<?xml version="1.0" encoding="utf-8"?>
<rss version="0.92">
<channel>
<title>SecuObs.com</title>
<link>http://www.secuobs.com</link>
<description>Observatoire de la securite Internet</description>
<language>fr</language>
<webMaster>webmaster@secuobs.com</webMaster>
 <item><title>Find Friends and Credit Cards on Facebook  The New Cybercrime Reality</title><description>2016-04-20 16:13:49 - Security Bloggers Network :    Social media attracts all kinds These sites are used for catching up with friends on Facebook, instant news dissemination on Twitter, partisan political viewpoints expressed in online forums, real-time reach outs on Snapchat, professional networking on LinkedIn   and now, not surprisingly, they re used as global havens for cybercrime With the release of the second  The post Find Friends and Credit Cards on Facebook  The New Cybercrime Reality appeared first on Speaking of Security - The RSA Blog and Podcast </description><link>http://www.secuobs.com/revue/news/604238.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/604238.shtml</guid></item>
<item><title>Exposing the Cybercrime as a Business model</title><description>2016-04-20 08:19:34 - Help Net Security : Trustwave released a new report which reveals the top cybercrime, data breach and security threat trends from 2015 Experts gathered real-world data from hundreds of breach investigations the company conducted in 2015 across 17 countries Key highlights Weak application security  97 percent of applications tested by Trustwave in 2015 had at least one vulnerability 10pourcents of the vulnerabilities discovered were rated as critical or high risk The median number of vulnerabilities discovered per application by   More   </description><link>http://www.secuobs.com/revue/news/604192.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/604192.shtml</guid></item>
<item><title>Blue Screen of Death meets cybercrime   true or false </title><description>2016-04-19 19:39:34 - Security Bloggers Network : Some say  panic,  some go into  guru meditation,  others  abnormally end  On Windows, it's a BSoD </description><link>http://www.secuobs.com/revue/news/604154.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/604154.shtml</guid></item>
<item><title>USENIX Enigma 2016 - Dolla Dolla Bill Y'all  Cybercrime Cashouts</title><description>2016-04-18 13:08:07 - SecurityTube.Net : The hardest part of cybercrime is the cashout The strategy for cashing out needs to be easy enough to make it worth your while and safe enough to stay out of the klink With more and more focus on identifying and stopping credit card fraud, cybercrooks are diversifying their methods for cashing out While criminals can, and do, sell whole and bundled online retailer accounts, credit card data, and fullz, I want us to look at how they get their grubby paws on that cold hard cash Let's dig into the tools, techniques, and procedures used by this new generation of e-launderers and cyber hustlers Understanding the lifecycle of a financially motivated cybercrime is an important part of successfully and efficiently defending against them When we have insight into the tools, techniques, procedures, motivations, methods, and ecosystems driving these attacks, we are afforded the opportunity to build defense in depth that specifically targets the weaknesses and load-bearing assumptions of the attackers This talk is not a general hand-waving at the topic of  cybercrime,  but instead an in-depth exposition showing currently active tools and methods, non-public case study information, and defense tactics that are actively and successfully being employed right now For More Information Please Visit - https wwwusenixorg conference enigma2016 </description><link>http://www.secuobs.com/revue/news/604012.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/604012.shtml</guid></item>
<item><title>Cybercrime   Affecting Organizations Worldwide</title><description>2016-04-11 11:02:58 - Security Bloggers Network :    With more and more organizations offering their services via online channels, cybercrime has picked up significantly Banking, e-commerce, retail, health,   The post Cybercrime   Affecting Organizations Worldwide appeared first on Checkmarx </description><link>http://www.secuobs.com/revue/news/603392.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/603392.shtml</guid></item>
<item><title>How to Use Anonymized Global Digital Identities to Fight Cybercrime</title><description>2016-04-08 23:00:45 - Security Bloggers Network : At the 2016 RSA Conference, there was a lot of buzz surrounding the importance of global threat intelligence sharing In fact, of the more than 500 exhibitors at the annual conference, 79 companies include threat intelligence sharing as part of their business model However, such information sharing only works when done right in an anonymized way that takes into account each user s full digital identity Understanding a user s digital identity includes taking into account the complex and ever-changing associations among people and their communication devices, account credentials, telephone  </description><link>http://www.secuobs.com/revue/news/603309.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/603309.shtml</guid></item>
<item><title>MoD Building New UK Cybercrime Centre In Corsham</title><description>2016-04-04 13:06:32 - Forensic Focus : A military site in Wiltshire has been chosen as the preferred location for a new cyber security operations centre by the government The  40m base is expected to be housed at MOD Corsham and staffed by experts utilising  state-of-the-art  methods The government is investing  1bn over five years to combat cyber attacks Read More  BBC  </description><link>http://www.secuobs.com/revue/news/602798.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/602798.shtml</guid></item>
<item><title>PwC Report Shows Cybercrime in the UK is Growing Rapidly</title><description>2016-04-04 11:34:50 - Web Application Security Blog   Acunetix :    In the latest edition of their Global Economic Crime Survey, PricewaterhouseCoopers have announced a finding of a 20pourcents increase in cybercrime, making it the fastest growing category of economic crime The UK seems to be the most severely affected, with 55pourcents of organisations being affected by some type of cybercrime, higher than the US which   Read More   The post PwC Report Shows Cybercrime in the UK is Growing Rapidly appeared first on Acunetix </description><link>http://www.secuobs.com/revue/news/602791.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/602791.shtml</guid></item>
<item><title>Black Hat Europe 2015 - Cybercrime in The Deep Web</title><description>2016-03-10 07:13:29 - SecurityTube.Net : All content not indexed by traditional web-based search engines is known as the DeepWeb Wrongly been associated only with the Onion Routing  TOR , the DeepWeb's ecosystem comprises a number of other anonymous and decentralized networks The Invisible Internet Project  I2P , FreeNET, and Alternative Domain Names  like NameSpace and OpenNic  are examples of networks leveraged by bad actors to host malware, high-resilient botnets, underground forums and bitcoin-based cashout systems  eg, for cryptolockers  We designed and implemented a prototype system called DeWA for the automated collection and analysis of the DeepWeb, with the goal of quickly identifying new threats as soon they appear In this talk, we provide concrete examples of how using DeWA to detect, eg, trading of illicit and counterfeit goods, underground forums, privacy leaks, hidden dropzones, malware hosting and TOR-based botnets For More Information Please Visit - https wwwblackhatcom indexhtml </description><link>http://www.secuobs.com/revue/news/600675.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/600675.shtml</guid></item>
<item><title>Businesses fail to prepare as cybercrime surges globally</title><description>2016-03-09 15:24:53 - Security Bloggers Network : Cybercrime is now the second most reported economic crime and has affected at least a third of organizations in the past 24 months, yet many businesses are still underprepared The post Businesses fail to prepare as cybercrime surges globally appeared  </description><link>http://www.secuobs.com/revue/news/600588.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/600588.shtml</guid></item>
<item><title>PH  The Philippine National Police-Anti-Cybercrime Group arrested 27 persons allegedly involved in sextortion activities in an operation in Cabanatuan City Tuesday Senior Supt Guilermo Lorenzo Eleaza</title><description>2016-03-02 20:45:58 - Office of Inadequate Security : Francis Wakefield reports  The Philippine National Police-Anti-Cybercrime Group arrested 27 persons allegedly involved in </description><link>http://www.secuobs.com/revue/news/599939.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/599939.shtml</guid></item>
<item><title>Security Talent Shortage Hits Cybercrime Groups, Too</title><description>2016-03-02 14:37:34 - Slashdot  Your Rights Online : itwbennett writes  A report released today by Digital Shadows finds that cybercrime organizations  face many of the same hiring problems as defending security organizations, but with their own particular twists,  writes Maria Korolov In particular, the groups are finding a shortage of qualified candidates for jobs such as malware writers, exploit developers, bot net operators, and mules But, unlike legitimate organizations,  cybercriminals are limited in their ability to properly vet new hires, to widely advertise for needed talent, and to find people who are both trustworthy and are willing to break the law,  writes Korolov One thing the criminals have in common with defending organizations  entry-level skills are the easiest to find This is one reason why many attackers use simple tools and attack methods  IMAGE   IMAGE  Share on Google  Read more of this story at Slashdot </description><link>http://www.secuobs.com/revue/news/599902.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/599902.shtml</guid></item>
<item><title>Leader Of Global Cybercrime Campaigns Pleads Guilty To Computer Intrusion And Access Device Fraud Conspiracies</title><description>2016-03-02 01:10:18 - Office of Inadequate Security : There s an update to a previously reported case involving a Turkish man accused of involvement in a massive scheme </description><link>http://www.secuobs.com/revue/news/599839.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/599839.shtml</guid></item>
<item><title>Sizing cybercrime  incidents and accidents, hints and allegations</title><description>2016-02-29 14:43:36 - SecurityTube.Net : This paper was presented at VB2015 in Prague, Czech Republic at 30 September 2015 Cybercrime certainly feels like a major threat to network security Criminals routinely use networks to steal data, defraud companies and consumers, and disrupt normal business operation in both public and private sectors But just how big a threat is cybercrime  For a problem long characterized as both huge and existential by politicians and industry pundits, cybercrime has largely gone unmeasured, if 'measure' is taken to mean 'ascertain the size of the problem using sound scientific methodology' This presentation reviews the cybercrime literature, both commercial and academic, for answers as to why we lack reliable, consistent, longitudinal data on the size and scope of the cybercrime problem The following issues are addressed  The implications of government failure to measure cybercrime to the extent it measures other crimes The problems inherent in outsourcing cybercrime surveys to the private sector The three main categories of research deficiency in cybercrime studies The inherent complexities of measuring cybercrime The implications of weak cybercrime statistics for the information security effort The paper concludes with suggestions as to how the current dearth of reliable data may be remedied and a call to action to educate the industry on the appropriate use of available data For More Information Please Visit - https wwwvirusbulletincom </description><link>http://www.secuobs.com/revue/news/599640.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/599640.shtml</guid></item>
<item><title>The industrialization of cybercrime may be upon us</title><description>2016-02-23 19:07:46 - Security Bloggers Network :    We are slowly seeing the industrialization of cybercrime according to an expert Dr Adrian Nish, head of cyber threat intelligence at BAE Systems, said that cybercriminals are becoming more  professionalized  The post The industrialization of cybercrime may be upon us appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/599171.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/599171.shtml</guid></item>
<item><title>Average cost of cybercrime rises by 200pourcents in just five years</title><description>2016-02-19 21:13:10 - Security Bloggers Network : Cybercrime is costing the global economy up to  450 billion annually, a new report by Hamilton Place Strategies reveals The post Average cost of cybercrime rises by 200pourcents in just five years appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/598834.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/598834.shtml</guid></item>
<item><title>The Role of Tor in Cybercrime</title><description>2016-02-05 17:06:08 - Security Bloggers Network :    In a previous blog, we explored the layers of the deep web, and briefly explained how anonymity technologies  such as Tor  facilitate illegal, underground commerce This post aims to explain the underlying concept of how Tor functions, thus, how anonymity on the Internet is accomplished An Overview of Tor and Internet Anonymity To understand how  The post The Role of Tor in Cybercrime appeared first on Speaking of Security - The RSA Blog and Podcast </description><link>http://www.secuobs.com/revue/news/597504.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/597504.shtml</guid></item>
<item><title>Businesses  still naive to the risks of cybercrime </title><description>2016-01-29 18:10:21 - Security Bloggers Network :    Close to half all businesses in the UK are of the opinion that they are safe from cybercrime, according to new research They believe the risks are minute The post Businesses  still naive to the risks of cybercrime  appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/596903.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/596903.shtml</guid></item>
<item><title>Man Who Tried to Frame Brian Krebs In Heroin Plot Pleads Guilty to Cybercrime Charges</title><description>2016-01-22 14:23:28 - Office of Inadequate Security : Brian Krebs writes  A Ukrainian man who tried to frame me for heroin possession has pleaded guilty to multiple cybercrime </description><link>http://www.secuobs.com/revue/news/596239.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/596239.shtml</guid></item>
<item><title>Guy Who Tried to Frame Me In Heroin Plot Pleads Guilty to Cybercrime Charges</title><description>2016-01-21 04:56:24 - Krebs on Security : A Ukrainian man who tried to frame me for heroin possession has pleaded guilty to multiple cybercrime charges in US federal court, including credit card theft and hacking into more than 13,000 computers </description><link>http://www.secuobs.com/revue/news/596084.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/596084.shtml</guid></item>
