Fraud con 2.0 - Insights into a cyber-crime investigation - and how GDPR can inadvertently make tracking down criminals more difficult.
The real target of a wiper malware attack on Banco de Chile were transactions on the SWIFT network that resulted in a £7.5 million heist.
In addition to sniffing out drugs, bombs, and other weapons, law enforcement agencies at federal and local levels are training their canine units to assist in fighting cyber-crime by sniffing out hidden electronic devices.
Security researcher have discovered a series of attacks targeted at service centres in Russia. Multi-staged attacks used 17-year-old vulnerability and a RAT
The concept of infecting targeted users with banking trojans has been so successful in the recent past that in the first quarter of 2018, banking trojans overtook ransomware as the top malicious payload distributed through email.
Cryptojacking increases victims' electricity expenses, may affect user experience as computer performance is negatively impacted, and could cause down time of hijacked servers. It's nothing more than outright theft.
Earlier this month, the Q1 Cybercrime Report from ThreatMetrix revealed that in the first quarter of 2018 alone, ecommerce services suffered as many as 820 million bot attacks.
Four prevalent myths about DDoS are that: DDoS only hits big brands; every DDoS attack is the same; protection is too expensive; all solutions are the same - but each of these beliefs is false.
Newly published research reveals the poor state of enterprise cloud security, as evidenced by the advance of cryptojacking within these environments.
Researchers detected a new malware that steals not only browser credentials, browser cookies and text files, but also cache and key files from the desktop version of end-to-end encrypted instant messaging service Telegram.
Expenditure on cyber-security in the five years to 2021 will exceed US$1 trillion; losses from cyber-crime reach US$6 trillion annually; top 500 cyber-security companies list published.
A recently discovered email phishing campaign was found targeting Apple ID credentials, while using AES encryption to thwart active countermeasures against their malicious website.
A US student in San Fransico accused of hacking his school's computer system to change grades was captured with the aid of a K-9 unit when its dog was able to sniff out a thumb drive holding incriminating evidence.
Researchers have come across a new ransomware variant named Vega Stealer that is taking special aim at those in the marketing, advertising, public relations and retail/manufacturing industries.
2017 represented the peak of ransomware, not a new dawn, with WannaCry and NotPetya anomalous spikes; overall infection rates have declined ever since, down 50%, from 350 different ransomware families in 2015 to 170 in 2017.
In the past couple of years, while we have seen a rise in businesses adopting new cyber-security policies, such measures have not been able to curb the rise of malicious malware and cyber-weapons used against healthcare.
Operation Power Off, led by the Dutch Police and the UK's National Crime Agency, supported by Europol and a dozen other law enforcement agencies led to arrests of the administrators of DDoS marketplace webstresser.org.
75 percent of online banking systems contained cross-site scripting flaws, 69 percent lacked protection from data interception, 63 percent had insufficient authorisation, 50 percent were vulnerable to sensitive data disclosure.
Attackers recently distributed a trojanised calculator app that downloads a cryptominer targeting Bitvote (BTV), a forked version of Bitcoin that launched just last January.
Ukraine's energy and coal ministry website has been hit by a ransomware attack demanding Bitcoin to recover encrypted files according to a report from Reuters citing Ukrainian cyber police spokeswoman Yulia Kvitko.
If the visitor clicks anywhere on the page, then according to Cable, "LinkedIn interprets this as the AutoFill button being pressed, and sends the information via postMessage to the malicious site".
The global cyber-crime-based economy has become a self-sustaining system and oversees the theft, laundering, spending, and reinvesting of £1.07 trillion by cyber-criminals across the globe, a study by Bromium has revealed.
POS systems are unique, typically single-purpose and require limited software to function. Defenders should use this to their advantage, and enable application whitelisting to prevent unwanted or modified processes from running.
The best way to avoid account opening fraud is to detect fraudsters before they can gain access to any account opening processes. Other fraud detection techniques include location analysis, checking for automation vs human etc
Norway and Switzerland become new official members of the J-CAT (Joint Cybercrime Action Taskforce) based within Europol's European Cybercrime Centre (EC3) in the Netherlands.
Learning algorithms are capable of recognising patterns in data and discern fraudsters from legitimate clients by correlating thousands of pieces of information that, most probably, wouldn't be otherwise noticeable to a human.
The stand-out arguments for regulatory intervention in cryptocurrencies are greater consumer protection and more effective financial crime prevention. But do they want the benefits and responsibilities of official recognition?
A Nigerian man pleaded guilty Wednesday in a US Manhattan Federal Court to helping perpetuate business email compromise (BEC) scams aimed at netting millions of dollars.
Cyber-criminals are once again abusing trusted applications, such as Microsoft Office, to launch multi-stage attacks inside malicious documents to deliver Formbook malware.
Thieves are intercepting debit cards in the mail, removing their chips and replacing them with older or invalid ones, and then using the stolen chips when their rightful owner activates the sabotaged card.