Cyber Crime

Related News

How to protect your data as COVID-19 scams soar

  • ProtonMail Blog
  • Published date: 2020-03-31 16:25:41

As the world is grappling with a sharp rise in the number of COVID-19 cases, fraudsters are trying to capitalize on the state of panic and even the goodwill of others. More than 1,400 coronavirus-related domains were registered over the past three months, man…

As the world is grappling with a sharp rise in the number of COVID-19 cases, fraudsters are trying to capitalize on the state of panic and even the goodwill of others. More than 1,400 coronavirus-related domains were registered over the past three months, ma… [+5994 chars]

Android Apps in Google Play Store Capitalizing on Coronavirus Outbreak

  • None
  • Published date: 2020-03-31 10:25:00

Now in a fresh twist, third-party Android app developers too have begun to take advantage of the situation to use coronavirus-related keywords in their app names, descriptions, or in the package names so as to drop malware, perpetrate financial theft and rank…

Preying on public fears, the ongoing coronavirus outbreak is proving to be a goldmine of opportunity for attackers to stage a variety of malware attacks, phishing campaigns, and create scam sites and malicious tracker apps. Now in a fresh twist, third-party … [+5621 chars]

Watch Out: Android Apps in Google Play Store Capitalizing on Coronavirus Outbreak

Preying on public fears, the ongoing coronavirus outbreak is proving to be a goldmine of opportunity for attackers to stage a variety of malware attacks, phishing campaigns, and create scam sites and malicious tracker apps. Now in a fresh twist, third-party A…

Preying on public fears, the ongoing coronavirus outbreak is proving to be a goldmine of opportunity for attackers to stage a variety of malware attacks, phishing campaigns, and create scam sites and malicious tracker apps.Now in a fresh twist, third-party An… [+5474 chars]

Nigeria: Assessing Telecoms Regulation

  • None
  • Published date: 2020-03-19 09:42:27

[This Day] Emma Okonji reviews the findings of the Senate Committee on telecommunications, led by Senator Oluremi Tinubu, which penultimate week had on-the-spot assessment of the activities of the Nigerian Communications Commission.

Emma Okonji reviews the findings of the Senate Committee on telecommunications, led by Senator Oluremi Tinubu, which penultimate week had on-the-spot assessment of the activities of the Nigerian Communications Commission. The Chairman of the Senate Committee… [+10095 chars]

24 Tax Scams to Watch Out For

  • Samson Haileyesus
  • Published date: 2020-03-18 16:00:29

Tax scams can involve criminals impersonating IRS agents, government agencies, customer support employees and more. Here are 25 to watch out for.

The tax season can be a stressful period for businesses. This period is marked with pressures to file for returns by a deadline and it inadvertently provides good opportunities for scammers to strike.  Scammers pounce on opportunities to steal your sensitive … [+15966 chars]

Risk Analytics Market to Reach $65.25 Bn, Globally, by 2026, at 17.4% CAGR: Allied Market Research

  • PR Newswire
  • Published date: 2020-03-18 14:00:00

Allied Market Research published a report, titled, "Risk Analytics Market by Component (Solution and Services), Deployment Model (On-Premise and Cloud), Organization Size (Large Enterprises and Small & Medium Enterprises), Application (Strategic Risks, Financ…

Increase in stringent government regulatory compliances, rapid growth of IoT landscape, and rise in adoption of risk analytics among financial institutions propel the growth of the global risk analytics market. PORTLAND, Oregon, March 18, 2020 /PRNewswire/ -… [+6202 chars]

TrickBot Now Exploits Infected PCs to Launch RDP Brute Force Attacks

  • None
  • Published date: 2020-03-18 10:03:00

The module, dubbed “ rdpScanDll,” was discovered on January 30 and is said to be still in development, said cybersecurity firm Bitdefender in a report shared with The Hacker news. According to the researchers, the rdpScanDll brute-forcing module has so far at…

A new module for TrickBot banking Trojan has recently been discovered in the wild that lets attackers leverage compromised systems to launch brute-force attacks against selected Windows systems running a Remote Desktop Protocol (RDP) connection exposed to the… [+5464 chars]

TrickBot Now Exploits Infected PCs to Launch RDP Brute Force Attacks

  • Ravie Lakshmanan
  • Published date: 2020-03-18 08:35:00

A new module for TrickBot banking Trojan has recently been discovered in the wild that lets attackers leverage compromised systems to launch brute-force attacks against selected Windows systems running a Remote Desktop Protocol (RDP) connection exposed to the…

A new module for TrickBot banking Trojan has recently been discovered in the wild that lets attackers leverage compromised systems to launch brute-force attacks against selected Windows systems running a Remote Desktop Protocol (RDP) connection exposed to the… [+5453 chars]

