can be lessened, says Thomas Gresham.

Unlucky numbers: Ransomware 7ev3n extorts victims for 13 bitcoins

Unlucky numbers: Ransomware 7ev3n extorts victims for 13 bitcoins

By

The newly discovered ransomware known as " 7ev3n" encrypts victims' files and demands 13 bitcoins for the key.

Phishing scheme mimics iCloud to activate stolen iPhones

Phishing scheme mimics iCloud to activate stolen iPhones

By

Researchers at Malwarebytes have spotted thieves using a phishing scheme to unlock stolen iPhones.

In a first, alleged ISIL-linked hacker extradited to U.S.

In a first, alleged ISIL-linked hacker extradited to U.S.

By

In what prosecutors are calling a "first of its kind" case, a hacker linked to the Islamic State of Iraq and the Levant (ISIL) has been extradited to the U.S. to face charges.

Data Privacy Day: Changes transform policy, perspective since last year

Data Privacy Day: Changes transform policy, perspective since last year

By

SCMagazine.com asked key thought leaders to identify key events in last year that have reshaped public policy and expectations of what happens—and what should happen—to personally identifiable information when users go online.

Israel's Electric Authority hit by massive cyberattack

Israel's Electric Authority hit by massive cyberattack

By

The Israeli Electric Authority was hit by a massive cyberattack during a period of record-breaking power consumption.

Lucrative pay offered India hackers to work for ISIS

Lucrative pay offered India hackers to work for ISIS

By

Hackers in India are being handsomely rewarded for taking on work for ISIS.

N.Y. state police uncover horseracing hack for inside information

N.Y. state police uncover horseracing hack for inside information

By

A former jockey agent has been charged by the District Attorney of Queens County, New York, with illegally accessing the New York Racing Association's (NYRA) computer system to access insider information.

Zero-click fraud scheme 'subscribes' Japanese victims to porn service, requests $2K fee

Zero-click fraud scheme 'subscribes' Japanese victims to porn service, requests $2K fee

By

Symantec researchers have observed one-click fraud scammers changing to more aggressive tactics in a zero-click fraud scheme that subscribes visitors to porn websites.

FACC AG, Belgian bank fall victim to BEC

FACC AG, Belgian bank fall victim to BEC

By

An aircraft components designer and a Belgian bank were the latest victims of the business email compromise (BEC), prompting the IC3 to issue an alert.

U.S. Supreme Court affirms Exel exec's hacking conviction

U.S. Supreme Court affirms Exel exec's hacking conviction

By

The felony conviction of former Exel Transportation Services (ETS) President Michael Musacchio, who used the information he pilfered from his former employer to start a new company, still stands, the U.S. Supreme Court said Monday.

LeChiffre ransomware dissected, then cracked

LeChiffre ransomware dissected, then cracked

By

Security researchers have devised a decryptor program for the LeChiffre ransomware, allowing users to unlock their stolen files for free.

Variant of DNS-changer adware works around Powershell restriction

Variant of DNS-changer adware works around Powershell restriction

By

Malwarebytes detected "a particularly interesting method" that coders used to circumvent default restrictions mandated for Powershell scripts.

Kaspersky detects surge in 'Asacub' mobile banking trojan attacks

Kaspersky detects surge in 'Asacub' mobile banking trojan attacks

By

What was once a low-threat, basic spyware trojan has evolved into very powerful banking malware capable of giving hackers near-total control over one's Android device, warned Kaspersky Lab yesterday.

New wave of attacks on Ukrainian power plants

New wave of attacks on Ukrainian power plants

By

Researchers at ESET detected a new wave of cyberattacks on power plants in Ukraine that use different malware than in previous attacks.

Extradited Ukrainian hacker pleads guilty in U.S. court to ID theft, conspiracy

Extradited Ukrainian hacker pleads guilty in U.S. court to ID theft, conspiracy

By

A Ukranian hacker Sergey Vovnenko pleaded guilty in a U.S. district court in New Jersey to aggravated identity theft and conspiracy to commit wire fraud.

Social engineering scam targets SMBs with trojans, report warns

Social engineering scam targets SMBs with trojans, report warns

By

A crude but dangerous email-based social engineering scam has been targeting small-to-medium-size businesses in the U.S., U.K. and India since early 2015, the Symantec Security Response blog warned today.

Dridex using Dyre tricks to deceive victims

Dridex using Dyre tricks to deceive victims

By

Researchers at IBM's X-Force have observed the Dridex banking trojan using DNS cache poisoning attacks to redirect victims to fake banking sites.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US