<item><title>Civilians To Help Police Investigate Cybercrimes</title><description>2016-01-20 11:43:36 - Forensic Focus : Civilian recruits will help police solve cybercrime under an expansion of the role of volunteers in England and Wales, the home secretary has said The plans include measures to give more power to support staff and volunteers Forces will be able to identify volunteers who specialise in accountancy or computing for cyber and finance inquiries, Theresa May said Read More  BBC  </description><link>http://www.secuobs.com/revue/news/596038.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/596038.shtml</guid></item>
<item><title>UK police force hire  Britain s greatest fraudster  to help tackle cybercrime</title><description>2016-01-06 18:03:32 - Security Bloggers Network :    Once described as 'Britain s greatest online fraudster', reformed Tony Sales has been hired by West Midlands Police in the UK to help tackle ongoing cybercrime The post UK police force hire  Britain s greatest fraudster  to help tackle cybercrime appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/594999.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/594999.shtml</guid></item>
<item><title>ESET predictions and trends for cybercrime in 2016</title><description>2015-12-23 16:37:43 - Security Bloggers Network :    It s that time of the year when the information security industry takes part in its annual tradition  coming up with cybercrime predictions and trends for the next 12 months The post ESET predictions and trends for cybercrime in 2016 appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/594076.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/594076.shtml</guid></item>
<item><title>How the Global Cybercrime Economy Hides in Plain Sight</title><description>2015-12-17 21:01:04 - OpenDNS Blog :    Last month, the crime rate for England and Wales nearly doubled thanks to the inclusion of a new crime category in government statistics  cybercrime The new data, released by the UK s Office for National Statistics  ONS , includes an estimated 51 million online fraud incidents and 25 million instances that meet the country s legal definition of   The post How the Global Cybercrime Economy Hides in Plain Sight appeared first on OpenDNS Blog </description><link>http://www.secuobs.com/revue/news/593534.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/593534.shtml</guid></item>
<item><title>Gun violence, cybercrime, and alternatives to living in fear</title><description>2015-12-16 20:19:04 - Security Bloggers Network : A recent New York Times editorial, Fear in the Air, Americans Look Over Their Shoulders begins with  The killings are happening too often Bunched too close together At places you would never imagine  The article continues by saying,  a wide expanse of America s populace finds itself engulfed in a collective fear, a fear tinged with confusion and exasperation and a broad brew of emotions The fear of the ordinary Going to work Eating a meal in a restaurant Sending children to school Watching a movie Gun related murders, whether perpetrated by terrorists, troubled teens, or sociopaths, are altering how IMAGE  </description><link>http://www.secuobs.com/revue/news/593401.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/593401.shtml</guid></item>
<item><title>Malware found on Guardian article that asks if cybercrime is out of control</title><description>2015-12-11 23:02:48 - Security Bloggers Network : Oh the irony An article on The Guardian website discussing whether cybercrime is out of control is redirecting users to the malicious Angler exploit kit, and infecting visiting PCs David Bisson reports </description><link>http://www.secuobs.com/revue/news/592945.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/592945.shtml</guid></item>
<item><title>HNW2015 - Francesca Bosco - Criminality Reinvented  Assessing the Cybercrime Evolution</title><description>2015-12-08 12:16:59 - SecurityTube.Net : HNW2015 - Francesca Bosco - Criminality Reinvented  Assessing the Cybercrime Evolution For More Information Please Visit - https wwwhoneynetorg  </description><link>http://www.secuobs.com/revue/news/592431.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/592431.shtml</guid></item>
<item><title>Chinese public security chief heads to US for talks on cybercrime</title><description>2015-11-30 13:14:24 - Forensic Focus : The first high-level dialogue between the United States and China on cybercrime is under way this week to flesh out a deal reached in September by the presidents of the two countries State media reported on Sunday that Minister of Public Security Guo Shengkun would be in the US until Thursday Guo would also co-chair a ministerial meeting with Jeh Johnson, Secretary of the US Department of Homeland Security, Xinhua said Read More  South China Morning Post  </description><link>http://www.secuobs.com/revue/news/591530.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/591530.shtml</guid></item>
<item><title>Supervising Cybercrime Offenders Through Computer-Related Conditions  A Guide for Judges</title><description>2015-11-28 15:08:10 - Office of Inadequate Security : Orin Kerr helpfully tweeted a link to a guidance for judges on restricting access to computers as a condition of probation </description><link>http://www.secuobs.com/revue/news/591449.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/591449.shtml</guid></item>
<item><title> Data breaches and bots are driving cybercrime surge</title><description>2015-11-13 08:51:10 - Help Net Security : From July to September, ThreatMetrix detected more than 90 million attempted attacks across industries, representing a 20 percent increase over the previous quarter This increase in attacks can large </description><link>http://www.secuobs.com/revue/news/589963.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/589963.shtml</guid></item>
<item><title>Beaches, carnivals and cybercrime  a look inside the Brazilian underground</title><description>2015-11-12 20:17:14 - Office of Inadequate Security : Fabio Assolini authored an interesting report on Brazilian cybercrime that begins  The Brazilian criminal underground </description><link>http://www.secuobs.com/revue/news/589929.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/589929.shtml</guid></item>
<item><title>UK Government Tackles Dark Web With New Cybercrime Unit</title><description>2015-11-12 09:48:19 - Forensic Focus : The UK government has launched a dedicated cybercrime unit given the task of tackling serious crime rings and the sexual abuse of children online The Dark Web is a tiny area of the Deep Web -- a hidden area of the Internet which is not indexed by search engines -- used to conduct illegal activity as well as more legitimate purposes such as activism In order to visit certain websites, visitors must find the correct onion address while using the surveillance-busting Tor browser There are online marketplaces and forums selling everything from drugs to fake or stolen passports and weaponry, but unfortunately due to the Dark Web's concealed nature, it can also act as a place to find illegal pornography, such as child exploitation Now, UK law enforcement hopes to bring the Dark Web out of the shadows Read More  ZDNet  </description><link>http://www.secuobs.com/revue/news/589846.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/589846.shtml</guid></item>
<item><title>The evolution of cybercrime  a story of innovation</title><description>2015-11-10 17:36:24 - Security Bloggers Network : Steve Frost, CiscoBy Steve Frost, BT Security Partnership Manager, Cisco The tactics developed by malware authors and online criminals have shown increasing sophistication over the past few years Recent Cisco security reports have chronicled such innovation in the shadow economy, along with security professionals  fight to stay ahead of adversaries Here are just two of the many   </description><link>http://www.secuobs.com/revue/news/589671.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/589671.shtml</guid></item>
<item><title>Current uni students  less vulnerable to cybercrime </title><description>2015-11-10 14:26:52 - Security Bloggers Network :    A new study finds that current university students have a mature approach to social media that helps keep them safe from cybercrime The post Current uni students  less vulnerable to cybercrime  appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/589643.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/589643.shtml</guid></item>
<item><title>UK gov't tackles Dark Web with new cybercrime unit</title><description>2015-11-09 15:22:06 - LinuxSecurity.com   Latest News : LinuxSecuritycom  The UK government has launched a dedicated cybercrime unit given the task of tackling serious crime rings and the sexual abuse of children online </description><link>http://www.secuobs.com/revue/news/589528.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/589528.shtml</guid></item>
<item><title> Collaboration needed  to combat low-impact cybercrime</title><description>2015-10-22 16:39:11 - Security Bloggers Network :    Greater collaboration between the UK s technology industry and police forces is essential to successfully tackle  high-volume, low-impact cybercrime , a new report advises The post  Collaboration needed  to combat low-impact cybercrime appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/587646.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/587646.shtml</guid></item>
<item><title>What Do Americans Fear Most  Big Brother   Cybercrime</title><description>2015-10-21 11:54:56 - Forensic Focus : It's a spooky time of year in the United States   a time when jack-o'-lanterns glare from front porches and creepy masks cover the adorable faces of children But these seasonal adornments don't tell the real story about what Americans fear most, according to a new survey Americans' biggest fears are related to government and technology, not ghosts and goblins, according to the Survey of American Fear by researchers at Chapman University in California For the survey, the researchers polled a representative sample of approximately 1,500 Americans and found that the majority of Americans  58 percent  are either  afraid  or  very afraid  of the corruption of government officials Cyberterrorism was also high on the list, with 448 percent of those surveyed saying they feared these kinds of attacks Read More  LiveScience  </description><link>http://www.secuobs.com/revue/news/587470.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/587470.shtml</guid></item>
<item><title>The cost of inaction What cybercrime could cost your business</title><description>2015-10-21 00:46:07 - Security Bloggers Network : These days, cyber crime seems to be consistently in the news And it's an inescapable reality for organizations of all sizes and all industries What is the best strategy for protecting your company  And how do weigh the costs vs threats  In this infor </description><link>http://www.secuobs.com/revue/news/587430.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/587430.shtml</guid></item>
<item><title>2015 Cost of Cyber Crime study  The average cost of cybercrime</title><description>2015-10-14 22:45:54 - Security Bloggers Network : The 6th annual Cost of Cyber Crime study, sponsored by HP Security, was recently released In this new blog series, we will cover the key findings </description><link>http://www.secuobs.com/revue/news/586789.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/586789.shtml</guid></item>
<item><title> The average cost of cybercrime escalates to  15 million per organization</title><description>2015-10-08 10:34:37 - Help Net Security : A new study by the the Ponemon Institute and HP reveales a dramatic increase in the overall cost of cyber crime The 2015 Cost of Cyber Crime Study quantifies the annual cost of cyber crime for compan </description><link>http://www.secuobs.com/revue/news/586050.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/586050.shtml</guid></item>
<item><title>Cost of Cybercrime for US Firms Climbs to  15 Million, Study Finds</title><description>2015-10-07 20:07:28 - Security Bloggers Network :    The annual cost of cyber crime to businesses continues to rise, with US firms now paying an average of  15 million   the highest global average   representing an increase of nearly 20 percent year over year According to the results of the latest Cost of Cyber Crime Study conducted by the Ponemon Institute, US   Read More The post Cost of Cybercrime for US Firms Climbs to  15 Million, Study Finds appeared first on The State of Security  IMAGE  </description><link>http://www.secuobs.com/revue/news/585996.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/585996.shtml</guid></item>
<item><title>Global cost of cybercrime  continues to rise </title><description>2015-10-07 13:51:31 - Security Bloggers Network :    A new report from the Ponemon Institute reveals that the global cost of cybercrime to businesses shows no signs of slowing down The post Global cost of cybercrime  continues to rise  appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/585943.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/585943.shtml</guid></item>
<item><title>Une enquête d'HP révèle que le coût moyen du cybercrime s'élève à 13,4 M   4  par entreprise</title><description>2015-10-06 15:14:26 - Global Security Mag Online : HP dévoile les résultats de la sixième enquête annuelle menée en partenariat avec le Ponemon Institute, qui détaille les impacts économiques des cyberattaques sur les organisations des secteurs public et privé Les résultats attestent une augmentation du coût du cybercrime pour les entreprises et le changement d'approche qui engage les professionnels de la sécurité IT à réinventer leur façon d'appréhender les risques Menée par Ponemon Institute sous l'égide de HP Enterprise Security, l'étude Cost of Cyber    - Investigations </description><link>http://www.secuobs.com/revue/news/585798.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/585798.shtml</guid></item>
<item><title>Cybercrime  more threatening than ever </title><description>2015-10-05 16:45:57 - Security Bloggers Network :    Cybercrime is more aggressive and confrontational than it has ever been, Europol's latest Internet Organised Crime Threat Assessment  IOCTA  has stated The post Cybercrime  more threatening than ever  appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/585703.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/585703.shtml</guid></item>
<item><title>RaytheonWebsense attend the 2015 EUROPOL - INTERPOL Cybercrime Conference in The Hague</title><description>2015-09-30 17:33:08 - Security Labs :    Representing the RaytheonWebsense  Security Labs  team, Andy Settle is attending the 2015 EUROPOL - INTERPOL Cybercrime Conference here in The Hague Day one has just kicked off with a round-up of the threat landscape for 2015 and some powerful figures from the Microsoft VIA Collaboration program As a well attended forum for law enforcement and industry to discuss the emerging challenges and successes in countering cyber crime, it is a privilege for RaytheonWebsense to be invited to actively participate EUROPOL have also taken this opportunity to release their latest threat landscape report for 2015 at  https wwweuropoleuropaeu sites default files publications europol_iocta_web_2015pdf </description><link>http://www.secuobs.com/revue/news/585219.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/585219.shtml</guid></item>