AT&T Cell Phone Hack Worth $1 Million, Victim Sues Carrier

  • Deidre Richardson
  • Published date: 2020-03-17 18:53:18

AT&T faces another lawsuit, as a victim sues for a cell phone hack that stole his life savings, totaling $1 million. Rob Ross says that back in October 2018, he was in his home office in San Francisco. Suddenly, a withdrawal notification appears on his iPhone…

AT&T faces another lawsuit, as a victim sues for a cell phone hack that stole his life savings, totaling $1 million. Rob Ross says that back in October 2018, he was in his home office in San Francisco. Suddenly, a withdrawal notification appears on his i… [+3589 chars]

Watch Out for Coronavirus-Tied Cyber Attacks on Remote Workers, Warns Tech Professor

  • David Simpson
  • Published date: 2020-03-17 05:00:13

The heightened fear and anxiety that COVID-19 is causing people worldwide brings vulnerable targets for cyber hackers. “We are living in a heightened time of cyber risk. Cyber criminals will take advantage of public fear and due diligence health measures …

The heightened fear and anxiety that COVID-19 is causing people worldwide brings vulnerable targets for cyber hackers. “We are living in a heightened time of cyber risk. Cyber criminals will take advantage of public fear and due diligence health measures to … [+2355 chars]

Coronavirus Heightens Risk of Cybercrime in the Workplace, Expert Warns

  • Virginia Tech
  • Published date: 2020-03-16 14:33:58

Heightened fear and anxiety related to COVID-19 makes people more vulnerable targets for cyber hackers, says Professor David Simpson at Virginia Tech.

By Virginia Tech March 16, 2020CommentsThe heightened fear and anxiety that COVID-19 is causing people worldwide brings vulnerable targets for cyber hackers, says David Simpson, a professor at the Pamplin College of Business at Virginia Tech. "We are living… [+2654 chars]

Europol Arrests 26 SIM Swapping Fraudsters For Stealing Over $3 Million

  • None
  • Published date: 2020-03-16 10:00:00

The law enforcement agencies arrested 12 and 14 people in Spain and Romania, respectively, as part of a joint operation against two different groups of SIM swappers, Europol said. The development comes as SIM swapping attacks are emerging as one of the bigges…

Europol, along with the Spanish and the Romanian national police, has arrested 26 individuals in connection with the theft of over 3.5 million ($3.9 million) by hijacking people’s phone numbers via SIM swapping attacks. The law enforcement agencies arrested … [+2930 chars]

Europol Arrests 26 SIM Swapping Fraudsters For Stealing Over $3 Million

Europol, along with the Spanish and the Romanian national police, has arrested 26 individuals in connection with the theft of over €3.5 million ($3.9 million) by hijacking people's phone numbers via SIM swapping attacks. The law enforcement agencies arrested …

Europol, along with the Spanish and the Romanian national police, has arrested 26 individuals in connection with the theft of over €3.5 million ($3.9 million) by hijacking people's phone numbers via SIM swapping attacks.The law enforcement agencies arrested 1… [+2926 chars]

How the world of health and tech is looking at the coronavirus outbreak

The crisis is opening up new opportunities for health and tech, but it is also bringing new challenges.

Since the novel coronavirus outbreak started in Wuhan, China, in December last year, weve seen the world focus on little else.  COVID-19 is putting strain on governments globally, and with over 90% of all cases reported so far coming from four countries, but… [+8685 chars]

Can your company afford to be a cyber victim? - TechHQ

  • Scott Thompson
  • Published date: 2020-03-10 12:05:00

It’ll never happen to us. How many organizations view cybersecurity as a box-ticking exercise while kidding themselves they will never be the target of hackers? It’s impossible to tell, but recent events show, once again, there is a real and present threat to…

Itll never happen to us. How many organizations view cybersecurity as a box-ticking exercise while kidding themselves they will never be the target of hackers?  Its impossible to tell, but recent events show, once again, there is a real and present threat to… [+4881 chars]

Will India's Proposed Data Protection Law Protect Privacy and Promote Growth?

  • Anirudh Burman
  • Published date: 2020-03-09 05:10:31

To better balance privacy and innovation, India's data protection legislation must be narrowly focused and designed to protect individuals and society against any injury resulting from data processing.

This publication was produced under Carnegie India’s Technology and Society Program. For details on the program’s funding, please visit the Carnegie India website. The views expressed in this piece are solely those of the author. Introduction How should a l… [+107743 chars]

Digital Forensics Used to Help Law Enforcement, Employers Defend Against Cybercrime

  • None
  • Published date: 2020-03-07 13:47:00

Hacker for hire. Online hacking services. Verified hackers. Believe it or not, there are thousands of opportunities to hire a hacker on the internet. Combine that with the considerable growth of digital devices and few are immune to cybersecurity crimes. In f…

Criminal activity with computers can be traced back to the 1970s when the U.S. military began noticing computer-related criminal activity. In 1984, the first computer forensics program, Magnetic Media, was created by the FBI to find child pornography offender… [+6088 chars]

#cybersecurity | hacker | Can your network operator stop your smart washer from airing your dirty laundry?

