cybercrime

cybercrime - News, Features, and Slideshows

News

  • Data-breach insurance caters to small businesses

    With the proliferation of data breaches, The Harford insurance company is selling a new data loss insurance aimed at small businesses that might be put at financial risk if they lose valuable and sensitive data.

  • U.S. needs to be on-guard for a big cyber-attack

    A destructive attack from cyberspace "is coming, in my opinion. It is a question of time. What we don't know is how far out it is," and whether it will target commercial infrastructure, government networks or mobile platforms Army Gen. <a href="http://www.nsa.gov/about/leadership/bio_alexander.shtml">Keith Alexander</a> told attendees of the "<a href="http://www.crows.org/details/144-maneuvering-in-cyberspace-and-io.html">Maneuvering in Cyberspace</a>" symposium this week.

  • Android targeted by SpyEye banking Trojan

    Banking transactions for owners of <a href="http://www.networkworld.com/news/2010/110910-google-android-useful-resources-smartphones.html">Android</a> phones just became more dangerous with a new iteration of the <a href="http://www.networkworld.com/news/2011/072611-spyeye-trojan-morphs-to-defeat.html">SpyEye</a> Trojan designed to intercept two-factor authentication codes sent via SMS -- the first known version for Android.

  • Cybercrime costs rival those of illegal drug trafficking

    Young males in emerging markets are the most likely to fall victim to cybercrime, whose total cost per year is approaching the scale of illegal drug trafficking worldwide, according to a study by the Norton division of Symantec.

  • Breached SSL certificate authority suspends sales

    After being dumped as a trusted SSL certificate authority by <a href="http://www.networkworld.com/subnets/microsoft/">Microsoft</a> and Google browsers, Dutch CA <a href="http://www.networkworld.com/news/2011/083011-google-says-gmail-attack-focused-250231.html">DigiNotar</a> has suspended its sale of certificates.

  • Death by Morto A? It's your own fault, says Microsoft

    The <a href="http://www.networkworld.com/news/2011/082911-new-windows-worm-spreads-by-250194.html">Morto A worm</a> is having continued success despite its reliance on a list of lame passwords to take over victim machines.

  • DoD: Sharing cyber-threat info with contractors is working

    Halfway through a 90-day trial, the Department of Defense says it has stopped hundreds of attempted intrusions it would have missed otherwise without its <a href="http://www.networkworld.com/news/2011/061711-military-cyber-threat.html">pilot program</a> of sharing classified information about cyber threats with military contractors.

  • FBI warns of growing car-buying cyberscams

    The FBI's Internet Crime Complaint Center (IC3) this week issued an alert about an <a href="http://www.nj.com/news/index.ssf/2011/07/cedar_grove_man_indicted_for_o.html">online car-buying cyberscam</a> that has been <a href="http://www.ottawacitizen.com/foils+apparent+online+sale+scam/5225061/story.html">rearing its ugly head</a> lately.

  • US and UK zombies demand top dollar

    Denizens of the malware underworld who sell access to <a href="http://www.networkworld.com/news/2011/080911-defcon-voip.html">compromised computers</a> do so at varying rates depending on where the machines are located, researchers told the Usenix <a href="http://www.networkworld.com/topics/security.html">Security</a> Symposium this week.

  • Black Hat: Apple does well but Microsoft does better with enterprise security

    While still not great, the operating systems behind Apple desktops, laptops and phones are getting more secure, <a href="http://www.networkworld.com/news/2011/080411-blackhat-overview.html?hpg1=bn">researchers at Black Hat</a>  say.While not recommended for corporate use unless it’s in islands within larger networks, the OSX operating system has made strides, says Alex Stamos, who lead a team of researchers from iSec Partners that researched the OSX and Windows 7 operating systems.

  • Security rundown for week ending Aug. 5, 2011

    If you'd never heard the phrase 'advanced persistent threat' before, you may have gotten an ear full of it the past week in a collection of news stories that used the APT term to describe a variety of network security problems that are causing big problems.

  • Former Cisco engineer indicted on hacking charges

    A former Cisco engineer at the center of an <a href="http://www.networkworld.com/community/blog/cisco-sought-paint-whistleblower-sinister">extradition controversy</a> has been indicted by a federal grand jury on computer hacking charges.

  • RSA's SecurID breach linked to China, researcher says

    <a href="http://www.networkworld.com/news/2011/031811-rsa-warns-securid-customers-after.html">The breach of RSA</a>, the security division of EMC, last spring in which sensitive information related to <a href="http://www.networkworld.com/news/2011/031811-rsa-breach-reassure.html">RSA SecurID tokens was stolen</a>, can be traced back to an attack originating in China, a security researcher strongly believes based on a close look into malware associated with the RSA breach.

[]