<item><title> Infographic  Devaluing data, fighting cybercrime</title><description>2015-09-28 09:30:12 - Help Net Security : For any organization connected to the Internet, it is not a question of if but when their business will be under attack, according to a recent cybersecurity report from Symantec 428 million cyberatt </description><link>http://www.secuobs.com/revue/news/584833.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/584833.shtml</guid></item>
<item><title>Curbing the For-Profit Cybercrime Food Chain</title><description>2015-09-25 21:11:52 - Slashdot  Your Rights Online : msm1267 writes  A new report coauthored by Google researchers and a host of academics explains that firewalls, two-factor authentication and other traditional defensive capabilities put security teams in a constant dogfight against cybercrime Instead, the focus, they says, should be on attacking the criminal infrastructure The report outs a number of soft spots and inter-dependencies in the criminal underground that could be leveraged to cut into the efficacy of cybercrime  Commoditization directly influences the kinds of business structures and labor agreements that drive recent cybercrime,  the researchers write While shutting down the black market is easier said than done, the paper notes a few ways to deter the behavior of attackers, if not fully break the chain  IMAGE   IMAGE  Share on Google  Read more of this story at Slashdot </description><link>http://www.secuobs.com/revue/news/584730.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/584730.shtml</guid></item>
<item><title> Mapping the underground cybercrime economy in order to disrupt it</title><description>2015-09-25 14:51:45 - Help Net Security : You've surely heard - everybody has - about the existence of an underground economy that allowed the proliferation of Internet crime Many years ago cyber crooks could mostly rely on their own knowled </description><link>http://www.secuobs.com/revue/news/584681.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/584681.shtml</guid></item>
<item><title>UK businesses  need to protect themselves from cybercrime </title><description>2015-09-23 18:41:25 - Security Bloggers Network :    UK businesses need to protect themselves from cybercrime, as government data reveals that up to 90 percent of major businesses in the country experienced an attack in 2014 The post UK businesses  need to protect themselves from cybercrime  appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/584458.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/584458.shtml</guid></item>
<item><title>Brazil s Cybercrime Problem</title><description>2015-09-19 02:51:57 - Office of Inadequate Security : Robert Muggah and Nathan Thompson report  Brazil is at the epicenter of a global cybercrime wave The country ranks second </description><link>http://www.secuobs.com/revue/news/584021.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/584021.shtml</guid></item>
<item><title>UK s NCA calls for global approach to cybercrime</title><description>2015-09-18 17:27:43 - Security Bloggers Network :    An international effort between security organizations is needed to fight cybercrime, says the UK s National Crime Agency The post UK s NCA calls for global approach to cybercrime appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/583966.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/583966.shtml</guid></item>
<item><title> ThreatMetrix   Le Cybercrime mondial en hausse de 20pourcents eu deuxième trimestre 2015   </title><description>2015-09-09 12:12:56 - Global Security Mag Online : ThreatMetrix, acteur dans le domaine de la prévention des fraudes et l'un des plus grands réseaux d'identités numériques mondial, révèle aujourd'hui les résultats de son rapport de sécurité trimestriel 2015  ThreatMetrix Cybercrime Report   Q2 2015  Se basant sur l'analyse de milliards de transactions mondiales menée d'avril à juin 2015, le Réseau ThreatMetrix Digital Identity a détecté et stoppé plus de 75 millions de cyberattaques en temps réel à travers le monde Le secteur du e-commerce a    - Investigations </description><link>http://www.secuobs.com/revue/news/582804.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/582804.shtml</guid></item>
<item><title>Latest security flaw to destroy all business   Sanity check  your cybercrime statistics</title><description>2015-09-03 13:56:27 - Security Bloggers Network : The difficulty telling fact from fiction in cybercrime news has been getting worse over the past few years For decision makers, this means a  sanity check  on reported stats should be in your everyday toolkit </description><link>http://www.secuobs.com/revue/news/582316.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/582316.shtml</guid></item>
<item><title>Entente Internationale   Le cybercrime, ça eut payé  mais ça paye plus</title><description>2015-09-03 05:00:13 - CNIS mag : L idée même d un cyber-crime toujours impuni serait-elle en passe de s étioler   Il y a encore beaucoup de chemin à faire, les aléas de la politique étrangère viennent parfois entraver les enquêtes, mais la collaboration entre les juges et policiers chargés du cyber commencent enfin à donner des résultats, explique Alexandra Ruiz sur le blog   </description><link>http://www.secuobs.com/revue/news/582268.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/582268.shtml</guid></item>
<item><title>China vows to  clean the internet  in cybercrime crackdown, 15,000 arrested</title><description>2015-08-20 13:26:57 - Security Bloggers Network : The Ministry of Public Security in China said this week that 15,000 people have been arrested since the launch of a major anti-cybercrime operation called  cleaning the internet  </description><link>http://www.secuobs.com/revue/news/580802.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/580802.shtml</guid></item>
<item><title>Cybercrime as a Business  Part 2</title><description>2015-08-17 15:17:36 - Information Security Today  Essential Information for Managing the Security of a Modern  Evolving En : Part 1 talked about using the cloud for business the criminal way, the benefits of the cloud, and how everything that applies to a regular business in the cloud also applies to the criminal business in the cloud, using examples of MyShopbiz and MyCrimebiz Part 2 talks about the scheme, or the step-by-step process, that your computer goes through when it gets infected by things like Trojans and ransomware and what you can do to avoid that </description><link>http://www.secuobs.com/revue/news/580427.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/580427.shtml</guid></item>
<item><title>FireEye, Europol tag team on cybercrime detection</title><description>2015-08-17 14:56:28 - Security Bloggers Network : The organizations will share threat knowledge in order to detect and stop cybercriminals within Europe </description><link>http://www.secuobs.com/revue/news/580415.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/580415.shtml</guid></item>
<item><title>Cybercrime as a Business  Part 1</title><description>2015-08-10 16:04:18 - Information Security Today  Essential Information for Managing the Security of a Modern  Evolving En : Criminals are business people too and just as the Internet and related technologies such as cloud computing have revolutionized traditional business models and created new opportunities, so they have for the criminal business This three-part series discusses the ways that criminals use the Internet to more efficiently steal money from the rest of us It also touches upon what happens when you become an involuntary contribution association, as well as provides examples of how the arms race between criminals and those defending them has evolved People have gotten a little bit smarter about stopping these things, but so have the attackers </description><link>http://www.secuobs.com/revue/news/579735.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/579735.shtml</guid></item>
<item><title>Cybercrime update  take downs, arrests, convictions, and sentences</title><description>2015-07-27 15:40:01 - Security Bloggers Network : Information security could use some good news right now, something to offset the string of bad news about data breaches and system vulnerabilities  so how about this   Cyber Criminal Forum Taken Down, Members Arrested in 20 Countries  The post Cyberc </description><link>http://www.secuobs.com/revue/news/578464.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/578464.shtml</guid></item>
<item><title>Cybersecurity Canon Candidate Book Review   Cybercrime and Espionage  An Analysis of Subversive Multi-Vector Threats  2011 ,  by Will Gragido and John Pirc</title><description>2015-07-18 00:43:16 - Security Bloggers Network :  IMAGE Executive Summary Cybercrime and Espionage, published in 2011, is a book that was ahead of its time The authors were pushing the envelope in terms of how the security community should think about advanced threats However, almost five years later, there is not enough in here to make the book Canon material Gragido and Pirc present some stimulating ideas, but in the end, the security community has not adopted many of them My recommendation is to read this book if you are interested in how our community has evolved in terms of thinking about adversary campaigns However, if you are looking for a state-of-the-art book about cybercrime and cyber espionage, this is not it Introduction Will Gragido and John Pirc published this book in February 2011   the year after the commercial industry experienced its wake-up call in terms of cyber espionage  Operation Aurora  1  Aurora refers to the adversary campaign launched at Google and other commercial organizations that was designed to steal intellectual property, collect information on human rights activists, and gather intelligence regarding on-going FBI wiretap operations  2  What made Aurora notable was Google s reaction to it They went public and accused the Chinese government of being responsible for the attacks Before Aurora, most commercial organizations would not admit that they had been breached, even though nation states had been targeting commercial organizations for at least a decade Business leaders worried that admitting a breach would significantly affect the bottom line After Aurora and Google s public mea culpa, it became easier for other commercial entities to admit that they had been breached Fast-forward to today, and public breach notifications are so common that it is difficult to keep up with them all But this was the beginning Before Aurora, the only significant cyberthreat to the commercial world at the time was crime After, cyber espionage became something that we all had to worry about This is the context for the book  defining cybercrime and cyber espionage as motivations   what makes them different and what makes them the same Impressions The two authors, Will Gragido and John Pirc, are experienced cybersecurity professionals, and it is clear that they know what they are talking about  but the book is a bit disorganized in terms of who the target audience is The content is a mix of introductory and advanced material However, I did not see that the book had a through line The authors  analysis of the cybercrime world is at the introductory level If you want a more in-depth book on the same topic that was published around the same time, consider Kingpin, written by Kevin Poulsen  3  If you are looking for something a little more recent, consider Spam Nation by Brian Krebs  4  The espionage material is more advanced, but if you want to go deeper, consider Kim Zetter s Countdown to Zero Day  5  or Richard Bejtlich s The Practice of Network Security Monitoring  6  I do give the Gragido and Pirc credit though for covering some advanced ideas ahead of their time that have not really become popular until just recently One idea that I really like is that commercial organizations should build their own intelligence teams to track adversary campaigns They published the book almost five years ago, and this was not universally accepted at the time It is not universally accepted today either, but more and more organizations are starting to understand the value of such teams As an aside, this is one of the reasons I got hired at Palo Alto Networks  to build an intelligence team that we eventually called Unit 42 Gragido and Pirc push their own intelligence model called MOSAIC  Motive, Awareness, Open Source Intelligence Collection, Study, Asymmetrical Intelligence Correlation, Intelligence Review and Interrogation and Confluence It is a good framework for an intelligence analyst  unfortunately, the model has not really caught on Most intelligence organizations   the CIA, the FBI, and the NSA, as well as Unit 42   use a model called The Intelligence Cycle  7 8  They are basically the same thing, but the MOSAIC model has more detail The authors introduce a new phrase called Subversive Multivector Threats  SMTs , a sort of superset to what the cybersecurity community used to call the Advanced Persistent Threat  APT  They even explain the origin of the APT phrase, a phrase the military had been using for almost a decade in an UNCLASSIFIED setting to mean anything that involved Chinese government-sanctioned cyber espionage Gragido and Pirc were ahead of their time, understanding that the community needed another name to label similar attacks that did not originate from China Thus, they came up with SMTs, but the community has not embraced that term We have evolved the APT phrase to include everything instead Another advanced idea presented that I really liked was the concept that there are humans behind these attacks Tools do not attack our systems Humans   often organized into groups   attack our systems, and they use tools to accomplish some goal These adversary groups can be rated in skill level from novice to expert and have motivations like cybercrime and cyber espionage  and it helps defenders do a better job by understanding that context, according to the authors I wholeheartedly agree But today, I think we can expand that motivation list to include hacktivism, cyberterrorism and cyberwarfare, and I thought their definitions of hackers  maturity levels were not definitive enough to be useful Also, Gragido and Pirc introduce a two-tiered categorization scheme for adversary campaigns, where Tier   1 campaigns target   air-gapped networks or networks that would be considered highly secured, such as those of power companies  supervisory control and data acquisition or SCADA networks , governments, and defense organizations  9  Tier   2 adversary campaign plans are all other APT campaigns This two-tiered system seems ill-conceived today The security community considers SCADA networks in general, and power companies in particular, as being at least 10 years behind the rest of the community  10  And government networks have proven to be even less secure than most commercial organizations, except for maybe the intelligence community s networks and some select defense networks  11  I do not see a need