  • None
  • Published date: 2020-03-04 14:44:00

Migration to 5G and Cyber Security Alert the better connectivity it promises has also brought with it an equally burgeoning cybersecurity threat landscape. This, coupled with the proliferation of IoT devices that are fraught with inherent security flaws, mean…

Migration to 5G andthe better connectivity it promises has also brought with it an equallyburgeoning cybersecurity threat landscape. This, coupled with the proliferationof IoT devices that arefraught with inherent security flaws, means even bigger security wo… [+6684 chars]

Fraudulent Login Attacks Against Banks Surge: Akamai

  • Kevin Townsend
  • Published date: 2020-02-21 11:57:43

On August 7, 2019, a single credential stuffing attack against a financial services company recorded 55,141,782 malicious login attempts. To put that in perspective, it is more than twice the daily average (22,682,022) of credential abuse attacks detected by …

On August 7, 2019, a single credential stuffing attack against a financial services company recorded 55,141,782 malicious login attempts. To put that in perspective, it is more than twice the daily average (22,682,022) of credential abuse attacks detected by … [+5090 chars]

That Enormous Equifax Hack Looks a Lot More Bizarre Now

  • Josephine Wolff
  • Published date: 2020-02-11 15:57:15

The indictment of four members of the People’s Liberation Army suggests this was economic as well as political espionage—but that’s a hard case to make.

Attorney General William Barr held a press conference on Feb. 10 to announce the indictment of four members of Chinas military on charges of hacking into Equifax. <ol><li> Join Us to Discuss Redefining Free Speech for the Digital Age </li><li> Introducin… [+7220 chars]

3 Questions to Ask Yourself When Justifying Your Infosec Program

  • Wade Woolwine
  • Published date: 2020-02-06 18:51:00

On the Rapid7 Labs team, we’re constantly looking for ways to give defenders a boost in the work they need to accomplish. Most of the time, this manifests in research projects focused on detection and response, IoT, and attack surface management, but sometime…

On the Rapid7 Labs team, were constantly looking for ways to give defenders a boost in the work they need to accomplish. Most of the time, this manifests in research projects focused on detection and response, IoT, and attack surface management, but sometimes… [+8014 chars]

Remove GraceWire Trojan From Your PC

  • Martin Beltov
  • Published date: 2020-01-31 12:47:00

The contents of the email messages carrying the GraceWire Trojan include HTML redirects. The infection process is fairy complex as the Trojan file will not be downloaded directly. Instead an initial payload dropper called Dudear will do this. This is a script…

What is GraceWire? How to remove GraceWire Trojan from your PC or Mac? The GraceWire Trojan is a dangerous Trojan that takes advantage of the Necurs botnet to deliver the malware via phishing emails. It is being launched in a targeted attack campaign by a we… [+21939 chars]

With New Scorecard, Group Seeks Promises That Colleges Won’t Use Facial Recognition on Campus

  • Rebecca Koenig
  • Published date: 2020-01-28 19:16:50

More than 40 colleges have said they do not use facial recognition technology on campus and stated they have no plans to do so, according to a new ...

More than 40 colleges have said they do not use facial recognition technology on campus and stated they have no plans to do so, according to a new scorecard published Tuesday by an advocacy campaign titled Ban Facial Recognition on Campus. Launched in mid-J… [+2403 chars]

Why Cyber risk is the number one business risk in 2020 - Business MattersBusiness Matters

  • Simon Stokes
  • Published date: 2020-01-23 11:15:00

In January the Information Commissioner’s Office (ICO) fined DSG Retail Limited (DSG) £500,000 after a ‘point of sale’ computer system was compromised as a result of a cyber-attack, affecting at least 14 million people. An ICO investigation found that an atta…

An ICO investigation found that an attacker installed malware on 5,390 tills at DSGs Currys PC World and Dixons Travel stores between July 2017 and April 2018, collecting personal data during the nine-month period before the attack was detected. The companys… [+4714 chars]

#nationalcybersecuritymonth | Why Cyber risk is the number one business risk in 2020

  • Wire_Services
  • Published date: 2020-01-23 09:47:00

An ICO investigation found that an attacker installed malware on 5,390 tills at DSG’s Currys PC World and Dixons Travel stores between July 2017 and April 2018, collecting personal data during the nine-month period before the attack was detected. The company’…

An ICO investigation found that an attacker installed malware on 5,390 tills at DSGs Currys PC World and Dixons Travel stores between July 2017 and April 2018, collecting personal data during the nine-month period before the attack was detected. The companys… [+4711 chars]