Posts Tagged ‘Cybercrime’


Volunteers Help PoliceWhat is the best way for police to utilise their funds when it comes to tackling cybercrime.

An announcement that the Hampshire Constabulary are looking for skilled IT workers to act as Special Constables has caused a bit of controversy and consternation.

There is no doubt that fighting cybercrime is a difficult task and having as much assistance as possible is vital. One of the biggest problems for police forces is that they tend to be a step or two behind the leading criminals and operators in this field. (more…)

Cyber securityA botnet, called Qbot, to have infected over 500,000 systems.

Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe.

According to Proofpoint, attacks by type drive-by-dovnload carried out with the help of compromised sites on the WordPress platform. (more…)

HackersOver recent years, more and more businesses have become increasingly reliant on digital technology.

While this has helped to improve processes, increase output, and contribute to the overall success of many businesses, it has also put businesses at increased risk of one of today’s most prevalent types of crime – cybercrime.

Every year, huge numbers of businesses fall victim to this type of criminal activity in some way. Cybercrime is not targeted at specific businesses, as it affects both large and smaller companies as well as individuals and government agencies. Cybercriminals have become increasingly sophisticated in terms of the methods that they use, and have managed to keep up with advancements in technology admirably. (more…)

McAfee logoThis amount is approximate, since companies often do not report the true amount of the loss, and some are not aware of sophisticated attacks.

McAfee and the Center for Strategic and International Studies (CSIS) submitted a joint report entitled «The Economic Impact of Cybercrime and Cyber ​​Espionage», the main theme of which is the impact of cyber crime to the global economy.

If before the damage from the global cybercrime is $1 trillion, now security experts believe that this figure year on year is between $300 billion and $1trillion. According to experts, these amounts are approximate, since companies often do not report the true amount of the loss, and some did not know about the attacks perpetrated on them. (more…)

HackersA number of companies specializing in the protection of computer data, came to a sensational conclusion. Most cyber-attacks does not come from China, as is commonly believed, but from India. List of targets of these attacks varies from Pakistani government officials to the Chicago Mercantile Exchange.

As reported by The Wall Street Journal, a number of companies involved in the protection of personal computers, found that the common view of China as the main source of hacker attacks actually greatly exaggerated. The experts of these companies claim that most of these attacks come from the country, which is rarely remembered in connection with cybercrime – India.

According to the Norwegian company Norman Shark, who studied data on cyber attacks over the past three years, most of them have “no hell, which is issued to the Chinese track.” “On the contrary, we began to notice other patterns, such as the typical Indian names” – quoted analyst Snorre Fagerland of Norman Shark The Wall Street Journal. (more…)

Computer threats

Computer threats

If you do not take any measures to ensure the security of your computer in a “perfect” day, you may become a victim of cybercrime.

Speaking of cybercrime, we primarily mean those cases where hackers use your personal computer for malicious purposes. You may be subject to such action, if you are using an unprotected computer, received fraudulent e-mail, which referred to the “urgent problem” that occurred in your account on Gmail.com, or even if just you wander on the network. The goal of hackers – to steal your private information, such as number and pin code credit card, username and password to access your bank, etc.

In addition, they may need your computer with all the processing power and internet access for viruses even more computers. This also allows hackers to mask their true location in the implementation of cyber attacks. The greater the number of computers used in this hacker, law enforcement more difficult to calculate it. If the offender can not be found, it can not be stopped and punished. (more…)

Valentine Day ThreatsOn the Internet a lot of social services intended for communication and personal acquaintances.

Sometimes users find their other half is in the vast global network. For this reason, Valentine’s Day is very popular with cybercriminals is coming is a good time to spread malicious content of unsuspecting users.

“The popular holidays such as Valentine’s Day, increase the vulnerability of Internet users. Attackers prepare thematic content of interest to people in this day. Users willing to click on an infected link disguised as a greeting card or a love message, and can easily become victims of cybercrime. “

Antivirus companies offer a number of ways to protect themselves and their information on Valentine’s Day:

Avoid opening the congratulatory messages from unknown senders, probably love letter instead of a mysterious stranger that proved fraudulent letter from cybercriminals. The same recommendation applies to downloading attachments in such a report files – besides infecting your computer, they can lead to unwanted ads while browsing the site. (more…)

HackersCybercrime has become a source of considerable income even for the rank and file of shadow schemes, says consulting firm in the field of information security Fortinet.

Senior security analyst in the division of FortiGuard Fortinet Derek Manky spent more than a year for tracking online communities in which virtual intruders are a set of statements botnets. The company has recently released a ‘Report on Cybercrime in 2013’ (2013 Cybercrime Report), which provides a deep analysis of the organization of modern spam botnets.

Based on data collected was compiled peculiar ‘rating fees’ paid by the owners of networks of infected computers for a variety of operations on illegal advertising ezine or cracking.

“Before, botnet owners do it all yourself” – says Mankey. According to the report, the botnet now – it’s not just a network of infected PCs controlled by a lone attacker or group of anonymous individuals. Spamming has long become a full-fledged business – to serve its operations botnets as legitimate companies to recruit.

Taken separately botnet control includes a variety of tasks. Here, in addition to direct technical operations include, for example, legal advice, which help draw shady deal to lease or purchase of infected networks. Or services of brokers who register worldwide dynamically changing IP-addresses to disguise as the location and extent of the botnet services to combat cybercrime. (more…)