for this two-tiered system in today s threat environment One last advanced idea that I really liked was that threat prevention is possible There has been a trend in the industry these past five years where security leaders have thrown their hands in the air saying they cannot possibly stop the APT, and that it is better to concentrate their precious resources solely on detection and mitigation This is just plain wrong, and Gragido and Pirc do well to point that out If I can prevent 90 percent of all attack campaigns because most adversaries use known techniques, why not do it  That lets me concentrate my resources on finding the unknown techniques Detection and mitigation is important, but these activities should be balanced with a robust threat prevention program Even in 2011, Gragido and Pirc asserted this philosophy Conclusion Cybercrime and Espionage is a book that was ahead of its time I give the authors credit for pushing the envelope as to how the security community s thinking around advanced threats should evolve If you read it when it was published, it would have stimulated your thought process around your own security program But almost five years later, there is not enough in here to make the book Canon material Gragido and Pirc present some stimulating ideas, but in the end, the security community has not adopted many of them My recommendation is to read this book if you are interested in how our community has evolved in terms of thinking about adversary campaigns However, if you are looking for a state-of-the-art book about cybercrime and cyber espionage that will stand the test of time, this is not it Sources  1   Google Hack Attack Was Ultra Sophisticated, New Details Show,  by KIM ZETTER, Wired Magazine, 14 January 2010, Last Visited 5 July 2015,http wwwwiredcom 2010 01 operation-aurora   2   Google Aurora Hack Was Chinese Counterespionage Operation,  by Mathew J Schwartz, Information Week  Dark reading, 21 May 2013, Last Visited 5 July 2015http wwwdarkreadingcom attacks-and-breaches google-aurora-hack-was-chinese-counterespionage-operation d d-id 1110060   3   The Cybersecurity Canon  Kingpin,  by Rick Howard, Palo Alto Networks, 11 February 2014, Last Visited 9 July 2015,http researchcenterpaloaltonetworkscom 2014 02 cybersecurity-canon-kingpin   4   The Cybersecurity Canon  Read Rick Howard s First-Look Review of SPAM Nation by Brian Krebs,  by Rick Howard, Palo Alto Networks, 17 November 2014, Last Visited 9 July 2015,http researchcenterpaloaltonetworkscom 2014 11 cybersecurity-canon-rick-howard-reviews-brian-krebs-spam-nation   5   The Cybersecurity Canon  Countdown to Zero Day  Stuxnet and the Launch of the World s First Digital Weapon,  by Rick Howard, Palo Alto Networks, 28 January 2015, Last Visited 9 July 2015http researchcenterpaloaltonetworkscom 2015 01 cybersecurity-canon-countdown-zero-day-stuxnet-launch-worlds-first-digital-weapon   6   The Cybersecurity Canon  The Practice of Network Security Monitoring,  by Rick Howard, Palo Alto Networks, 10 November 2014, Last Visited 9 July 2015,http researchcenterpaloaltonetworkscom 2014 11 cybersecurity-canon-practice-network-security-monitoring   7   The Intelligence Cycle,  Central Intelligence Agency  Kids Zone, Last Visited 9 July 2015,https wwwciagov kids-page 6-12th-grade who-we-are-what-we-do the-intelligence-cyclehtml  8   The Intelligence Cycle,  Federation of American Scientists, Last Visited 9 July 2015http fasorg irp cia product facttell intcyclehtm  9   Cyber Crime and Espionage  An Analysis of Subversive Multi-Vector Threats,  by Will Gragido   John Pirc, Syngres Publishing, 7 January 2011, Last Visited 10 July 2015https wwwgoodreadscom book show 10651366-cyber-crime-and-espionage ac 1  10   SCADA systems  Riddled with vulnerabilities  by Doug Drinkwater, SC Magazine, 26 August 2014, Last Visited 10 July 2015,http wwwscmagazineukcom scada-systems-riddled-with-vulnerabilities article 368094   11   4 Worst Government Data Breaches Of 2014,  by Jai Vijayan, InformationWeek  Government, 12 November 2014, Last Visited 10 July 2015http wwwinformationweekcom government cybersecurity 4-worst-government-data-breaches-of-2014 d d-id 1318061 References  APT1 Three Months Later   Significantly Impacted, Though Active   Rebuilding,  by Dan Mcwhorter 21 May 21 2013, Last Visited 9 July 2015https wwwmandiantcom blog apt1-months-significantly-impacted-active-rebuilding   EU Data Protection Directive  Directive 95 46 EC ,  by TechTarget, Last Visited 10 July 2015,http searchsecuritytechtargetcouk definition EU-Data-Protection-Directive  Internet Crime Complaint Center  IC3 ,  The Federal Bureau of Investigation  FBI  and the National White Collar Crime Center  NW3C , Last Visited 5 July 2015http wwwic3gov media annualreportsaspx  SAFE HARBOR PRIVACY PRINCIPLES,  by exportgov, Last Visited 10 July 2015,http wwwexportgov safeharbor eu eg_main_018475asp </description><link>http://www.secuobs.com/revue/news/577520.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/577520.shtml</guid></item>
<item><title>Notorious cybercrime forum Darkode taken down, dozens arrested</title><description>2015-07-16 12:45:26 - Security Bloggers Network : Darkode, a notorious cybercrime marketplace for malware, zero-day exploits, and botnets, was permanently shut down by a massive law enforcement operation coordinated between agencies in the US, Europe and elsewhere </description><link>http://www.secuobs.com/revue/news/577294.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/577294.shtml</guid></item>
<item><title>The Darkode Cybercrime Forum, Up Close</title><description>2015-07-16 02:59:58 - Krebs on Security : By now, many of you loyal KrebsOnSecurity readers have seen stories in the mainstream press about the coordinated global law enforcement takedown of Darkode dot me, an English-language cybercrime forum that served as a breeding ground for botnets, malware and just about every other form of virtual badness This post is an attempt to distill several years' worth of lurking on this forum into a narrative that hopefully sheds light on the individuals apprehended in this sting and the cybercrime forum scene in general </description><link>http://www.secuobs.com/revue/news/577244.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/577244.shtml</guid></item>
<item><title>Europol Dismantles Spanish Cybercrime Group</title><description>2015-07-13 18:51:29 - Forensic Focus : EU law enforcement agency Europol has supported the Spanish police force in an effort to take down a cyber-crime group operating with a  sophisticated' illegal call centre from Barcelona Under a joint operation codenamed  Walker', raids and arrests took place on 6 July in the Catalan capital The telecommunications-based cyber-crime in this case is classified as International Revenue Share Fraud  IRSF  Read More  SC  </description><link>http://www.secuobs.com/revue/news/576903.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/576903.shtml</guid></item>
<item><title>Cybercrime Kingpin Pleads Guilty</title><description>2015-07-10 17:36:48 - Krebs on Security : An Estonian man who ran an organized cybercrime ring that infected more than 4 million PCs in over 100 countries with moneymaking malware has pleaded guilty in New York to wire fraud and computer intrusion charges </description><link>http://www.secuobs.com/revue/news/576714.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/576714.shtml</guid></item>
<item><title>Proofpoint publie un rapport intitulé The Cybercrime Economics of Malicious Macros </title><description>2015-06-26 15:33:29 - Global Security Mag Online : Proofpoint, Inc, annonce la publication d'un rapport identifiant les facteurs économiques et techniques responsables de l'augmentation récente du nombre de macros malveillantes à l'échelle internationale Ces dernières ont notamment permis d'installer le cheval de Troie Dridex Le rapport intitulé The Cybercrime Economics of Malicious Macros de Proofpoint analyse le phénomène de résurgence des macros malveillantes qui, sur les neuf derniers mois, ont permis aux cybercriminels d'atteindre plus de    - Malwares </description><link>http://www.secuobs.com/revue/news/575581.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/575581.shtml</guid></item>
<item><title>Major Cybercrime Ring Dismantled By Joint Investigation Team</title><description>2015-06-25 16:18:25 - Forensic Focus : A joint investigation team consisting of investigators and judicial authorities from six different European countries, supported by Europol and Eurojust, has taken down a major cybercriminal group during a coordinated action in Ukraine With on-the-spot support from Europol, Austrian and Belgian law enforcement and judicial authorities, the action in Ukraine on 18 and 19 June resulted in the arrest of five suspects, eight house searches in four different cities, and the seizure of computer equipment and other devices for further forensic examination The aim of this JIT was to target high-level cybercriminals and their accomplices who are suspected of developing, exploiting and distributing Zeus and SpyEye malware - two well-known banking Trojans - as well as channelling and cashing-out the proceeds of their crimes Read More  Europol  </description><link>http://www.secuobs.com/revue/news/575447.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/575447.shtml</guid></item>
<item><title> The downfall of a major cybercrime ring exploiting banking Trojans</title><description>2015-06-25 11:58:26 - Help Net Security : A joint investigation team  JIT  consisting of investigators and judicial authorities from six different European countries, supported by Europol and Eurojust, has taken down a major cybercriminal gro </description><link>http://www.secuobs.com/revue/news/575383.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/575383.shtml</guid></item>
<item><title> Six key facts about malicious macros and the cybercrime economy</title><description>2015-06-24 09:34:21 - Help Net Security : Cybercrime is big business and criminals are increasingly exploiting people to circumvent automated protection systems Cybercriminals have, in the last nine months, increasingly returned to cost-effe </description><link>http://www.secuobs.com/revue/news/575211.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/575211.shtml</guid></item>
<item><title>Interviews  Ask Brian Krebs About Security and Cybercrime</title><description>2015-06-17 20:19:43 - Slashdot  Your Rights Online : Brian Krebs got his start as a reporter at The Washington Post and after having his entire network taken down by the Lion Worm, crime and cybersecurity became his focus In 2005, Krebs started the Security Fix blog and Krebs On Security in 2009, which remains one of the most popular sources of cybercrime and security news Brian is credited with being the first journalist to report on Stuxnet and one of his investigative series on the McColo botnet is estimated to have led to a 40-70pourcents decline in junk e-mail sent worldwide Unfortunately for Krebs, he's also well known to criminals In 2013 he became one of the first journalists to be a victim of Swatting and a few months later a package of heroin was delivered to his home Brian has agreed to give us some of his time and answer any questions you may have about crime and cybersecurity As usual, ask as many as you'd like, but please, one per post  IMAGE   IMAGE  Share on Google  Read more of this story at Slashdot </description><link>http://www.secuobs.com/revue/news/574428.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/574428.shtml</guid></item>
<item><title>A Record Number Attended the ISSA-LA 7th Annual Information Security Summit on Cybercrime and Solutions at the Los Angeles Convention Center</title><description>2015-06-13 20:27:53 - Security Bloggers Network :    A Record Number Attended the ISSA-LA 7th Annual Information Security Summit on Cybercrime and Solutions at the Los Angeles Convention Center The post A Record Number Attended the ISSA-LA 7th Annual Information Security Summit on Cybercrime and Solutions at the Los Angeles Convention Center appeared first on SecurityOrbcom </description><link>http://www.secuobs.com/revue/news/573946.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/573946.shtml</guid></item>
<item><title>Europol shuts down cybercrime ring with 49 arrests</title><description>2015-06-11 14:32:43 - Security Bloggers Network :    Europol s European Cybercrime Centre has arrested 49 suspects in a joint international operation targeting the takedown of a major cybercrime ring, reports Tripwire The Cybercrime group is said to have had members across Europe, including in Italy, Spain, Poland, Belgium, Georgia and the UK The suspects are believed to have breached corporate email accounts to commit financial The post Europol shuts down cybercrime ring with 49 arrests appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/573708.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/573708.shtml</guid></item>
<item><title>European Authorities Dismantle Cybercrime Ring, Dozens Arrested</title><description>2015-06-10 20:21:09 - Security Bloggers Network :    Yesterday, Europol s European Cybercrime Centre  EC3  announced the success of a joint international operation, leading to the arrest of 49 suspects of a massive cybercrime ring In collaboration with several European countries, the criminal group was suspected of committing financial fraud by breaking into corporate email accounts and diverting payments from business customers The now dismantled gang   Read More The post European Authorities Dismantle Cybercrime Ring, Dozens Arrested appeared first on The State of Security  IMAGE  </description><link>http://www.secuobs.com/revue/news/573631.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/573631.shtml</guid></item>
<item><title>Batman v Superman  Dawn of Cybercrime Justice </title><description>2015-06-05 18:29:52 - Security Bloggers Network : The fight against cybercrime could use some superheroes, but who would do a better job  Batman or Superman  The post Batman v Superman  Dawn of Cybercrime Justice  appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/573156.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/573156.shtml</guid></item>
