IT Brief New Zealand - Technology news for CIOs & IT decision-makers

Cybercrime stories - Page 42

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Treasure trove

HBO's Game of Thrones treasure chest ransacked by hackers

Tue, 1st Aug 2017
#
malware
#
ransomware
#
cybersecurity
​It would seem winter has come for HBO after hackers have stormed the company's servers and looted the jewels within to leak data online.
Email scam

Nearly a quarter of 'unsafe' emails getting through to user inboxes

Fri, 28th Jul 2017
#
malware
#
ransomware
#
cybersecurity
There is a continuous challenge of securing organisations from malicious attachments, dangerous files type, impersonation attacks as well as spam.
Trojan virus

Malware found prowling within every app of alternative Android store

Thu, 27th Jul 2017
#
malware
#
cybersecurity
#
apps
Malware researcher at ESET, Lukáš Štefanko says this is the first time he has ever seen an entire Android market infected like that.
Cybercriminall

The Dark Web: Is your company at risk?

Thu, 27th Jul 2017
#
risk & compliance
#
cybersecurity
#
opinion
Not only is information on a company's assets available, but information about new techniques to compromise targets is for sale on the dark web.
Data out the backdoor

Cisco reveals alarming findings from Midyear Cybersecurity Report

Wed, 26th Jul 2017
#
malware
#
ransomware
#
cybersecurity
The Cisco Midyear Cybersecurity Report warns of rapidly evolving threats and potential 'destruction of service' (DeOS) attacks.
Data leaky tap

Digital Shadows discovers credit card crime ring cashing in on $24b a year

Tue, 25th Jul 2017
#
risk & compliance
#
cybersecurity
#
credit card fraud
A professional ecosystem has emerged that is providing e-learning courses to allow aspiring cybercriminals to make USD$12k in monthly earnings.
Network padlock broken

Hackers steal $32m of ethereum cryptocurrency – expert commentary and advice

Sat, 22nd Jul 2017
#
crypto
#
blockchain
#
ai security
​In the second heist this week, hackers have stolen around US$32 million - Webroot senior threat analyst shares his commentary and insights.
Screen shot 2017 06 21 at 12

The malware that brought down Ukraine – is it really that sophisticated?

Wed, 21st Jun 2017
#
malware
#
cybersecurity
#
hackers
Tenable director says the significance of this malware as a stand-alone event is in fact quite small - but vendors have some catching up to do.
Thinkstockphotos 653516378

Arbor Networks digs deep into the Lazarus Group's DDoS attacks

Mon, 19th Jun 2017
#
ddos
#
cybersecurity
#
arbor networks
It is not clear whether the IPs listed in the report were part of a command and control infrastructure or simply bots - or both.
Thinkstockphotos 673040004

War of the words: How cybercriminals are selling fake news through the underground

Wed, 14th Jun 2017
#
cybersecurity
#
trend micro
#
cybercrime
Fake news is being sold as a service on the underground market, with criminals offering to manipulate public opinion for a price.
Brian lord obe min

GCHQ deputy director - 'Cybersecurity vendors need to quit their scaremongering'

Wed, 7th Jun 2017
#
cybersecurity
#
cybercrime
#
gchq
Cybersecurity experts warn that the industry is far behind where it needs to be, making it too easy for cybercriminals to operate.
Money flowing from tap

Cost of cybercrime for businesses to surpass $8 trillion over next five years

Thu, 1st Jun 2017
#
malware
#
ransomware
#
cybersecurity
New insights from Juniper Research have predicted a rather dire future for modern businesses in the constant war against cybercrime.
Thinkstockphotos 492668571

The need for internet security on your mobile

Mon, 29th May 2017
#
endpoint protection
#
phishing
#
email security
As hackers target mobile devices, it's imperative to ensure that you are aware of the threats that are out there, and that your phone is protected.
Thinkstockphotos 486018827

Hungry 'Fatboy' ransomware uses Big Mac Index to geotarget ransom demands

Tue, 9th May 2017
#
malware
#
ransomware
#
cybersecurity
The Fatboy ransomware is able to use the Big Mac Index, created in 1986, to determine the cost of living for a particular geographic location.
Cybercriminial

Cybercriminals use verified API token to generate Facebook spam comments

Fri, 28th Apr 2017
#
api
#
cybersecurity
#
facebook
In exchange for more 'likes' and comments on their own timelines, users are enticed to provide the app's access token to a third-party website.
Thinkstockphotos 489433130

When imitation is not the sincerest form of flattery

Thu, 13th Apr 2017
#
phishing
#
email security
#
cybersecurity
Early detection and effective intelligence is critical in today's digital world to mitigate the risks created by today's connected world.
Thinkstockphotos 485041902

Getting more Instagram followers? Could be a scam

Wed, 15th Mar 2017
#
malware
#
cybersecurity
#
instagram
Cybercriminals have been targeting Instagram users by luring them to install these apps, which claim to boost their Instagram followers.
New lead

Trend Micro appoints Peter Hewett to lead ANZ channel; eyes double sales

Wed, 8th Mar 2017
#
ransomware
#
ai security
#
cloud services
Trend Micro has appointed longtime security and channel player Peter Hewett as its new ANZ channel director as it looks to double local sales.
Thinkstockphotos 614247544

Exploring the cybercrime underground: Darknet markets - where cyber criminals trade

Fri, 17th Feb 2017
#
firewalls
#
network infrastructure
#
network security
This blog focuses on explaining what darknet markets are, common payment model used, the type of digital data being bought and sold, and their costs.
15921569186 8560f34c02 o

Tackling NZ cybercrime in 2017: Why recovery is just as important as prevention

Fri, 10th Feb 2017
#
dr
#
cybersecurity
#
cloud services
Whichever way you look at it, cyber security is essential for New Zealand businesses and businesses across the country can't afford to take any risks.