This new book by a top cybercrime expert and victim’s advocate explores horrific real-life crimes with roots in cyberspace. Author J. A. Hitchcock (Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists) is celebrated for her work to pass tough cybercrime legislation, train law enforcement, and help victims fight back. In True Crime Online: Shocking Stories of Scamming, Stalking, Murder, and Mayhem, she journeys into the darkest recesses of the internet to document the most depraved criminals imaginable, from bullies and stalkers to scam artists, sexual predators, and serial killers.
Revealing many of the most extreme and horrifying examples of modern cyber crime, she seeks to educate the millions of YouTube, Twitter, and Facebook users about the various hazards posed by new media. Covering the identity theft and subsequent murder of Amy Boyer in 1999, avoiding sexual predators, defending bank accounts against fraudulent phishing scams, and the rise of online bullying, Hitchcock provides a compelling, broad-ranging collection of case studies from which consumers can learn to defend themselves and their families against online criminals.
This collection of real-life horror stories is a must-read for true crime aficionados and fans of such television fare as 48 Hours Mystery, Forensic Files, and the Investigation Discovery channel. Guaranteed to shock and surprise, this book will forever change the way users experience the internet.
Lt. Governor Anil Baijal on Wednesday said the Delhi Police is going to hire a chief technology officer to help the force to equip itself to meet the growing challenges and potent threat of cyber crime.
“In response to the potent threat of cybercrime and cyber attacks, more so in the environment of increasing digitalisation of services and commercial transactions, the Delhi Police is going to hire a chief technology officer within the Police headquarters to keep pace with global technology developments and help the force equip itself to meet the growing challenges,” he said at the 9th edition of Homeland Security Programme organised by Federation of Indian Chambers of Commerce and Industries (Ficci).
The theme of this year’s programme is ‘Modernisation of India’s Internal Security Mechanism.
Also read: HP Leads PC Market Growth in India, Says IDC
On the event, Baijal called upon the police forces to effectively utilise modern information
Read more at: http://www.news18.com/news/tech/delhi-police-to-hire-cto-to-tackle-cyber-crime-1411777.html
In early May, within a narrow 24-hour window, the spread of WannaCry — a semi-autonomous piece of criminal software designed to encrypt victims’ hard drives and demand payment to unlock them again — became one of the most virulent cyber attacks in the history of the internet.
It spread across the world, knocking out a third of the UK’s National Health Service and shutting down 1,000 computers in Russia’s ministry of the interior. It was indiscriminate, disrupting universities and petrol stations in China, and incapacitating key-systems at multinational businesses.
It soon became evident to cyber security analysts dissecting WannaCry’s code that the key to its voracious spread was a cyber weapon engineered by the US government: EternalBlue.
The incident has highlighted the threat from a sprawling underworld of digital cyber criminals that has ballooned in recent years. Europol, the EU crime-fighting agency based in The Hague, estimates that more money
Read more at: https://www.ft.com/content/a7a6c91c-3a35-11e7-ac89-b01cc67cfeec
You enter your password incorrectly too many times and get locked out of your account; your colleague sets up access to her work email on a new device; someone in your company clicks on an emailed “Google Doc” that is actually a phishing link — initially thought to be how the recent spread of the WannaCry computer worm began.
Each of these events leaves a trace in the form of information flowing through a computer network. But which ones should the security systems protecting your business against cyber attacks pay attention to and which should they ignore? And how do analysts tell the difference in a world that is awash with digital information?
The answer could lie in human researchers tapping into artificial intelligence and machine learning, harnessing both the cognitive power of the human mind and the tireless capacity of a machine. Not only will the combination of person and
Read more at: https://www.ft.com/content/1b9bdc4c-2422-11e7-a34a-538b4cb30025
There has been a 60 per cent increase in cyber bullying cases reported to the office of the children’s eSafety commissioner in the past year.
Commissioner Julie Inman-Grant says the rise could be a result of increased awareness of the organisation, soon to broaden its remit to all eSafety matters.
“Our own research shows us one-in-five young Australians has been cyber-bullied over time,” she told senators at an upper house hearing in Canberra on Thursday.
Ms Inman-Grant says the organisation offers a “safety net” to victims who have no luck pursuing the issue with a social media site.
“I’m pleased and proud to say we have resolved all 400 cases that have come to us,” she said.
The office has been able to use a “carrot” over the last two years and has seen action without the need for formal take-down orders.
Read more at: http://www.sbs.com.au/news/article/2017/05/25/sharp-increase-reported-cyber-bullying
Discussing the potential threat of cyber-crime and cyber-attacks in the face of increasing digitalisation of services and commercial transactions, Delhi Police is going to hire a Chief Technology Officer (CTO) to deal with such complaints.
The CTO will work within police headquarters to keep pace with global technology developments and help Delhi Police equip itself to meet the growing challenges, the Lieutenant Governor Anil Baijal said at the ninth edition of the Homeland Security programme at FICCI on Wednesday.
