Featured post

True Crime Online: Shocking Stories of Scamming, Stalking, Murder, and Mayhem

This new book by a top cybercrime expert and victim’s advocate explores horrific real-life crimes with roots in cyberspace. Author J. A. Hitchcock (Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists) is celebrated for her work to pass tough cybercrime legislation, train law enforcement, and help victims fight back. In True Crime Online: Shocking Stories of Scamming, Stalking, Murder, and Mayhem, she journeys into the darkest recesses of the internet to document the most depraved criminals imaginable, from bullies and stalkers to scam artists, sexual predators, and serial killers.

Revealing many of the most extreme and horrifying examples of modern cyber crime, she seeks to educate the millions of YouTube, Twitter, and Facebook users about the various hazards posed by new media. Covering the identity theft and subsequent murder of Amy Boyer in 1999, avoiding sexual predators, defending bank accounts against fraudulent phishing scams, and the rise of online bullying, Hitchcock provides a compelling, broad-ranging collection of case studies from which consumers can learn to defend themselves and their families against online criminals.

This collection of real-life horror stories is a must-read for true crime aficionados and fans of such television fare as 48 Hours Mystery, Forensic Files, and the Investigation Discovery channel. Guaranteed to shock and surprise, this book will forever change the way users experience the internet.

Business needs to reduce cyber threat to payment card data

In the retail sector, almost all of the data breaches involve some kind of compromise to cardholder data, which is a trend that is expected to increase.

Despite investment in security and compliance, 2018 shows

Read more at: http://www.computerweekly.com/news/450433346/Business-needs-to-reduce-cyber-threat-to-payment-card-data

Business​ ​Risk​ ​Intelligence​ ​-​ 2017​​ ​Review​,​ ​2018​ ​Flashpoints

Business​ ​Risk​ ​Intelligence​ ​-​ 2017​​ ​Review​,​ ​2018​ ​Flashpoints

China leads the hacking charts with the highest combination of impact factors ticked off on a matrix combining the potential capability and impact of possible attacker groups, thus presenting the highest risk, forming one of three actors with a potential tier 6 catastrophic impact (alongside Russia and the Five Eyes) according to a new report by Flashpoint.

The authors say that this Decision Report reinforces the need for decision makers inside the enterprise to incorporate Business Risk Intelligence (BRI) into their risk assessments and strategies.

Flashpoint has detailed the main factors that will increase cyber-threat levels producing its Threat Matrix which details the capability and potential impact of different attackers, from specific nation states to Jihadis.

A primary focus is the fact that cyber-warfare is a main component used in all conflict now. Consequently the increase in

Read more at: https://www.scmagazineuk.com/news/business-risk-intelligence--2017-review-2018-flashpoints/article/737415/

2017 "a record setting year" for cyber crime, claims ThreatMetrix

2017 turned out to be “a record-setting year” for cyber crime, according to new research from digital identity firm ThreatMetrix. 

In its latest Cybercrime Report, the company claimed that there had been a doubling in the number of cyber attacks over the past two years. But companies are responding with “innovative, digital-first strategies” to protect consumers.

The company claims that fraudsters are turning their attention away from credit cards and are now leveraging identity data to launch attacks that “produce long-term profits”.

There was “a highly elevated attack rate on account creations”, according to the company. And more than one in nine of accounts created last year were fraudulent.

Bot-net activity levels grew in 2017 too, accounting for 90 per cent of traffic sent to retail sites, ThreatMetrix claims. It also claims that there were “extreme spikes” in cyber attack levels throughout the year. For instance, it suggests

Read more at: https://www.computing.co.uk/ctg/news/3024514/2017-a-record-setting-year-for-cyber-crime-claims-threatmetrix

Colchester cyber criminal admits helping hackers get past anti-virus software

A cyber-criminal who made more than £32,000 from illegal dealings has admitted running a product-testing service for hackers.

Goncalo Esteves, 24, of Cape Close, Colchester, ran the website reFUD.me, which allowed offenders to test, for a fee, whether their malicious cyber tools could beat anti-virus scanners.

Esteves used Skype to give advice and customer support on the products he was selling.

Under the pseudonym KillaMuvz, he also sold custom-made malware-disguising products and offered technical support to users.

He pleaded guilty to two computer misuse offences and a count of money laundering at Blackfriars Crown Court.

Esteves called his encryption tools Cryptex Reborn and Cryptex Lite, which could be used by hackers to improve their chances of dodging anti-virus software.

He sold them for use in packages which varied in price according to the length of the licence.

