You Are Here: Home » Posts tagged "cyber-crime"

How Could Hacker Grinch Steal Your Christmas: Five Security Scenarios to Avoid

We hate to sound gloomy before the holidays, but Christmas not only brings joy and presents. It comes with increasing cyber-crime activity as well, as Hacker Grinch prepares new scams and online attacks. Identity fraudsters claimed a new victim every two seconds in 2013, and the number of identity fraud victims rose to 13.1 million, according to Javelin Strategy & Research. These figures only express fr...

Malvertising Takes Cyber-Crime Spotlight, Bitdefender Warns

As malvertising takes the spotlight in the world of cyber-crime, antivirus software creator Bitdefender offers a deeper perspective on this worrying phenomenon. Here are some highlights of recent statistics published by Bitdefender researchers in the Virus Bulletin: In 2014, cyber-criminals are expected to focus more than ever on profit via malvertising; Millions of users worldwide are exposed to malware, s...

Top 10 Hacker Arrests in 2013

It was a fruitful year for cyber-crime authorities worldwide, and notorious hackers were arrested with a weekly or even daily frequency. Neither Christmas nor New Year’s Eve put an end to police effervescence in 2013 when it comes to busting cyber-criminals. We started work on a Top 10 Hacker Arrests at the beginning of December with the assumption that the big fish were already caught, as holidays were com...

Spanish Police Arrest “Ransomware” Cyber-Crime Ring

Spanish police arrested 10 people allegedly involved in a massive “ransomware” cyber-crime organization, according to The European Cybercrime Centre at Europol. Police estimated that the ring infected tens of thousands of users worldwide, stealing over 1 million euros a year. Through the “police virus”, cyber-crooks required users to pay $134 as a “fine” to escape prosecution for piracy or accessing child p...

FBI Software Pinpoints Top Phrases Used by Corporate Fraudsters

FBI software developed with advisory firm Ernst & Young unraveled the top phrases used in email conversations among employees engaged in corporate fraud, according to a press release. The technology can also pinpoint unusual changes in tone that can reveal fraud targeting specific sectors. Some of the most common expressions used by corporate fraudsters include “cover up”, “write off”, “grey area” and “...

Fakes and Frauds: Welcome to our Bogus Hotel!

Cyber-criminals have prepared some dirty tricks for tourists looking for a room over the holidays. And it’s not the same old reception RATs, banking Trojans, wrong hotel transactions and social media baits. Now, they’ve created their own fake hotels and are awaiting unwary guests. Not only malware, phishing and spam keep the Bitdefender Labs busy. Before and during the holidays, our antivirus specialists ha...

Identity Thieves Woo Spanish Speakers with Love Songs

Spanish speakers are lured to buy international romantic songs but instead they have their identities stolen. Bitdefender spotted a spam campaign exploring users’ melancholy and depression, the two least welcome holiday guests.   Here’s a reason to be jolly: relationships are the most common trigger for Christmas depression, according to a study reported in 2007 by the Mayo Clinic. Also, two-thirds of women...

UK Infrastructure Targeted by Hostile States in Cyberwarfare, Officials Say

British infrastructure is targeted by hostile states but officials refused to say what had been hit, The Guardian reports. Within range are companies providing “essential services upon which daily life depends” such as electricity, gas and water. A senior government official admitted the British critical infrastructure had been mapped, and the owners of national infrastructure are still being supported by t...

Cloud-Based Browsers Can Be Abused with Twist on a Google Technique

A twist on a technique developed by Google could let cyber-criminals hack cloud-based mobile browsers and crack passwords anonymously, according to security researchers from North Carolina State University and the University of Oregon. Researchers used the “MapReduce” technique developed by Google, typically used for distributed computing on clusters of machines, to perform large-scale tasks that had nothin...

Cyber-Crooks Steal $180,000 from Small Business via Advanced Persistent Threat

When it comes to taking down businesses, advanced persistent threats are the way to go. At least that’s how things ended for Primary Systems Inc., a small business that got ripped off of $180,000 in a malware attack. According to a story by tech journalist Brian Krebs, the company’s network was first compromised in May 2012 when an unsuspicious and overly curious company employee opened up a malicious attac...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top