“Delhi Police is already working with young technology students from various government institutions within the city,” Baijal said.
The Lt Governor highlighted the initiatives taken by the Delhi Police on such challenges. “Delhi Police has recently taken up programmes for skill upgradation of youth in collaboration using Corporate Social Responsibility Funds. This will help in weaning away potential criminals,” he said.
He also spoke about some of
Read more at: http://www.dnaindia.com/delhi/report-police-to-hire-tech-officer-for-cyber-crime-2450151
Senators are seeking expanded powers for law enforcement to go after botnets, the networks of infected Internet-connected devices leveraged by cyber criminals and other malicious actors.
Sens. Sheldon WhitehouseSheldon WhitehouseDOJ pitches agreements to solve international data warrant woes Senators push for enhanced powers to battle botnets GOP rejects Dem effort to demand Trump’s tax returns MORE (D-R.I.) and Lindsey GrahamLindsey GrahamDOJ pitches agreements to solve international data warrant woes Senators push for enhanced powers to battle botnets Lindsey Graham: Trump’s budget ‘doesn’t have a snowball’s chance in hell’ MORE (R-S.C.) are renewing a push for legislation that would allow the Justice Department to “weed the garden of the Internet for botnets before they become an actual fraud or national
Read more at: http://thehill.com/policy/cybersecurity/335007-senators-push-for-enhanced-powers-to-battle-botnets
LONDON — Think of it like a wine club, they said — but for cyber weapons.
Last Tuesday, as the world was reeling from the impact of WannaCry, one of the most virulent cyber attacks in Internet history, the group that began it all took a moment to relish what it had wrought: A third of Britain’s National Health Service knocked out of action; Chinese students locked out of their university files; and dozens of multibillion-dollar businesses from FedEx to Telefonica disrupted.
“In June, The Shadow Brokers is announcing ‘The Shadow Brokers Data Dump of the Month’ service,” read a post in characteristically broken English on Steemit, a social media publishing platform.
“Each month peoples (sic) can be paying membership fee, then getting members only data dump.”
In other words, a threat of more damage to come.
The Shadow Brokers — an anonymous
Read more at: http://www.todayonline.com/commentary/shadow-arms-bazaar-fuels-global-cyber-crime
No computer has been created that could not be hacked…
NATIONAL security may be defined as the concept that a state and its society are protected from various domestic and foreign threats arising from politics, sociology, economics, energy, military, environment and natural resources. Simply put, national security is all-embracing, affecting every man, woman and child from all walks of life.
Klaus Schwab of the World Economic Forum (WEF) explained this particularly true in the realm of regulation. Current systems of public policy and decision-making evolved alongside the Second Industrial Revolution, when decision-makers had time to study a specific issue and develop the necessary response or appropriate regulatory framework. The whole process was designed to be linear and mechanistic, following a strict “top down” approach.
The big question Schwab asked is, how can legislators and regulators preserve the interest of the consumers and the public at
Read more at: http://www.businessmirror.com.ph/the-fourth-industrial-revolution-4/
Allison Burchett has been offered two plea deals and has a week to decide if she will accept one of those deals or go to trial.
Knox County’s top prosecutor inked approval of a proposed plea deal for Knox County’s former first lady in a cyberattack despite an ongoing probe of a hacking involving potential witnesses, the USA TODAY NETWORK – Tennessee has learned.
Allison Burchett is expected Thursday to announce at a hearing in Knox County Criminal Court whether she will take a deal to avoid trial in a 13-count indictment accusing her of a cyberattack on the estranged wife of her millionaire beau, Bandit Lites owner Michael Strickland.
That deal was offered, the USA TODAY NETWORK – Tennessee
Read more at: http://www.knoxnews.com/story/news/crime/2017/05/24/allison-burchett-suspect-another-hacking/339078001/
THE INSTITUDE FOR CRITICAL INFRASTRUCTURE TECHNOLOGY (ICIT) has blasted Symantec’s claims that North Korea was beind the WannaCry ransomware as “premature, inconclusive and distracting”.
“The recent speculation concerning WannaCry attributes the malware to the Lazarus Group, not to North Korea, and even those connections are premature and not wholly convincing,” warned James Scott, a senior fellow at the ICIT.
“Lazarus itself has never been definitively proven to be a North Korean state-sponsored advanced persistent threat; in fact, an abundance of evidence suggests that the Lazarus Group may be a sophisticated, well-resourced, and expansive cyber-criminal and occasional cyber-mercenary collective.”
Indeed, the speed with which the ransomware took hold – raising its profile and, therefore, victims’ reluctance to pay-up, as well as piquing the interest of law enforcement worldwide – combined with a series of coding shortcomings that made
Read more at: https://www.theinquirer.net/inquirer/news/3010681/symantecs-claims-that-north-korea-is-behind-wannacry-ransomware-blasted-as-distracting