<item><title>Costs and Robbers  The Real Cost of Cybercrime</title><description>2015-06-05 16:00:04 - Veracode :    Reactive security can't buy lower costsWhat's the real cost of cybercrime  It's a hard number to pin down, since there are so many factors influencing the total for any given company What was attacked  Was data stolen, damaged or destroyed  How long were network systems down  While there's no hard and fast answer, it is possible to uncover some of the most common costs associated with cyber-robbery and data destruction   and more importantly, to suggest a way to mitigate these losses Losing Game The first cost businesses face when they fall victim to cybercrime  Lost revenue This might result from stolen corporate secrets, lowered sales volumes  if consumers are scared off after a credit card breach  or falling stock prices As reported by HP Enterprise Security, the Ponemon Institute's  2014 Cost of Cyber Crime  study shows cyberattacks resulted in losses of  127 million for companies in the United States Next on the list are losses tied to investigation and cleanup This money must be spent first to find the source of a data breach or malware attack, and second to clean up any damage in the aftermath In some cases, this means funding months- or years-long internal investigations about what happened, while in others   especially for well-known companies or those with extensive government ties   businesses must pay for outside investigators to uncover the cause Systems must then be cleaned, re-secured and likely recertified before any sensitive data can be handled Wondering about the cost  According to the International Business Times, Sony shelled out  15 million to investigate and clean up after its December 2014 breach Finally, companies must consider the cost of downtime Even if data isn't stolen or compromised, and even if consumers aren't worried about their information being stolen, the costs of network outages in a technology market that expects 24-7 service can be crippling In a recent Information Age article, it was estimated that every hour of downtime costs businesses  100,000 per hour   and yet 35 percent of companies estimate that fixing these critical network issues can take up to 12 hours Going Pro What's the common theme here  Reactive security Each cost incurred comes after the fact   after data is stolen, after networks are damaged and after systems go down What if there was a better way  There is  go proactive Here's how it shakes out Most breaches happen thanks to an application, either designed in-house or offered by a third-party provider In many cases, security holes aren't recognized until malware is past the gate and taking up residence in network systems, meaning it's already too late By opting for a cloud-based, secure application development platform, however, it's possible to achieve continuous app visibility, both for internal software and programs from off-site partners Are there costs involved  Absolutely According to a recent Forrester report, implementing Veracode's end-to-end security solution costs an average of  52,800 for implementation and  56,650 per year after the first year, resulting in a four-year total of  222,750 Sounds like a lot in isolation, but not so much when the real cost of cybercrime is tallied What's worse  spending just over  200,000 in four years, or  12 to  15 million per breach   along with  100,000 per hour in downtime  Simply put, reactive security can't buy lower costs Spend on proactive tools and reduce the chance of a massive loss Learn more about Veracode's security solutions by checking out its latest webinar Photo Source  Flickr </description><link>http://www.secuobs.com/revue/news/573129.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/573129.shtml</guid></item>
<item><title>Bitcoin s  new frontier  of cybercrime explored at Barcelona event</title><description>2015-06-01 20:46:06 - Security Bloggers Network :    The post Bitcoin s  new frontier  of cybercrime explored at Barcelona event appeared first on Marble Security </description><link>http://www.secuobs.com/revue/news/572684.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/572684.shtml</guid></item>
<item><title>Top security tools in the fight against cybercrime</title><description>2015-05-19 17:24:40 - LinuxSecurity.com   Latest News : LinuxSecuritycom  Cybercrime is a massive global threat, and US businesses are the No1 target For tips and advice about how best to defend against cyberattacks, Network World asked security pros to name their No1, most valuable security tool </description><link>http://www.secuobs.com/revue/news/571256.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/571256.shtml</guid></item>
<item><title>ThreatMetrix   Vivez-vous à côté de cybercriminel   87pourcents du cybercrime en France aurait été perpétré par des Hackers Français  </title><description>2015-05-18 21:48:00 - Global Security Mag Online : ThreatMetrix, acteur dans le domaine de la prévention des fraudes et l'un des plus grands réseaux d'identités numériques mondial, révèle aujourd'hui les résultats de son rapport de sécurité ThreatMetrix Cybercrime Report pour le premier trimestre 2015, désignant l'Europe comme la nouvelle scène de la cybercriminalité internationale S'appuyant sur les incidents de sécurité détectés et analysés par le Réseau ThreatMetrix Digital Identity d'octobre 2014 à mars 2015 sur des milliards de transactions mondiales,    - Investigations </description><link>http://www.secuobs.com/revue/news/571140.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/571140.shtml</guid></item>
<item><title>Is the UK Police Force Keeping up with the Shift to Cybercrime  </title><description>2015-05-13 20:42:40 - Veracode :    Over 3,800 officers enrolled in training, Freedom of Information Reveals Along with so many other spheres of our lives in today s digital world, crime has changed dramatically in recent times Criminals are smart to the fact that cyberspace presents a lucrative alternative to more old-school methods Or perhaps cybercrime is just attracting a different crowd to those whom your local bobby would traditionally encounter One tucked away in the safety of his or her own bedroom  far removed from the offenders that police officers have been trained to deal with In light of the increasing prevalence of cybercrime, Veracode was pleased to report this week that proactive steps are being taken within the UK police to upskill officers and equip them against this newer breed of criminal actor Veracode research, gathered from a Freedom of Information  FOI  request, revealed an impressive 100 fold rise in cybercrime training delivered to police officers, over a five year period Of the 19 forces that responded to the FOI, the numbers of officers undertaking dedicated cyber security training has leapt from a mere 37 in 2010, to 3,829 in 2015 Connectivity has forever changed business  mobile apps are now storefronts and employees are working from a variety of devices and internet hotspots, well outside the traditional crunchy network perimeter The move to everything being online has dramatically shifted how crimes are committed, and as a result law enforcement teams should be well versed in all things cyber As for consumers and the general public, an issue looming large on the security horizon is that of the Internet of Things Application vulnerabilities in internet-connected home devices could have the power to turn what might have been a simple burglary into a regional theft ring stretching beyond a single community or local authority jurisdictions A local police force skilled at identifying and remediating such an attack early on might prevent a costly escalation The surge in cyber skills training amongst the UK police forces is reflective of the trend towards online criminal activity These new skills will enable local forces to work with newly established cyber teams within the Regional Organised Crime Units, as well as providing support to National Cyber Crime Unit investigations of the most serious cybercrimes The BIS 2014 Information Security Breaches Survey reported that 81pourcents of large organisations in the UK have experienced a security breach of some sort and collaboration between the public and private sectors is key to stemming the rise of cybercrime across the country Cyber security training exercises are a step in the right direction towards this In addition, more specialised resources, such as cyber forensics experts, should be made available to local forces By building the trust in the community in our police s ability to deal with cybercrime, businesses and individuals will be more confident turning to law enforcement should they fall victim to this sort of crime </description><link>http://www.secuobs.com/revue/news/570622.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/570622.shtml</guid></item>
<item><title>IRS sets up dedicated cybercrime unit to combat identity theft</title><description>2015-05-06 12:57:02 - Security Bloggers Network : The new unit's creation is the response to rising numbers of identity theft through hacking </description><link>http://www.secuobs.com/revue/news/569863.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/569863.shtml</guid></item>
<item><title> Smarter threats and the rising complexity of cybercrime</title><description>2015-04-23 09:28:08 - Help Net Security : 85,000 new malicious IPs are launched every day, and the top phishing targets are technology companies and financial institutions, the new Webroot 2015 Threat Brief reveals Presented at RSA Conf </description><link>http://www.secuobs.com/revue/news/568427.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/568427.shtml</guid></item>
<item><title>Cybercrime 2015  An Inside Look at the Changing Threat Landscape</title><description>2015-04-20 16:41:12 - Security Bloggers Network :    RSA Research has recently published a research paper on expected trends in Cybercrime in 2015 The paper is based on RSA s insight into cybercriminal activity, recovery of over a million actionable findings in 2014 and analysis of around 400,000 unique malware variants each week Among the findings   cybercrime-as-a-service offerings will continue to both proliferate  The post Cybercrime 2015  An Inside Look at the Changing Threat Landscape appeared first on Speaking of Security - The RSA Blog and Podcast </description><link>http://www.secuobs.com/revue/news/567943.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/567943.shtml</guid></item>
<item><title>Central Ohio Infosec Summit 2015 - The Explosion of Cybercrime - The 5 Ways IT May Be an Accomplice</title><description>2015-04-20 13:50:12 - SecurityTube.Net : Mark Villinski GRC - Session  7 - Mark Villinski Mobile devices, social media sites, and the exponential growth of cybercriminals are threatening your users and your data every day Can your IT department become an unwitting accomplice to cybercrime  Mark Villinski, Kaspersky Lab Marketing Manager, sheds light on the growing challenges facing IT today and discusses the 5 ways that IT departments may be unknowingly enabling cybercrime in their organizations During this session, you will hear    A comprehensive overview of the current state of the cybercrime threat landscape   Several real life examples and stories of attacks  where they come from and ways to detect them   Examples of current IT policies and procedures that may be exposing your network to attacks Bio  Mark Villinski brings more than 20 years of technology sales, marketing experience and channel leadership to Kaspersky Lab As Director, Field Marketing, Mark is responsible for field marketing efforts in the United States and for increasing awareness of Kaspersky Lab as a thought leader in the online security industry Prior to joining Kaspersky Lab, Mark served as Director Worldwide Channel Operations at Enterasys Networks Mark has presented at several industry conferences across North America addressing audiences on the challenges facing IT departments today and discussing ways organizations can protect themselves from the current threat landscape For More Information Please Visit  - http wwwcentralohioissaorg  http wwwirongeekcom iphp page videos centralohioinfosec2015 mainlist </description><link>http://www.secuobs.com/revue/news/567898.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/567898.shtml</guid></item>
<item><title> Cybercrime gets easier, attribution gets harder</title><description>2015-04-09 09:48:49 - Help Net Security : Threat actors are gaining capabilities through the adoption of cutting-edge tools instead of technical expertise, according to Websense Redirect chains, code recycling and a host of other techniques  </description><link>http://www.secuobs.com/revue/news/566622.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/566622.shtml</guid></item>
<item><title> IoT devices facilitate robbery, stalking and cybercrime</title><description>2015-04-08 10:32:52 - Help Net Security : The foundation of the Internet of Things  IoT    the devices themselves plus their associated mobile applications and cloud services   are often not designed with data security or privacy in mind, put </description><link>http://www.secuobs.com/revue/news/566445.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/566445.shtml</guid></item>
<item><title> Week in review  Security tips for DevOps, and how security pros deal with cybercrime extortion</title><description>2015-04-07 07:49:25 - Help Net Security : Here's an overview of some of last week's most interesting news, reviews and articles  10 practical security tips for DevOps More organizations are embracing DevOps and automation to realize com </description><link>http://www.secuobs.com/revue/news/566266.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/566266.shtml</guid></item>
<item><title> How security pros deal with cybercrime extortion</title><description>2015-03-31 16:27:16 - Help Net Security : 1 in 3 security professionals recommend negotiating with cybercriminals for the return of stolen data or the restoration of encrypted files, according to ThreatTrack Security While 70pourcents of responde </description><link>http://www.secuobs.com/revue/news/565504.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/565504.shtml</guid></item>
<item><title>Cybercrime Is Now More Profitable Than The Drug Trade</title><description>2015-03-31 07:37:51 - Security Bloggers Network :    Tripwire recently hosted a webcast entitled,  PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan  Real World Cyber Attacks and Protecting Credit Card Data  For our presentation, Brian Honan  CISM, CGEIT, CRISC , an information systems and cybersecurity specialist and a member of the Advisory Group on Internet Security to Europol s Cyber Crime Centre   Read More The post Cybercrime Is Now More Profitable Than The Drug Trade appeared first on The State of Security  IMAGE  </description><link>http://www.secuobs.com/revue/news/565447.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/565447.shtml</guid></item>
<item><title> Sylvain Defix, NTT Com Security France   Qui dit cybercrime dit cyber-assurance</title><description>2015-03-30 19:30:07 - Global Security Mag Online : Si la technologie a indéniablement transformé la gestion d'une entreprise et les interactions avec les clients, elle ouvre aussi la porte aux cyberattaques Selon une étude récente1, un simple champ de formulaire Web non protégé serait à l'origine d'un incident de sécurité dont la neutralisation aurait coûté 196 000  à une entreprise Une dépense qui aurait pu être facilement évitée si des techniques de protection avaient été mises en oeuvre Les pirates découvrent sans cesse de nouvelles failles de sécurité    - Risk Management </description><link>http://www.secuobs.com/revue/news/565403.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/565403.shtml</guid></item>
<item><title>Wayland Attacked by Cybercrime</title><description>2015-03-12 21:43:37 - Computer Security News :    Wayland police began investigating a computer crime and attempted fraud on Friday, Jan 30, and found that someone had gotten access to one of the town's bank accounts Malware on the town computer was used to gain  pertinent bank account information and codes,  according to Wayland police </description><link>http://www.secuobs.com/revue/news/563239.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/563239.shtml</guid></item>
