cybercrime
Underground toolkits will make cyber espionage easy
With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic …
Increased collaboration on cybercrime syndicate crackdowns
As 2010 comes to a close, information security companies are trying to predict the amount of problems we’ll have to deal with next year. Below is a list of 5 security …
Experiment reveals how scammers earn huge money with simple scams
An interesting experiment conducted by UK-based scam-tracking organization Scam Detectives has revealed how online scams can earn scammers a lot of money in a short time …
Week in review: Online shopping safety, malware hybrids and Packet Wars
Here’s an overview of some of last week’s most interesting news, articles and reviews: Google Apps Script API flaw allowed attacker to impersonate Google Details …
Growing security crisis for mobile networks
The wireless nature of the cellular networks makes them more susceptible to criminal attack, according to a Heavy Reading report. “If anything, our research suggests …
Bruce Schneier on cyberwar and cybercrime
In this video, Bruce Schneier examined the future of cyberwar and cyber security. He explored the current debate on the threat of cyber war, asking whether or not the threat …
Malaysian hacker breached Federal Reserve and DoD contractor networks
When agents arrested Malasyian Lin Mun Poo on account of selling US$1,000 worth of stolen credit card numbers just hours after he arrived in the U.S., they probably …
Week in review: Cybercrime victims, PayPal phishing and Moxie Marlinspike
Here’s an overview of some of last week’s most interesting news and interviews: Top 10 security threats for 2011 Imperva announced their predictions for the top …
Two thirds of Internet users have fallen victim to cybercrime
When reading about instances of cybercrime, we often get caught in the numbers and think about the details of a particular attack or exploitation of a technology, and actually …
The 12 most dangerous online scams
Consumers would be wise to beware of the most common scams of the season before heading online to book travel and do holiday shopping. McAfee revealed the 12 most dangerous …
Top 10 security threats for 2011
Imperva announced their predictions for the top ten security trends for 2011 which have been compiled to help IT security professionals defend their organization against the …
Two FBI fugitives wanted on federal cyber crime charges captured
On November 3, 2010, Dorin Codreanu and Lilian Adam were arrested in Portage, Wisconsin by FBI agents. Codreanu and Adam have been fugitives since September 30 when FBI agents …
Featured news
Resources
Don't miss
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities
- Why logs aren’t enough: Enhancing SIEM with AI-driven NDR