Please turn on your JavaScript for this page to function normally.
data
Metadata: The secret data trail

Every phone call, text message, even activated cell phones, leaves a trail of data across a network. In many cases this data is aggregated with other data and metadata …

Nigeria
Nigerian scammers: Then and now

The image that the expression “Nigerian scammer” conjures up in most people’s heads is still that of the confidence man behind the keyboard, convincing …

arrows
Hackers changing tactics, techniques and procedures

Organizations need to conduct better penetration testing to combat continual changes in hackers’ tactics, techniques and procedures (TTPs), according to NTT Security. “Our Q3 …

deep web
How cybercriminals attack homes, and how to stop them

At a recent Home Hacker Lab event, an ethical hacker revealed how cybercriminals attack, and what consumers can do to protect themselves. The October 13 workshop in New York …

ATM
Biometric skimmers: Future threats to ATMs

Kaspersky Lab experts investigated how cybercriminals could exploit new biometric ATM authentication technologies planned by banks. While many financial organizations consider …

Search
Rise of cyber attacks against the public sector

The use of information and communication technologies in the public sector, specifically online government services, is a key factor for being targeted by cybercriminals. …

Gold
Man hacked, blackmailed gold bullion trading firm

25-year-old Adam Penny hacked the systems of an unnamed gold bullion trading firm, and used the stolen information about gold deliveries to intercept them before they are …

antenna
Cybercriminals select insiders to attack telecom providers

Cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, according to Kaspersky Lab. In addition, these criminals are also …

world
New wave of targeted attacks focus on industrial organizations

Kaspersky Lab researchers discovered a new wave of targeted attacks against the industrial and engineering sectors in 30 countries around the world. Dubbed Operation Ghoul, …

Shark Ransomware-as-a-Service: A real threat, a scam, or both?

A new Ransomware-as-a-Service project has sprung up, and the “service providers” are allowing others to use it for free, but take a 20 percent cut out of every …

criminal
Interpol arrests Nigerian scam mastermind who stole $60 million

The head of an international criminal network behind thousands of online frauds has been arrested in a joint operation by INTERPOL and the Nigerian Economic and Financial …

Connect
Cyber synergy: The need for collaborative cyber intelligence

It’s official – cybercrime now has a bigger impact than any other form of crime in the UK. That’s the conclusion drawn by the National Crime Agency (NCA) and Strategic Cyber …

Don't miss

Cybersecurity news