What is Sarahah and should parents be worried? Everything you need to know about honesty app amid cyberbullying …

A new app is causing concern among parents and child protection charities, amid warnings that it provides a platform for cyberbullying.

Sarahah – meaning “honesty” in Arabic – encourages anonymous “constructive comments” when you register and share your link on social media.

You can also comment anonymously on your friends if you know their link. Sarahah is immensely popular throughout the middle east.

It was written by a Saudi programmer, Zain al-Abidin Tawfiq.

It’s now becoming a phenomenon in the UK and in the United States where it reached Number 1 in the Apple download charts last August.

(Image: Sarahah)

But fears that vulnerable teenagers at risk from bullying and suicide are concerning parents and children’s organisations.

Similar apps have been and gone. A teenager was found hanged earlier this year after allegedly being bullied on a similar app called Sayat.Me, which was shut down in May.

The App Store has reviews

Read more at: https://www.mirror.co.uk/tech/sarahah-honesty-app-cyber-bullying-11051162

Using cyber intelligence to find the bad guys quicker and faster

Don’t think the police will help you find, let alone catch, cyber criminals if they make off with your corporate loot. And don’t think this is only a problem for companies in other countries. South African businesses, like South Africans themselves, are increasingly being targeted.

The story of a local bank being taken for R300 million by cyber criminals who had 100 people withdrawing money from ATMs in Japan made the headlines. But South African companies, unlike their US counterparts, are not required by law to report cases of cyber theft so how many more have gone by unmentioned? The bank reportedly never got its cash back so it’s still wise to secure your systems from attack; the more proactive the better.

The likelihood of cyber attackers plundering your vaults is already vast and growing daily. The threat landscape today is highly sophisticated but our defences are typically outdated and reactive

Read more at: https://www.itweb.co.za/content/KPNG878XEr674mwD

Rajat Khare rings the changes with Boundary Holding

Three ways to create your email notifications:

  • Key word in an article: select the key words in an article and click on «Create notification»
  • Search results: on the search results page, click on «Create notifications for this search»
  • Personal input: specify their title, the key words, the country and the publication of your email notification.

Do not hesitate to create your own notifications according to your interests : better criteria narrows down the results.

You can modify or delete your notifications or summaries in your account.

Read more at: https://www.intelligenceonline.com/corporate-intelligence/2018/01/17/rajat-khare-rings-the-changes-with-boundary-holding,108289877-art

Home Ministry advises states to set up cyber crime co-ordination cells, deep monitoring of the web

Centre plans setting up of Cyber Warrior Police Force to tackle internet-related crimes

The government has decided to set up a Cyber Warrior Police Force (CWPF) to tackle internet-related crimes such as cyber threats, child pornography and online stalking.

The CWPF is likely to operate under the National Information Security Policy and Guidelines wing of the Union home ministry’s Cyber and Information Security (CIS) division, which was created last November. It is proposed to be raised on the lines of the Central Armed Police Force.

The other two wings under the CIS division are cyber crime and internal security.

“It’s a policy decision, and the process has already begun. The Army is also planning to do something on similar lines. We hope our unit will operate effectively,” a senior home ministry functionary said on the condition of anonymity, adding that the finer details of the proposed force will be worked out soon.

So far, there has been no decision on the CWPF’s jurisdiction, where it will derive

Read more at: http://www.hindustantimes.com/india-news/centre-plans-setting-up-of-cyber-warrior-police-force-to-tackle-internet-related-crimes/story-1t9ehppjiHZVac7b3NgRKN.html

Hospital injects $60000 into crims’ coffers to cure malware infection

A US hospital paid extortionists roughly $60,000 to end a ransomware outbreak that forced staff to use pencil-and-paper records.

The crooks had infected the network of Hancock Health, in Indiana, with the Samsam software nasty, which scrambled files and demanded payment to recover the documents. The criminals broke in around 9.30pm on January 11 after finding a box with an exploitable Remote Desktop Protocol (RDP) server, and inject their ransomware into connected computers.

Medical IT teams were alerted in early 2016 that hospitals were being targeted by Samsam, although it appears the warnings weren’t heeded in this case.

According to the hospital, the malware spread over the network and was able to encrypt “a number of the hospital’s information systems,” reducing staff to scratching out patient notes on pieces of dead tree.

With flu season well underway in the US state, Hancock Health administrators called in the FBI’s cyber-crime task force, and

Read more at: https://www.theregister.co.uk/2018/01/16/us_hospital_ransomware_bitcoin/