Revealing many of the most extreme and horrifying examples of modern cyber crime, she seeks to educate the millions of YouTube, Twitter, and Facebook users about the various hazards posed by new media. Covering the identity theft and subsequent murder of Amy Boyer in 1999, avoiding sexual predators, defending bank accounts against fraudulent phishing scams, and the rise of online bullying, Hitchcock provides a compelling, broad-ranging collection of case studies from which consumers can learn to defend themselves and their families against online criminals.
This collection of real-life horror stories is a must-read for true crime aficionados and fans of such television fare as 48 Hours Mystery, Forensic Files, and the Investigation Discovery channel. Guaranteed to shock and surprise, this book will forever change the way users experience the internet.
In the retail sector, almost all of the data breaches involve some kind of compromise to cardholder data, which is a trend that is expected to increase.
Download this free guide
The importance of web security
Join us as we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Despite investment in security and compliance, 2018 shows
China leads the hacking charts with the highest combination of impact factors ticked off on a matrix combining the potential capability and impact of possible attacker groups, thus presenting the highest risk, forming one of three actors with a potential tier 6 catastrophic impact (alongside Russia and the Five Eyes) according to a new report by Flashpoint.
The authors say that this Decision Report reinforces the need for decision makers inside the enterprise to incorporate Business Risk Intelligence (BRI) into their risk assessments and strategies.
Flashpoint has detailed the main factors that will increase cyber-threat levels producing its Threat Matrix which details the capability and potential impact of different attackers, from specific nation states to Jihadis.
A primary focus is the fact that cyber-warfare is a main component used in all conflict now. Consequently the increase in
The company claims that fraudsters are turning their attention away from credit cards and are now leveraging identity data to launch attacks that “produce long-term profits”.
There was “a highly elevated attack rate on account creations”, according to the company. And more than one in nine of accounts created last year were fraudulent.
Bot-net activity levels grew in 2017 too, accounting for 90 per cent of traffic sent to retail sites, ThreatMetrix claims. It also claims that there were “extreme spikes” in cyber attack levels throughout the year. For instance, it suggests
Don’t think the police will help you find, let alone catch, cyber criminals if they make off with your corporate loot. And don’t think this is only a problem for companies in other countries. South African businesses, like South Africans themselves, are increasingly being targeted.
The story of a local bank being taken for R300 million by cyber criminals who had 100 people withdrawing money from ATMs in Japan made the headlines. But South African companies, unlike their US counterparts, are not required by law to report cases of cyber theft so how many more have gone by unmentioned? The bank reportedly never got its cash back so it’s still wise to secure your systems from attack; the more proactive the better.
The likelihood of cyber attackers plundering your vaults is already vast and growing daily. The threat landscape today is highly sophisticated but our defences are typically outdated and reactive
The government has decided to set up a Cyber Warrior Police Force (CWPF) to tackle internet-related crimes such as cyber threats, child pornography and online stalking.
The CWPF is likely to operate under the National Information Security Policy and Guidelines wing of the Union home ministry’s Cyber and Information Security (CIS) division, which was created last November. It is proposed to be raised on the lines of the Central Armed Police Force.
The other two wings under the CIS division are cyber crime and internal security.
“It’s a policy decision, and the process has already begun. The Army is also planning to do something on similar lines. We hope our unit will operate effectively,” a senior home ministry functionary said on the condition of anonymity, adding that the finer details of the proposed force will be worked out soon.
So far, there has been no decision on the CWPF’s jurisdiction, where it will derive
A US hospital paid extortionists roughly $60,000 to end a ransomware outbreak that forced staff to use pencil-and-paper records.
The crooks had infected the network of Hancock Health, in Indiana, with the Samsam software nasty, which scrambled files and demanded payment to recover the documents. The criminals broke in around 9.30pm on January 11 after finding a box with an exploitable Remote Desktop Protocol (RDP) server, and inject their ransomware into connected computers.
Medical IT teams were alerted in early 2016 that hospitals were being targeted by Samsam, although it appears the warnings weren’t heeded in this case.
According to the hospital, the malware spread over the network and was able to encrypt “a number of the hospital’s information systems,” reducing staff to scratching out patient notes on pieces of dead tree.
With flu season well underway in the US state, Hancock Health administrators called in the FBI’s cyber-crime task force, and