cybercriminals

cybercriminals

Windows driveby attack on aeronautical website may be state sponsored

arstechnica.com
The website of a European aeronautical parts supplier was infected with an exploit that uses an unpatched Windows vulnerability to execute malicious code on end users' computers, researchers from antivirus provider Sophos said. The active exploit of an XML Core Services package in all supported versions of Windows, which Ars...
Windows driveby attack on aeronautical website may be state sponsored
'Hacktivists' responsible for 58 percent of data theft in 2011, according to report

Google, Microsoft and Yahoo fix serious email weakness

www.pcworld.com
Google, Microsoft and Yahoo have remedied a cryptographic weakness in their email systems that could allow an attacker to create a spoofed message that passes a mathematical security verification. The weakness affects DKIM, or DomainKeys Identified Mail, a security system used by major email senders. DKIM wraps a cryptographic...
Google, Microsoft and Yahoo fix serious email weakness

Media companies want congress to legalize spyware, malware, & other insane acts

venturebeat.com
The misleadingly named Commission on the Theft of American Intellectual Property (aka a group of legal types from the U.S entertainment industry) has released a new, lengthy 84-page report that urges congress to take drastic measures that enables media companies to curb piracy. Also, those measures are mostly insane....
Media companies want congress to legalize spyware, malware, & other insane acts
10 common mobile security problems to attack

What's the future of communication? Let's ask the experts

thenextweb.com
Communication plays a role in all information exchanged between living species. Technically speaking, even plants and fungi communicate with each other. What sets us humans apart is the speed at which our means of communication develops and innovates. Technology has been helping us to communicate easier, faster and more often....
What's the future of communication? Let's ask the experts

20 ways to keep your internet identity safe from hackers

www.guardian.co.uk
Do you use the same password for all websites? Do you overshare on Facebook? If so, you're a target for cybercriminals - whose computer scams are costing Britain £27bn a year. We asked experts for their top tips to beat the fraudstersWe're high up in the Gherkin in the City...
20 ways to keep your internet identity safe from hackers

Recently patched Java flaw already targeted in mass attacks, researchers say

www.pcworld.com
A recently patched Java remote code execution vulnerability is already being exploited by cybercriminals in mass attacks to infect computers with scareware, security researchers warn.The vulnerability, identified as CVE-2013-2423, was one of the 42 security issues fixed in Java 7 Update 21 that was released by Oracle last week,...
Recently patched Java flaw already targeted in mass attacks, researchers say

Project Blitzkrieg warns of mass cyberattacks against U.S. banks

news.cnet.com
A new security report by McAfee confirms that cybercriminals claiming to hack into hundreds of bank accounts next spring is a "credible threat." [Read more]...
Project Blitzkrieg warns of mass cyberattacks against U.S. banks
The DDoS Protection Squad

UK’s SOCA sees second DDoS attack in less than a year

thenextweb.com
The UK’s Serious Organised Crime Agency (SOCA) has confirmed that its website has suffered a distributed denial-of-service (DDoS) attack. but it’s not particularly worried by this form harassment. Security and data protection solutions provider Sophos notes on its blog that this is the second time in less than a year...
UK’s SOCA sees second DDoS attack in less than a year

PC security: Your essential software toolbox

www.pcworld.com
Mobile malware is getting lots of attention these days, but you can't forget about your PC's security--after all, you probably still use it to pay bills, shop online, and store sensitive documents. You should fully protect yourself to lessen the chance of cybercriminals infiltrating your computer and your online...
PC security: Your essential software toolbox
Microsoft executive blames cybercrime for delayed mobile strategy

Microsoft, US feds disrupt Citadel botnet network

www.pcworld.com
Microsoft and the U.S. Federal Bureau of Investigation have taken aim at a botnet network based on malware called Citadel that is held responsible for stealing people's online banking information and personal identities.The company, however, warned that because of Citadel's size and complexity, it does not expect to fully...
Microsoft, US feds disrupt Citadel botnet network

New Whitehole exploit toolkit emerges on the underground market

www.computerworld.com
A new exploit kit called Whitehole has emerged on the underground market, providing cybercriminals with one more tool to infect computers with malware over the Web, security researchers from antivirus vendor Trend Micro reported Wednesday....
New Whitehole exploit toolkit emerges on the underground market

Hackers Targeting Android Browsers

www.fastcompany.com
Android phones might be popular, but they're fertile territory for cybercriminals. According to a newly released McAfee report, phones are increasingly being infected by malware through mobile browsers. Instead of hoping fake games or wallpaper apps make it through the industrial-strength bouncers at the Google Play store, shady criminal gangs...
Hackers Targeting Android Browsers

tw

arstechnica.com
With all the attention being showered on Pinterest lately, it was inevitable that criminals would figure out a way to cash in on the popular social-media pinup site. New point-and-click software available in underground markets does just that by helping even the most technically unsophisticated people prey on the gullibility...
tw

