Lawbreakers & Cybercrime
Russian banks have had licences revoked after being suspected of direct participation in using hackers or blaming cyber-attacks to withdraw funds illegally.
Though dubbed the most successful malware in history Cryptowall can be stopped
New statistics being released today by the ONS are expected to confirm that cyber-crime has become the largest recorded offence in the UK
Financial malware web injection technique hacker Deniss Calovskis says he 'knew he was breaking the law'
An attacker compromised a privileged account on Mozilla's Bugzilla bug tracker tool and used the gleaned information to exploit a critical bug.
Solicitors are getting hit by a growing tide of cyber-enabled fraud, resulting in the loss of money and confidential information.
Europol agency EC3 is partnering with Zeus and CryptoLocker threat specialist AnubisNetworks, as it bids to make take-downs more successful.
The Metropolitan Police has become the latest law enforcement agency to complain that encryption makes it difficult to catch and prosecute criminals.
Mark Jackson, detective superintendent of the recently-established Met Police Cyber Crime Unit, has admitted that London's police are only just finding out how to tackle cyber-crime.
Details of 18,000 members of the 'Verified' Eastern European cyber crime forum have been leaked by a rival gang
France is attracting widespread criticism after introducing a new law which allows the government to gather even more digital information than before.
Most of the rise in cybercrime can be linked to data-stealing malware, and Trojans are the fastest growing category, according to a report released on Monday by Trend Micro.
A vulnerability in a third-party service through which users post photos to their Twitter profiles allowed hackers on Sunday to falsely report that Britney Spears had died.
No 10 to unveil 'widened' US-style cyber security strategy within weeks
Threats are becoming more sophisticated, and cybercriminals are getting smarter at evading new authentication controls, according to an RSA Conference panel of security practitioners representing three major financial institutions.
The top two threat families on Microsoft's detection and removal list this month are online game password stealers (PWS).
Organisations that hold personal data should be made liable for fraudulent transactions, say BT security experts.
Gary McKinnon will be extradited to the US after he lost an appeal to the Law Lords this morning - and may now face a life sentence.
Prevx, an internet security company headquartered in Derby has discovered a new trojan designed to steal information from large banking institutions. Jacques Erasmus, director of malware research, told SCMagazineUS.com on Friday that the Limbo 2 trojan might be the most sophisticated trojan yet released.
Search engine Google has had its Hot Trends system hacked for the second time in seven days.
Institutions that process numeric data need to be more diligent to avoid financial loss, warn security experts.
The days of the lone hacker are seemingly over, with cybercrime organisations now run by bosses parading as business entrepreneurs, complete with criminal staff.
The sentencing of Robert Soloway, the so-called Seattle "Spam King" who pleaded guilty in March to delivering millions of unwanted emails, has been delayed until next week.
A new trojan in the wild is infecting multimedia files on a victim's hard disk.
Google and eBay have joined forces to protect users from spam and malicious emails by leveraging an authentication technology called DomainKeys.
SC Webcasts UK
Sign up to our newsletters
SC Magazine UK Articles
- It's a trap! WhatsApp Gold 'premium' version lures users to malware
- Two-year GDPR honeymoon period starts today
- Surrey teenager charged under Computer Misuse Act over Mumsnet hack
- Cerber ransomware on sale in Russian darknet with new scripting features
- Netflix's VPN ban may result in stronger security for VPN customers
- Email error leaks hundreds of Northern Ireland prison officer details
- Don't connect your charging cell to a computer or you may get hacked!
- SC Roundtable: Turning data into actionable intelligence
- Wekby cyber-criminals use DNS tunnelling for command and control of malware
- ICYMI: WhatsApp trap; Cerber RaaS; LinkedIn loss; Screen lock; 2 yrs to GDPR