Quantcast
Channel: ICTTF International Cyber Threat Task Force: Cybercrime Blogs
Browsing all 46 articles
Browse latest View live

Warbiking!

SOPHOS REVEALS LONDON'S WIFI SECURITY ISSUES WITH 'WARBIKING' EXPERIMENT - 27 percent of nearly 107,000 wireless hotspots found to have poor, or no security   Complete security leader Sophos today...

View Article


Ponemon statistics 2012 on cost of cybercrime

At the American Enterprise Institute (AEI) event "Cybersecurity and American power," Gen. K.B. Alexander, director of the National Security Agency (NSA) and chief at the Central Security Service (CSS),...

View Article


The need for sharing in sexual child abuse cases

Stronger together In the global fight against sexual child abuse, it is essential that information is shared. By sharing actionable intelligence on visual evidence between law enforcement and NGOs...

View Article

Trojans for the Bundestag – German PD acquired Finfisher

In December of last year, the German public prosecutors' office had declared that there was no legal basis for the use of the so-called "Bundestrojaner" spyware, which was used to spy on German...

View Article

Digital Destroys Physical

Shimomura (San Diego National Lab) and others have shown the digital can destroy the physical. This means any user is a potential enemy, not just non-citizens. And, it means there is long recovery time...

View Article


Future Citizen Crime

Excluding the major crimes, most crime has a punishment in terms of money and/or locking you out of your home (jail time). ID methods---so effective--replace the above with locking you out of the...

View Article

PayDay Loan Cyber Scam

  WARNING: Cybercriminal “Payday Loan” Scam   Sometimes we are impressed by the sophistication of cybercriminal's products, such as the crimeware and the malware they develop in order to achieve their...

View Article

Symantec data leak, too many doubts on the assumption of extort

The story is familiar to all, the Source Code, the Source code of property of Symantec company has been stolen and it has been object of negotiation between the group of hacker responsible of the crime...

View Article


GPS Spoofing, old threat and new problems

For several years are known vulnerabilities of GPS systems, but the wide use of these technology in today's society need a continuous reassessment of the risks we are exposed.The first report in which...

View Article


The Cybercrime Handbook for Community Corrections

I am pleased to be able to announce that my book, The Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century is now out.   In the early 1990s, professionals began to...

View Article

Crimcast Pod: Cybercrime and Corrections

In this Crimcast podcast, I discuss my new book, The Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century.  It explores such topics as how probation officers can...

View Article

VISA & MASTERCARD breach raises Security doubts on standard com

The Krebs on Security blog reported that there has been a security breach at Global Payments that “may involve more than 10 million compromised card numbers.”  We are facing with a massive breach that...

View Article

Cyber terrorism, cyber attacks against al Qaeda 2.0

The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we tend to associate a terrorist act to a physical event as an explosion,...

View Article


Medicaid incident. How much cost a data breach?

The Utah Department of Technology Services (DTS) has announced that the Utah Department of Health (UDOH) was victim of an hack. On Monday the server that hosts Medicaid was hacked, the news of the...

View Article

Anonymous,from OpTrialAtHome to the streets,is time for changin

Another Saturday, another round, as announced today the group Anonymous has targeted government sites to protest against British government policy. Nothing new over last week, same goals, same mode of...

View Article


Cyber threats in mobile environment

Today I desire to share with you the results of a study of Trend Micro security firm focused on mobile threat incidents related to the first quarter of 2012. The large diffusion of mobile devices and...

View Article

The Unknowns, hacker's revenge in the name of security

It's happened, another group of hacker named The Unknowns has hacked several organizations, , including NASA and the U.S. Air Force, and posted evidence of their actions. The complete list has been...

View Article


Who is attacking WikiLeaks and The Pirate Bay? The private reve

Who is attacking WikiLeaks and The Pirate Bay? WikiLeaks and BitTorrent file-sharing site Pirate Bay were hit by a series of DDoS attacks during last weeks. An alleged hacker with the Twitter account...

View Article

DDoS attack against 123-reg, the Chinese paranoia

The UK’s companies 123-reg, the biggest domain provider,  was hit this week by a “massive” DDoS attack that caused interruption of the services provided. The company hosts three million domain names...

View Article

Sixteen Months of Cyber Attacks in Italy

Sixteen Months of Cyber Attacks in Italy   Tomorrow, during the 2012 Security Summit, Edition of Rome, the June Update of the 2012 Italian Report on ICT Security will be unleashed. The collected sample...

View Article
Browsing all 46 articles
Browse latest View live