<item><title>Layered Protection   Thirteen Days of Cybercrime</title><description>2015-03-06 23:32:28 - Security Bloggers Network : Read our whitepaper to see why your business needs multiple layers of protection to stay secure read more </description><link>http://www.secuobs.com/revue/news/562475.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/562475.shtml</guid></item>
<item><title>Learn about the changing face of cybercrime at e-Crime Congress, London, on Tuesday 10 March</title><description>2015-03-06 16:10:35 - Security Bloggers Network : See me speak about the  changing face of cybercrime  at the imminent e-Crime Congress in London Discover how internet crime has changed and - most interestingly - how who is behind it has changed too Learn how it's time to adjust and adapt your resp </description><link>http://www.secuobs.com/revue/news/562419.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/562419.shtml</guid></item>
<item><title>Ramnit cybercrime group hit by major law enforcement operation</title><description>2015-02-25 12:09:54 - Symantec Connect   Security Response   Billets : Assisted by Symantec and other industry partners, Europol has seized large amount of gang s infrastructure  IMAGE  Read More </description><link>http://www.secuobs.com/revue/news/561064.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/561064.shtml</guid></item>
<item><title>Carbanak   Multi-million dollar cybercrime gang focuses on banks rather than their customers</title><description>2015-02-16 18:02:36 - Symantec Connect   Security Response   Billets : The activities of the financial crime group have been tracked by Symantec for some time  IMAGE  Read More </description><link>http://www.secuobs.com/revue/news/559750.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/559750.shtml</guid></item>
<item><title>Cybercrime Ring Steals up to  1 Billion From Banks</title><description>2015-02-15 21:31:08 - Computer Security News :    A multinational gang of cybercriminals has stolen as much as  1 billion from as many as 100 financial institutions around the world in about two years, Russian computer security company Kaspersky Lab said on Saturday The company said it was working with Interpol, Europol and authorities from different countries to try to uncover more details on what is being called an unprecedented robbery </description><link>http://www.secuobs.com/revue/news/559649.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/559649.shtml</guid></item>
<item><title>Facebook Aims To Fight Cybercrime</title><description>2015-02-15 18:09:26 - Computer Security News :    Social media giant Facebook is aiming to take a bite out of cybercrime To that end, it has built another social network </description><link>http://www.secuobs.com/revue/news/559635.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/559635.shtml</guid></item>
<item><title>Cybercrime costs hit S 2 billion, but insurance adoption low</title><description>2015-02-09 20:54:25 - Computer Security News :    SINGAPORE  Companies in the Republic lost nearly S 2 billion last year due to data loss or unplanned downtime arising from illicit cyber activities - a fact not lost on insurance companies, which are beginning to offer protection to firms here as cyberattacks become increasingly sophisticated But as the industry gears up to offer coverage, which can include the cost of investigative work and rectification, market watchers say a general lack of awareness, underestimation of the risks of security threats and few precedents for designing and setting premiums are impediments </description><link>http://www.secuobs.com/revue/news/558743.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/558743.shtml</guid></item>
<item><title>Cybersecurity Expert David Kennedy of TrustedSec to Speak at ISSA-LA Seventh Annual Information Security Summit on Cybercrime Solutions   June 4</title><description>2015-02-07 04:02:43 - Security Bloggers Network :    Cybersecurity Expert David Kennedy of TrustedSec to Speak at ISSA-LA Seventh Annual Information Security Summit on Cybercrime Solutions - June 4 The post Cybersecurity Expert David Kennedy of TrustedSec to Speak at ISSA-LA Seventh Annual Information Security Summit on Cybercrime Solutions   June 4 appeared first on SecurityOrbcom </description><link>http://www.secuobs.com/revue/news/558457.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/558457.shtml</guid></item>
<item><title>Investment firms become cybercrime focus, highlights insurance need</title><description>2015-02-04 14:29:24 - Security Bloggers Network : Fraud is costing investors dearly at a time when cyber insurance is beginning to matter </description><link>http://www.secuobs.com/revue/news/558004.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/558004.shtml</guid></item>
<item><title>DDoS on the rise  the AK-47 of cybercrime</title><description>2015-01-23 22:17:18 - Security Bloggers Network :   IMAGE  AK-47 s have been around forever The most popular and widely used assault rifles in the world Not because they do anything advanced, but because they re cheap, reliable, and are so easy to use that untrained fighters can wield them effectively Much like the AK-47, DDoS attacks are not highly sophisticated, expensive, or the most  sexy  of cybercrime but they can be very effective As 2014 came to a close, it was a record year for distributed-denial-of-service  DDoS  attacks, with increases in volume and sophistication level Researchers anticipate the upwards trend of attacks will only continue in 2015, with many businesses still underprepared to fight back against an attack High-profile targets such as banks, ecommerce and online storefront vendors, online gaming platforms, governments and educational establishments are generally the unfortunate marks for DDoS exploitation However, any organization that relies on the Internet to conduct business is a potential target of attack so it is critical to implement DDoS mitigation tactics and incident response plans prior to an event </description><link>http://www.secuobs.com/revue/news/556354.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/556354.shtml</guid></item>
<item><title>Competition at an All-Time High in Lucrative Hacking   Cybercrime-as-a-service Markets</title><description>2015-01-23 18:37:04 - Security Bloggers Network :    While black market websites have long since offered a wide array of services aimed at the aspiring cybercriminal, recent attention has been given to a new breed of websites that offer hacking servicesread more The post Competition at an All-Time High in Lucrative Hacking   Cybercrime-as-a-service Markets appeared first on Webroot Threat Blog </description><link>http://www.secuobs.com/revue/news/556336.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/556336.shtml</guid></item>
<item><title>Webinar  Cybercrime-as-a-Service Evolves  How community financial institutions can protect account holders</title><description>2015-01-22 17:30:01 - Security Bloggers Network : PhishLabs will be hosting a webinar for community financial institutions on the  Evolution of Cybercrime-as-a-Service  How to protect account holders  As competition continues to rise in the underground marketplace, illicit operations and crews are evolving and expanding services to offer  Cybercrime-as-a-Service   CaaS  In 2014, CaaS became more common as cybercriminals stole from the playbook of legitimate   </description><link>http://www.secuobs.com/revue/news/556089.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/556089.shtml</guid></item>
<item><title>Cybercrime deterrence  6 important steps</title><description>2015-01-20 09:16:16 - Security Bloggers Network : Cybercrime  there's too much of it, and we need to do more to deter it With the President of the United States now making frequent references to  doing more about cybercrime  now is a good time to look at what steps must be taken The post Cybercrime </description><link>http://www.secuobs.com/revue/news/555444.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/555444.shtml</guid></item>
<item><title>'Blackhat' taps into a timely topic  Cybercrime</title><description>2015-01-15 07:44:59 - Computer Security News :    'Blackhat' taps into a timely topic  Cybercrime Michael Mann leaned on former hackers for authenticity Check out this story on USATODAYcom  http usatly 1ILp7dA Two agencies, American and Chinese combine their powers to capture a cyber criminial who is seeking to bring down the international banking network </description><link>http://www.secuobs.com/revue/news/554758.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/554758.shtml</guid></item>
<item><title>Spamhaus Statistics of Cybercrime</title><description>2015-01-12 18:23:37 - Security Bloggers Network : Spamhaus has released research targeting cyber-crime within the 2014 calendar year Evidence of increased pernicious botnet behavior attributed to these master slave systems is the research report's message </description><link>http://www.secuobs.com/revue/news/554176.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/554176.shtml</guid></item>
<item><title>Young IT Professionals, Cybercrime, Script Kiddies   CyberWarriors, OH MY </title><description>2015-01-09 09:50:34 - MSI   State of Security :    Recently I came across a couple of articles that both centered on the potential roles that young people entering into the IT Security field may face Some of them, for example, may be lured away from legitimate IT security jobs   Continue reading   The post Young IT Professionals, Cybercrime, Script Kiddies   CyberWarriors, OH MY  appeared first on MSI   State of Security </description><link>http://www.secuobs.com/revue/news/553765.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/553765.shtml</guid></item>
<item><title>FBI recruiting 'ethical hackers' to investigate cybercrime</title><description>2015-01-05 19:49:33 - Computer Security News :    Are you a skilled hacker looking for work more meaningful then taking down the Playstation Network  Do you have the skill to hack into banks but a moral compass that prevents you from doing so  Well, the FBI wants your help  Cyber, it permeates every aspect of what we do, whether it's counter terrorism, criminal investigations or traditional cyber attacks as we have seen in the recent past </description><link>http://www.secuobs.com/revue/news/553125.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/553125.shtml</guid></item>
<item><title>Take a Bite out of Cybercrime  The Impact of Data Breaches in Critical Industries</title><description>2015-01-05 17:25:24 - Blog : Cybercrime is on the rise, enabled by the ever-expanding application portfolio of enterprises everywhere, but the limited expasion of the IT Security team Many firms still lack adequate security measures or employee security training and remain unaware of any vulnerabilities these malevolent </description><link>http://www.secuobs.com/revue/news/553092.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/553092.shtml</guid></item>
<item><title>Hackers Unmasked  The Face Of Cybercrime Has Finally Been Revealed</title><description>2014-12-26 02:25:34 - Secure Thoughts :    From the massive release of private celebrity photos  which the internet dubbed  The Fappening  to the North Korean Sony attacks, 2014 was a year of notable  hacking  activity Events like these have created a call to action for increased security measures across the board, especially as data protection continues to The post Hackers Unmasked  The Face Of Cybercrime Has Finally Been Revealed appeared first on Secure Thoughts </description><link>http://www.secuobs.com/revue/news/551906.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/551906.shtml</guid></item>
<item><title>Cybercrime group steals millions from Russian banks, targets US and European retailers</title><description>2014-12-23 07:22:15 - Computer Security News :    A sophisticated group of cybercriminals has stolen more than  25 million by hacking into the infrastructure of numerous financial institutions in Russia and former Soviet Union countries, as well as into point-of-sale systems belonging to US and European retailers Researchers from Russian cybercrime investigations firm Group-IB and Dutch security firm Fox-IT have dubbed the cybercriminal group Anunak, after the primary malware program in its toolset </description><link>http://www.secuobs.com/revue/news/551534.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/551534.shtml</guid></item>
<item><title> Cybercrime will continue to evolve</title><description>2014-12-22 07:02:41 - Help Net Security : The breadth and depth of the data breaches seen by the world in 2014 was shocking   spanning major banks, e-commerce giants, healthcare giants, casinos and others, exposing hundreds of millions of use </description><link>http://www.secuobs.com/revue/news/551369.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/551369.shtml</guid></item>
<item><title>Cybercrime Trends   Predictions for 2015</title><description>2014-12-18 16:54:23 - Security Bloggers Network :    As regular readers will know, every year we publish our predictions on cybercrime attacks for the year ahead Well, our South American research team has spent the last few weeks putting together our predictions for 2015 The post Cybercrime Trends   Predictions for 2015 appeared first on We Live Security </description><link>http://www.secuobs.com/revue/news/550885.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/550885.shtml</guid></item>
<item><title>FBI outlines proposals for dealing with cybercrime to Congress</title><description>2014-12-12 19:41:00 - Security Bloggers Network : Joseph Demarest, assistant director at the FBI, has been testifying on the threats of cybercrime to a Senate Committee on Banking, Housing and Urban Affairs, and Network World reports that the agency has three specific recommendations of how Congress c </description><link>http://www.secuobs.com/revue/news/549963.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/549963.shtml</guid></item>
<item><title>Russian Cybercrime and the New Threat Landscape  Webinar Recap</title><description>2014-12-10 16:38:50 - Security Bloggers Network :    Recently, our in-house expert on Russian cybercrime hosted a webinar for Cyveillance customers on the ecology and tactics of Russian hackers, and the rising tide of cyber-attacks originating from Eastern European countries The webinar examined the evolution of the Russian hacker  organizational aspects of cybercrime gangs  day-to-day operations of Russian underground marketplaces  as well   The post Russian Cybercrime and the New Threat Landscape  Webinar Recap appeared first on Cyveillance Blog - The Cyber Intelligence Blog </description><link>http://www.secuobs.com/revue/news/549457.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/549457.shtml</guid></item>
<item><title>Asset Prioritization Is Essential for Controlling the Costs of Cybercrime</title><description>2014-12-08 21:26:56 - Security Bloggers Network :    Cybercrime risks are increasing, concern fueled by recent high-profile attacks is growing, and organizations are increasingly worried about the financial impact of it all And while cybercrime is costing businesses dearly, not enough of them have established effective security frameworks that center on the actual risks to the business according to the assets they have in place  The post Asset Prioritization Is Essential for Controlling the Costs of Cybercrime appeared first on Speaking of Security - The RSA Blog and Podcast </description><link>http://www.secuobs.com/revue/news/549029.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/549029.shtml</guid></item>