10 Arrested in Breakup of Botnet Crime Ring

www.nytimes.com
Law enforcement officials were helped by Facebook, whose users were among those targeted by the software employed by cybercriminals in the last few years....
10 Arrested in Breakup of Botnet Crime Ring

IT Must Change Security Strategies to Keep Up With Cybercriminals

www.pcworld.com
With an eye to the threat horizon several years out, organizations can no longer afford to leave responsibility for managing security risks at the door of the information security department....
IT Must Change Security Strategies to Keep Up With Cybercriminals

Botnet steals $47M from 30K European bank accounts by infecting PCs, Android and BlackBerry devices

thenextweb.com
Security firm Check Point has unearthed a new case study detailing how more than €36 million ($47 million) was stolen from more than 30,000 corporate and private banking customers across Europe. The cybercriminals behind the schemed conducted a highly sophisticated attack featuring malware infecting both PCs and mobile devices. Check...
Botnet steals $47M from 30K European bank accounts by infecting PCs, Android and BlackBerry devices

New Whitehole exploit toolkit emerges on the underground market

www.pcworld.com
A new exploit kit called Whitehole has emerged on the underground market, providing cybercriminals with one more tool to infect computers with malware over the Web, security researchers from antivirus vendor Trend Micro reported Wednesday. Exploit kits are malicious Web-based applications designed to install malware on computers by exploiting...
New Whitehole exploit toolkit emerges on the underground market

Networks under attack

www.guardian.co.uk
Your company's confidential information is under threat from botnets, spreading infection across the networkA botnet is a collection of connected PCs that are under the control of a remote hacker, typically through an infected PC that is then run by an external command and control system.The infected software can be...
Networks under attack

We've Got One Year Before The Internet Kills Us All

betabeat.com
(flickr/mjtmail) Firms specializing in technology security make it their business to scare potential customers, but that doesn't make an Internet Identity (IID) report predicting cyber doom in 2014, highlighted today by Ray Kurzweil's Accelerating Intelligence, any less spooky. According to IID, looming cybersecurity threats in 2013--more mobile malware, increasingly aggressive...
We've Got One Year Before The Internet Kills Us All

Unpatched Java Vulnerability Exploited to Infect Macs With Flashback Malware

www.pcworld.com
A Java vulnerability that hasn't yet been patched by Apple is being exploited by cybercriminals to infect Mac computers with a new variant of the Flashback......
Unpatched Java Vulnerability Exploited to Infect Macs With Flashback Malware

The Circuit: Hacktivists vs. cyber criminals, Verizon/cable hearing recap, FCC spectrum task force

www.washingtonpost.com
Hacktivists stole more than criminals, study says: A new study from Verizon on data breaches found that “hacktivist” groups stole more data in 2011 than cybercriminals. According to the study, released Thursday, cybercriminals stole more than 100 million of the 174 million records taken in 2011. Read full article...
The Circuit: Hacktivists vs. cyber criminals, Verizon/cable hearing recap, FCC spectrum task force

Facebook Valentine’s Day Theme Leads to Trojan

news.softpedia.com
As Facebook users are preparing for Valentine’s Day, cybercriminals are relying on the fact that lovebirds may be tempted to install a so-called Valentine’s theme to make their profiles more special. Trend Micro researchers came across one of these scams that attempts to dupe victims into downloading a malicious Trojan...
Facebook Valentine’s Day Theme Leads to Trojan

Protect Your Data with Sunbelt Personal Firewall

chris.pirillo.com
Protect Your Data with Sunbelt Personal Firewall is a post from Chris PirilloWe know that some of our readers have not jumped to Windows 7 and are staying with their current operating systems. For that reason, we want to make certain that some of the best security programs remain available...
Protect Your Data with Sunbelt Personal Firewall

DailyDirt: ATMs Are Ripe For Picking...

www.techdirt.com
Thieves are getting more clever about stealing money from ATMs. It used to be that people mostly just had to worry about getting robbed while getting cash at an ATM. In 1998, Joseph Zingher, a Chicago businessman, even patented a "reverse PIN system" called SafetyPIN that would alert police when...
DailyDirt: ATMs Are Ripe For Picking...

Oracle's Java patch contains new holes, researchers warn

www.pcworld.com
Researchers from Security Explorations, a Poland-based vulnerability research firm, claim to have found two new vulnerabilities in Java 7 Update 11 that can be exploited to bypass the software's security sandbox and execute arbitrary code on computers. Oracle released Java 7 Update 11 last Sunday as an emergency security...
Oracle's Java patch contains new holes, researchers warn

Ransomware threatens victims with police reports for child pornography

www.computerworld.com
Cybercriminals are using a new piece of malware to extort money from their victims by encrypting their files and threatening to alert authorities about child pornography being stored on their computers, according to security researchers from antivirus firm Sophos....
Ransomware threatens victims with police reports for child pornography
× Just a test of the new info bar. What do you think?