Items Tagged with "Cyber Crime"


Using Piracy as a Crimeware Defense

October 01, 2010 Added by:Brent Huston

What if we, as security folks, made a serious endeavor to reduce the earning capability of those who create crimeware, spyware and other malware? What if we did to them exactly what the gaming companies and MPAA have been saying is killing their business?

Comments  (0)


China – Cyber Pirates Off the Electronic Coast?

September 20, 2010 Added by:Dan Dieterle

Chinese hackers attack foreign civilian and military facilities alike to gain finances and also classified military information. While China’s attacks against America and Britain are well known, we are not their only target. Chinese hackers have also targeted India, and Japan...

Comments  (1)


Cybercrime Victims Feel Ripped Off

September 20, 2010 Added by:Eli Talmor

Securing identity solutions against misuse is paramount. Security ensures confidentiality, integrity, and availability of identity solutions: Strong cryptography, use of open and well-vetted security standards, and the presence of auditable security processes are critical...

Comments  (0)


Organized Crime Responsible For Most Breaches

September 17, 2010 Added by:Robert Siciliano

Global web mobs are tearing up corporations’ and financial institutions’ networks. According to a new Verizon report, a staggering 900 million records have been compromised in the past six years. Up to 85 percent of the breaches were blamed on organized criminals...

Comments  (1)


Organized Web Mobsters Getting Jobs Inside

September 06, 2010 Added by:Robert Siciliano

Organized crime rings recruit or place insiders to embezzle or skim monetary assets and data, the smaller end of these schemes often target cashiers at retail and hospitality establishments while the upper end are more prone to involve bank employees...

Comments  (1)


Spies Among Us

August 22, 2010 Added by:Robert Siciliano

The term spy conjures ideas about foreign operatives, moles and James Bond. You might envision forged IDs, fake passports and fraudulently issued government sponsored papers. The eleven Russian spies recently nabbed used the same equipment that you and I use today, including laptops, flash memory cards, and cell phones, but with a twist...

Comments  (0)


Small Businesses Hammered By Cybercrime

August 14, 2010 Added by:Theresa Payton

This is a wake-up call for small businesses, who are the easy targets for cybercriminals who want more than money - the criminals are also interested in your intellectual property which they can pawn elsewhere in order to gain financially....

Comments  (0)


Mariposa Botnet Arrest via International Co-operation

August 06, 2010 Added by:Simon Heron

It’s quite rare to have the opportunity to highlight a great example of international co-operation, but according to, a hacker responsible for one of the largest botnets ever created has been arrested thanks to an international effort...

Comments  (0)


Keeping Kids Safe Online

July 25, 2010 Added by:Robert Siciliano

It is no surprise that cybercriminals are taking advantage of the Internet and the people who use it. Any parent with an ounce of sensibility should recognize that when your child is on the wild wild web, they are at the risk...

Comments  (2)


Criminal Communication Infrastructure

July 20, 2010 Added by:Nathaniel Markowitz

One of the central challenges for cyber-criminals is how to communicate with their customers while also maintaining their anonymity. There are three main types of communication utilized by Bulletproof Hosts (BPHs)...

Comments  (0)


What is “Swatting” And How Do I Protect My Family

July 16, 2010 Added by:Robert Siciliano

SWAT is Special Weapons and Tactics. Those are the guys and gals in all black with the headgear and big guns. Caller ID spoofing technologies are used as a tool to disguise the caller and send law enforcement officers on bogus calls...

Comments  (0)


State of International Cooperation on Cybercrime

June 23, 2010 Added by:Simon Heron

Last week’s Talinn conference was the latest in a series of international gatherings to discuss cybercrime. Unfortunately, although international cooperation is an essential element in defeating cybercrime, these discussions have so far been unable to find an actionable agreement.

Comments  (0)

Page « < 12 - 13 - 14 - 15 - 16 > »