<item><title>DOJ Launches New Cybercrime Unit, Claims Privacy Top Priority</title><description>2014-12-05 19:45:16 - Slashdot  Your Rights Online : msm1267 writes  Leslie Caldwell, assistant attorney general in the criminal division of the Department of Justice, announced on Thursday the creation of a new Cybercrime Unit, tasked with enhancing public-private security efforts A large part of the Cybersecurity Unit's mission will be to quell the growing distrust many Americans have toward law enforcement's high-tech investigative techniques  Even if that lack of trust, as Caldwell claimed, is based largely on misinformation about the technical abilities of the law enforcement tools and the manners in which they are used   In fact, almost every decision we make during an investigation requires us to weigh the effect on privacy and civil liberties, and we take that responsibility seriously,  Caldwell said  Privacy concerns are not just tacked onto our investigations, they are baked in   IMAGE   IMAGE  Share on Google  Read more of this story at Slashdot  IMAGE   IMAGE   IMAGE   IMAGE   IMAGE IMAGE  </description><link>http://www.secuobs.com/revue/news/548724.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/548724.shtml</guid></item>
<item><title>CyberCrime Octopus  DG1 3021 </title><description>2014-12-03 14:51:49 -   Bluetouff's blog : La lutte contre la cybercriminalité ne se met pas en place qu au niveau national avec les différents outils que nous connaissons aujourd hui ou avec la Loi sur la Programmation Militaire  relative à la cyberdéfense et à la   prévention   des risques  Au niveau européen, ça bouge également Nous connaissions déjà INDECT visant à mettre en place   </description><link>http://www.secuobs.com/revue/news/548223.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/548223.shtml</guid></item>
<item><title>Three Members Of New York Cell Of International Cybercrime Organization Sentenced For Roles In  45 Million Cyberattack</title><description>2014-12-02 15:53:49 - Office of Inadequate Security : On November 25 in federal court in Brooklyn, New York, Elvis Rafael Rodriguez, age 25 of Yonkers, was sentenced to 34 </description><link>http://www.secuobs.com/revue/news/548030.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/548030.shtml</guid></item>
<item><title>DroidJack RAT  A tale of how budding entrepreneurism can turn to cybercrime</title><description>2014-11-25 14:33:21 - Symantec Connect   Security Response   Billets :  See how AndroidSandorat, a multi-featured mobile crimeware tool, began life as a legitimate Android app Twitter Card Style  summary Small-scale mobile app software entrepreneurship has been described as the cottage industry of the 21st century It allows talented software developers to apply their skills to create new and innovative mobile apps, with the hope of becoming the next big thing and, perhaps, even attaining the trappings of wealth associated with success However, with over 1 million apps available for download on the Google Play Store, for every success story there are countless apps that fail to deliver While I was researching a new Android remote administration tool  RAT  known as DroidJack  detected by Symantec as AndroidSandorat , it soon became apparent that its authors had actually started off as Android app developers In their own words, they were  budding entrepreneurs trying to develop and apply skills that we have gained  With limited success of their legitimate app on the Google Play Store, they soon turned their skills to creating and selling an Android crimeware tool, known as SandroRAT, on a hacker forum In August 2014, this same tool was reported in the media to have been used in cybercriminal activity targeting Polish banking users through a phishing email This tool has since evolved into DroidJack RAT and is now being openly sold on its own website at a cost of US 210 for a lifetime package Fig1DJpng Figure 1 DroidJack website logo Evolution On April 26, 2013, the Sandroid RAT was released on the Google Play Store The authors described the app as being a free tool that lets users control their PC without advertisements Fig2_0png Figure 2 DroidJack website logo On December 29, 2013, there was an announcement on a hacker forum of a new project called SandroRAT The forum poster linked the project back to the Sandroid app available on the Google Play Store, referring to SandroRAT as being a kind of  vice-versa  to the Sandroid app, while also commenting on how it remains hidden on the phone Fig3png Figure 3 SandroRAT control panel On June 27, 2014, there was an announcement from the same poster on the same hacker forum of a next-generation Android RAT, known as DroidJack Fig4png Figure 4 DroidJack control panel Capabilities DroidJack has similar features to other Android RATs, such as AndroRAT and Dendroid Some of the more than 50 features on offer include the following    No root access required   Bind the DroidJack server APK with any other game or app   Install any APK and update server   Copy files from device to computer   View all messages on the device   Listen to call conversations made on the device   List all the contacts on the device   Listen live or record audio from the device's microphone   Gain control of the camera on the device   Get IMEI number, Wi-Fi MAC address, and cellphone carrier details   Get the device s last GPS location check in and show it in Google Maps Fig5png Figure 5 Screenshot from DroidJack marketing video, which shows GPS pinpointer location feature using Google Maps Legality Law enforcement is getting more aggressive in its stance against the creation and use of RATs In May 2014, the FBI, Europol, and several other law enforcement agencies arrested dozens of individuals suspected of cybercriminal activity centered on Blackshades  detected as W32Shadesrat , a RAT for personal computers that was sold on a dedicated website Moreover, the recent arrest and indictment of a man in Los Angeles for allegedly conspiring to advertise and sell StealthGenie  AndroidStealthgenie , a mobile application similar to DroidJack, shows that law enforcement is continuing its campaign against any technology designed to invade an individual s privacy In an attempt to distance themselves from any responsibility for illegal activity, the authors of DroidJack have included a disclaimer in their marketing material Similar disclaimers have been used in the past by other malware authors, such as the Mariposa botnet author, who unsuccessfully claimed on his website that the software was only for educational purposes Whether the authors of DroidJack truly believe that this disclaimer absolves them of any responsibility is irrelevant, as naivete is not a defense in law Fig6png Figure 6 Disclaimer used in DroidJack marketing Attribution If the author or authors of DroidJack meant to cover up their tracks, they have not done a good job Some simple investigations lead back to the names and telephone numbers of several individuals initially involved in the creation of Sandroid, supposedly based out of Chennai in India However, whether all of the initial developers are still involved in the creation of DroidJack is not clear Their marketing video for DroidJack also clearly shows the GPS pinpointer locator function homing in on a location in India If the authors of DroidJack are truly based out of India, cyber law in India indicates that the creation of such software would be seen as an offense Protection summary Symantec offers the following protection against DroidJack Antivirus   AndroidSandorat   AndroidMalapp  prior to the release of Sandorat  </description><link>http://www.secuobs.com/revue/news/547171.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/547171.shtml</guid></item>
<item><title>Book Review  Spam Nation  The Inside Story of Organized Cybercrime   from Global Epidemic to Your Front Door  2014  by Brian Krebs</title><description>2014-11-24 15:55:17 - Security Bloggers Network :  IMAGE Executive Summary In Spam Nation, Brian Krebs covers a key portion of our cyber security and cyber crime history  2007 2013, that period when we started to learn about the Russian Business Network, bulletproof-hosting providers, fast-flux obfuscation, criminal best business practices, underground cyber crime forums, and strange-sounding botnet names like Conficker, Rustock, Storm, and Waledac This period just happens to coincide with Krebs s rise in popularity as one of the leading cyber security journalists in the industry His relationship with two competitive pharmaceutical spammers Pavel Vrublevsky and Dimitry Nechvolod is a big bag of crazy and is the key storyline throughout the book The competition between Vrublevsky and Nechvolod escalated into something that Krebs calls the Pharma Wars and Krebs gives us a bird s-eye view into the details of that escalation that eventually destroyed both men and the industry they helped to create Krebs s weird symbiotic relationship with Vrublevsky is worth the read by itself Spam Nation is definitely a cyber security canon candidate, and you should have read this by now Introduction I have been a fan of Brian Krebs for many years His blog, Krebs on Security, has been a mainstay of my recurring reading list since he started it in 2010 and even before when he was writing for The Washington Post Since he struck out on his own, he has carved out a new kind of journalism that many reporters are watching to see how they might duplicate it themselves as journalism transitions from dead-tree printing to new media Krebs s beat is cyber security, and he is the leading journalistic authority on the underbelly of cyber crime Spam Nation is a retelling  with more detail and more color of some of the stories he covered from 2007 until about 2013 on a very specific sub-element of the cyber crime industry called pharmaceutical spam Many security practitioners will hear the phrase  pharmaceutical spam  and immediately start to nod off Of all the problems they encounter on a daily basis, pharmaceutical spam is pretty low on the priority list While that may be true, this subset of cyber crime is responsible for starting and maturing many of the trappings that we associate with cyber crime in general  botnet engines, fast-flux obfuscation, spamming, underground forums, cyber crime markets, good service as a distinguisher of criminal support services, and bulletproof-hosting providers The Story The story really begins with Krebs s weird symbiotic relationship with Vrublevsky  aka RedEye and Despduck  Vrublevsky was a Russian businessman and cofounder and former CEO of ChronoPay, the infamous credit card processing company that initially got started in the rogue anti-virus industry I think it is safe to say that in his heyday, Vrublevsky was a bit of an extrovert He followed Krebs s blog religiously and would instigate long conversations with Krebs on stories that were fantastical, true, and everything in between Vrublevsky would feed Krebs half-truths about what was going on in the industry and left it to Krebs to sort it out Vrublevsky s downfall was his deteriorating relationship with his former partner, Dimitry Nechvolod  aka Gugle  Vrublevsky and Nechvolod founded ChronoPay together in 2003, but by 2006, Nechvolod had left the company to pursue his own interests He started two pharmacy spam operations called GlavMed and SpamIT Because of the competition between these two men, the situation escalated out of control to something that Krebs calls the Pharma Wars, which ultimately scuttled the entire pharmaceutical spam industry, not just Vrublevsky and Nechvolod s operations, but everybody else s too Krebs s main sources of information for this book came from leaked customer and operational databases from these two men Although Vrublevsky and Nechvolod never admitted it, they both stole the other s data and leaked it to Krebs Krebs had many conversations with both Vrublevsky and Nechvolod about their side of the story, and Krebs even traveled to Moscow to interview Vrublevsky personally From these conversations and other research done by Krebs, we get an inside view of how cyber crime operates in the real world Krebs set himself seven research questions    Who is buying the stuff advertised in spam and why    Are the drugs real or fake    Who profits    Why does the legitimate pharmaceutical industry seem powerless to stop it    Why is it easy to pay for the drugs with credit cards    Do customers have their credit card accounts hacked after buying    What can consumers, policy makers, and law enforcement do  about this cybercrime  For the most part, he answers all these questions I will not spill the answers here, but I will tell you that I was surprised by every single one I thought I knew this stuff, but Krebs provides the insight and research to make you re-evaluate what you think you know about illegal pharmaceutical spam operations Spam Nation is about the Brian Krebs s story too Traditional journalists reading this book are going to hate the fact the he plays a key role in most everything that he talks about in this book His original reporting on bulletproof-hosting providers operating in the US and elsewhere the Russian Business Network  RBN , Atrivo, and McColo became that catalyst that eventually got them shut down This got him noticed by Vrublevsky and started that weird relationship that ultimately led to Krebs receiving the databases from Vrublevsky and Nechvolod It also led him to leave The Washington Post and to start his Krebs on Security blog In the background, Krebs introduces us to the key players involved in the development and operations of some of the most infamous botnets that have hit the Internet community in recent history    Conficker worm  author  Severa  infected 9-15 million computers    Cutwail botnet  authors  Dimitry Nechvolod  Gugle  and Igor Vishnevsky  125,000 infected computers  spewed 16 billion spam messages a day    Grum botnet  author  GeRA  spewed 18 billion e-mails a day    Festi botnet  operators  Artimovich brothers  delivered one-third of the total amount of worldwide spam    Rustock botnet  author  COSMA  infected 150,000 PCs  spewed 30 billion spam messages a day    Storm botnet  author  Severa    Waledac botnet  author  Severa  spewed 15 billion junk e-mails a day  From my reading, Krebs s unintentional hero of his story is Microsoft While Vrublevsky and Nechvolod were tearing each other apart and Krebs was trying to sift through what was true and what was not, Microsoft and other commercial, academic, and government organizations were quietly dismantling the infrastructure that these and other illicit operations depended on    June 2009  15,000 illicit websites go dark at 3FN after the Federal Trade Commission convinced a northern California judge that 3FN was a black-hat service provider NASA did the forensics work   November 2009  FireEye takes down the Mega-D botnet   January 2010  Neustar takes control of the Lethic spam botnet   March 2010  