Cybercrime stories - Page 18
Any use of network connected electronic devices such as computers or smartphones for criminal activity
is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as
‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers
and other malware, the download and use of malware produced by others, social engineering tactics
such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer
systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with
cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also
occasionally seeking to disrupt, embarrass or shame their targets.

Skyscanner opens up bug bounty for interested hackers
Thu, 31st Jan 2019
#
cybersecurity
#
skyscanner
#
cybercrime
Skyscanner launches a public bug bounty program, offering up to USD $2,000 per vulnerability, via Bugcrowd to enhance its website, API, and mobile app security.

4 Reasons why CISOs should adopt threat intelligence
Thu, 31st Jan 2019
#
cybersecurity
#
cso / ciso
#
threat intelligence
ThreatQuotient’s Anthony Perridge believes the answer to security teams falling behind criminals is to deploy threat intelligence platforms.

New report uncovers US$1.7b cryptocurrency cybercrime market
Thu, 31st Jan 2019
#
cryptocurrency
#
blockchain
#
email security
There was a staggering rise in criminal activity within the cryptocurrency market last year, despite the decline in the market.

5 tips for protection against surging number of scam apps
Wed, 30th Jan 2019
#
malware
#
email security
#
cybersecurity
We all love them and our lives are effectively run by them, but research has revealed apps are increasingly growing deceitful with ulterior motives.

AI in cybersecurity stamping out menacing fileless attacks
Wed, 30th Jan 2019
#
ai
#
cybersecurity
#
av
Artificial intelligence is revolutionising cybersecurity by effectively combating fileless attacks, which evade traditional antivirus software.

Cryptomining affected 37% of businesses last year
Fri, 25th Jan 2019
#
malware
#
ddos
#
cryptocurrency
A Check Point report reveals 37% of global businesses suffered cryptomining attacks in 2018, highlighting a surge in stealthy cybercrime techniques.

Cybercrime could cost NZ$8 trillion over next five years
Tue, 22nd Jan 2019
#
cybersecurity
#
accenture
#
cybercrime
Cybercrime may cost businesses worldwide NZD $8 trillion over five years, as firms struggle to secure increasingly complex digital systems, warns Accenture.

AU businesses less cybersecurity confident than global peers
Sat, 19th Jan 2019
#
uc
#
cybersecurity
#
telco
A new report reveals companies around the world could incur US$5.2 trillion in additional costs and lost revenue over the next five years due to cybercrime.

Palo Alto says supply chain is cybersecurity’s weakest link
Fri, 18th Jan 2019
#
malware
#
firewalls
#
network infrastructure
Palo Alto Networks warns that supply chains are the weakest link in cybersecurity, urging firms to evaluate partners' defences to prevent breaches.

Carbon Black: What does cybersecurity have in store for 2019?
Wed, 16th Jan 2019
#
cybersecurity
#
healthtech
#
carbon black
As geopolitical tensions rise, Carbon Black forecasts an increase in destructive cyber attacks, sophisticated counter-detection, and extortion tactics in 2019.

IoT breaches: Nearly half of businesses still can’t detect them
Wed, 16th Jan 2019
#
blockchain
#
iot
#
cybersecurity
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.

A photo still enough to defeat face unlock of many phones
Sat, 12th Jan 2019
#
smartphones
#
surveillance
#
biometrics
A new study by Consumentenbond reveals that 42 out of 110 smartphones tested can be unlocked using just a photo, challenging manufacturers' security claims.

Twitter suspects state-sponsored ties to support forum breach
Wed, 19th Dec 2018
#
breach prevention
#
cybersecurity
#
twitter
One of Twitter’s support forums was hit by a data breach that may have ties to a state-sponsored attack, however users' personal data was exposed.

Is Supermicro innocent? 3rd party test finds no malicious hardware
Thu, 13th Dec 2018
#
datacentre infrastructure
#
hyperscale
#
dc
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.

Cyber crisis continues unabated – is ATP the answer?
Thu, 15th Nov 2018
#
firewalls
#
network security
#
advanced persistent threat protection
Statistics on cybercrime certainly makes for grim reading, and that is set to continue unless businesses take measures to stack the odds better in their favour.

Exclusive: Why Australian enterprises are prime targets for malware attacks
Wed, 14th Nov 2018
#
ransomware
#
it training
#
phishing
Australian businesses need to take cybersecurity more seriously as their attitudes and awareness don't match up to evolving threats.

Supermicro to test for spy chips, Apple & AWS call for retraction
Tue, 23rd Oct 2018
#
datacentre infrastructure
#
hyperscale
#
public cloud
Supermicro vows to test its motherboards for alleged spy chips amid strong denials from Apple and AWS, who demand Bloomberg retract its claims.

Credential theft industry booming in US, declining in Asia & EU
Wed, 10th Oct 2018
#
iam
#
cybersecurity
#
cybercrime
New research reveals the US is ripe for harvest, but Blueliv says the declines in EU and Asia are almost definitely only temporary.

Chinese espionage: Sweating Apple insists breach allegations are ‘not true’
Tue, 9th Oct 2018
#
hyperscale
#
dc
#
supply chain & logistics
The dust still hasn't settled on the report that caused Supermicro's stocks to collapse, and now Apple is stressing its innocence.

Huge vulnerabilities in software supply chain being exploited
Thu, 4th Oct 2018
#
devops
#
apm
#
open source
A very exposing report has revealed breaches are rising and response times are falling, largely due to shoddy software development practices.