Microsoft takes down the Waledac botnet   October 2010  Armenian authorities take down the Bredolab botnet   March 2011  Microsoft takes down the Rustock botnet   July 2011  Microsoft offers a  250,000 reward for information leading to the arrest and conviction of the Rustock botmaster   July 2012  FireEye and Spamhaus take down the Grum botnet   July 2013  Microsoft and the FBI take down 1,400 botnets using the Citadel malware to control infected PCs   December 2013  Microsoft and the FBI take down the ZeroAccess botnet   June 2014  The FBI takes down of the Gameover Zeus botnet One takedown masterstroke came out of academia George Mason University, the International Computer Science Institute, the University of California, San Diego, and Microsoft determined that 95 percent of all spam credit card processing was handled by three financial firms  one in Azerbaijan, one in Denmark, and one in Nevis  West Indies  They also pointed out that these financial firms were in violation of Visa s own Global Brand Protection Program contract that required fines of  25,000 for transactions supporting the sale of Viagra, Cialis, and Levitra Once Visa started levying fines, the financial firms stopped processing the transactions The beauty of this takedown was that this was not a legal maneuver through the courts and law enforcement It merely encouraged Visa to follow its own policy Cyber Crime Business Operations For me, one of the most enjoyable parts of Spam Nation is the insight on how these criminal organizations operate For example, Krebs highlights why pharmaceutical operations have great customer support  they want to avoid the penalty fees associated with a transaction when a buyer of illicit pills charges them with fraud These are called chargebacks, and pharmaceutical customer support operations avoid them like the plague These support operations require teams of software developers and technical support staff to be available 24 7 Pharmaceutical operations have mature anti-fraud measures equivalent to any legitimate bank s anti-fraud measures because they need to keep law enforcement and security researchers out of their business Most spammers do not make a lot of money The top five do, but not everybody else Krebs points out that it takes a multibillion dollar security industry to defend against a collection of criminals who are making a living wage In terms of botnet management, operators rent out top-earning botnets to other operators who do not have the skill to build a botnet themselves Renters purchase installs and seed a prearranged number of bots with an additional malicious program that sends spam for the affiliate They pay the rent by diverting a portion of their commissions on each pill sale from spam Sometimes, that commission is as high as 50 percent That is why the small-timers do not make any money Operators launder their money in a process called factoring They map their client transactions into accounts on behalf of previously established shell companies They tell the banks that the shell companies are the true customers Then the operators pay the clients out of their own pockets Russian law allows FSB agents  Federal Security Service, the successor to the Soviet Union s KGB , while remaining in the service, to be assigned to work at enterprises and organizations at the consent of their directors Twenty percent of FSB officers are engaged in this protection business called  Krusha  in Russian, which means  roof  and pharmaceutical spam operations use them as much as possible Partnerships, called partnerkas, between spammers and dodgy advertisers that act as an intermediary for potential sponsors are essential In this way, sponsors keep their distance from the illicit aspects of the spam business and can unplug from one partnerka in favor of another whenever they want Some refer to this as organized crime  think The Godfather , but it is more like a loosely affiliated network of independent operators With all of these best business practices, you can see why the operators do not see themselves as criminals They are just businesspeople trying to run a business The Tech Cyber crime runs on technology In the pharmaceutical spam business, some tech is unique, and other tech is shared with other kinds of cyber crime operations Unique to pharmaceutical spam is a technique called black search engine optimization  Black SEO  Pharmaceutical spammers hack legitimate websites and insert hidden pages  IFrames  with loads of pharmaceutical websites links The more links that the common search engines like Google and Bing index, the higher the pharmaceutical sites get in the priority list when normal users search for pills online Also unique to the pharmaceutical spam business is a good spam ecosystem It must have the ability to keep track of how many e-mails the system delivered and how many recipients clicked the link It must scrub e-mail addresses that are no longer active or are obvious decoys and harvest new e-mail addresses for future operations Not unique to pharmaceutical spam are the forums Forums are the glue that allows the loosely affiliated network of independent operators to communicate with each other Forums are a place that allows newbies an opportunity to establish a reputation and lowers the barriers to entry for a life of cyber crime There are forums for every language, but most are in English Members enforce a strict code of ethics so that members who are caught cheating other members are quickly banned Social networking rankings give members a way to evaluate potential partners A single negative post may cost an individual thousands of dollars Because of that, most amicably resolve issues Sometimes newbies get labeled as a  deer,  members who unintentionally break one of the forum s rules More-serious infractions might find a member in the blacklist subforum defending himself or herself from fraud allegations New forums start all the time, but some have been in existence for more than a decade, indicating process maturity for self-policing, networking, and rapid information sharing New forums allow open registration, but mature forums set up various hurdles for membership that are designed to screen out law enforcement and hangers-on Most have sub-rooms for specialization such as the following    Spam   Cyber banking fraud   Bank account cash-out schemes   Malicious software development   ID theft   Credit card fraud   Confidence scams   Black SEO Forums have many members  tens of thousands in some , but they exist to make money for the administrators Admins offer additional services to improve the user experience They offer escrow services a small percentage of the transaction cost held until both sides agree that the other held up its end of the bargain and stickies ads that stay at the top of their sub-forums that range in price from  100 to  1,000 per month Conclusion In Spam Nation, Brian Krebs covers a key portion of our cyber security and cyber crime history  2007  2013, that period when we started to learn about the Russian Business Network, bulletproof-hosting providers, fast-flux obfuscation, criminal best business practices, underground cyber crime forums, and strange-sounding botnet names like Conficker, Cutwail, Grum, Festi, Rustock, Storm, and Waledac This period just happens to coincide with Krebs s rise in popularity as one of the leading cyber security journalists in the industry His story, and the story of two competitive pharmaceutical spammers who eventually destroyed the lucrative moneymaking scheme for all players, is a fascinating read It is definitely a cyber security canon candidate, and you should have read this by now Sources  Spam Nation  The Inside Story of Organized Cybercrime - from Global Epidemic to Your Front Door,  by Brian Krebs, published by Brilliance Audio, 18 November 2014, last visited 13 November 2014,https wwwgoodreadscom book show 22839130-spam-nation ac 1 References  Blue Security folds under spammer's wrath,  by Robert Lemos, Security Focus, 17 May 2006, last visited 13 November 2014,http wwwsecurityfocuscom news 11392  Click Trajectories  End-to-End Analysis of the Spam Value Chain,  by Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Mark Felegyhazi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M Voelker, and Stefan Savage, last visited 13 November 2014,http csewebucsdedu savage papers Oakland11pdf  Experts Warn of New Windows Shortcut Flaw,  by Brian Krebs, Krebs on Security, 10 July 2010, last visited 13 November 2014http krebsonsecuritycom 2010 07 experts-warn-of-new-windows-shortcut-flaw   Krebs on Security  In-depth security news and investigation,  by Brian Krebs, last visited 14 November 2014,http krebsonsecuritycom   PharmaLeaks  Understanding the Business of Online Pharmaceutical Affiliate Programs,  by Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey M Voelker, Stefan Savage, and Kirill Levchenko, Usenix, August 2012, last visited 13 November 2014,http wwwcsgmuedu mccoy papers pharmaleakspdf andhttps wwwusenixorg conference usenixsecurity12 technical-sessions presentation mccoy  Russian Business Network Study,  by David Bizeul, 11 November 2007, last visited 12 November 2014,http wwwbizeulorg files RBN_studypdf  Shadowy Russian Firm Seen as Conduit for Cybercrime,  by Brian Krebs, The Washington Post, 13 October 2007, last visited 12 November 2014, http wwwwashingtonpostcom wp-dyn content article 2007 10 12 AR2007101202461html  The Partnerka   What Is It, and Why Should You Care  by Dmitry Samosseiko, Sophos, Virus Bulletin, September 2009, last visited 13 November 2014,http wwwsophoscom medialibrary PDFs technicalpourcents20papers samosseikovb2009paperpdf  The Sleazy Life and Nasty Death of Russia s Spam King,  by Brett Forrest, Wired Magazine, August 2006, last visited 13 November 2014,http archivewiredcom wired archive 1408 spamkinghtml  The Underground Economy of Spam  A Botmaster s Perspective of Coordinating Large-Scale Spam Campaigns,  by Brett Stone-Gross, Thorsten Holz, Gianluca Stringhini, and Giovanni Vigna, last visited 13 November 2014,https wwwiseclaborg papers cutwail-LEET11pdf  Top Spam Botnets Exposed,  by Joe Stewart, SecureWorks, 8 April 2008, last visited 13 November 2014,http wwwsecureworkscom cyber-threat-intelligence threats topbotnets IMAGE  </description><link>http://www.secuobs.com/revue/news/546978.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/546978.shtml</guid></item>
<item><title>NYC man gets prison for role in cybercrime ring</title><description>2014-11-22 09:48:06 - Computer Security News :    A New York City man was sentenced Friday to more than three years in prison for his role in an international cybercrime ring that prosecutors say hacked into the computers of more than a dozen financial institutions and the US military's payroll service Richard Gundersen received a 41-month prison term and was ordered to pay  88 million in restitution </description><link>http://www.secuobs.com/revue/news/546769.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/546769.shtml</guid></item>
<item><title>McAfee et Europol s'associent pour combattre le cybercrime </title><description>2014-11-21 15:19:32 - Global Security Mag Online : McAfee, filiale d'Intel Security, et le centre de cybercriminalité européen d'Europol  EC3 , ont signé un protocole d'accord qui associe l'expertise d'Intel Security aux moyens judiciaires de l'EC3 afin de lutter contre la cybercriminalité Ensemble, les expertises et les ressources d'Intel Security et d'EC3 permettront d'assurer une défense accrue contre la menace croissante de la cybercriminalité Cet accord permet aux deux entités de mener des opérations conjointes pour faire face à des campagnes    - Business </description><link>http://www.secuobs.com/revue/news/546663.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/546663.shtml</guid></item>
<item><title>Intel to work with Europol on fighting cybercrime</title><description>2014-11-20 18:28:13 - Computer Security News :    An agreement between Intel's McAfee security branch and European law enforcement will allow the two to work on joint operations to fight cybercrime Intel, which acquired McAfee in 2010, said on Wednesday the memorandum of understanding with Europol's European Cybercrime Centre will allow for an exchange of technical information and non-operational data related to cybercrime </description><link>http://www.secuobs.com/revue/news/546491.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/546491.shtml</guid></item>
<item><title> 8 cybercrime trends that will shape IT</title><description>2014-11-20 10:32:23 - Help Net Security : Cybersecurity created headlines and headaches in 2014, with large-scale data breaches at retail chains, attacks on data stored in the cloud and massive vulnerabilities revealed in decades-old code  </description><link>http://www.secuobs.com/revue/news/546396.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/546396.shtml</guid></item>
<item><title>SSCC 174   Who says law enforcement isn t tackling cybercrime   PODCAST </title><description>2014-11-19 20:43:35 - Security Bloggers Network : Here's the latest epsiode of our weekly Chet Chat podcast, for your listening pleasure From a carder ring that got busted to a spamming system that ran amuck, let yourself be amused and educated at the same time IMAGE  </description><link>http://www.secuobs.com/revue/news/546289.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/546289.shtml</guid></item>
<item><title>NV  Member of Organized Cybercrime Ring Responsible for  50 Million in Online Identity Theft Sentenced to 115 Months in Prison</title><description>2014-11-13 20:16:32 - Office of Inadequate Security : A Georgia man who purchased stolen credit card data and other personal information through the identity theft and credit </description><link>http://www.secuobs.com/revue/news/545387.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/545387.shtml</guid></item>
<item><title> APWG launches global cybercrime reporting program</title><description>2014-10-27 19:05:14 - Help Net Security : The Anti-Phishing Working Group  APWG  announced the establishment of an open-access cybercrime reporting program to speed the collection and redistribution of cybercrime machine-event data to anti-vi </description><link>http://www.secuobs.com/revue/news/542774.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/542774.shtml</guid></item>
<item><title>Fighting Cybercrime Across Borders  Why Law Enforcement Collaboration Matters</title><description>2014-10-27 09:33:18 - TrendLabs Security Intelligence Blog : We ve frequently talked about how important it is for law enforcement and security companies to work together to stop cybercrime One particular reason to do so is because of the nature of cybercrime  simply put, it has no borders Perhaps more than any other type of crime, cybercrime respects no borders A cybercriminal in Russia   Post from  Trendlabs Security Intelligence Blog - by Trend Micro Fighting Cybercrime Across Borders  Why Law Enforcement Collaboration Matters </description><link>http://www.secuobs.com/revue/news/542704.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/542704.shtml</guid></item>
<item><title>Massachusetts Man Sentenced To 21 Months In Prison For Role In Multimillion-Dollar International Cybercrime Scheme</title><description>2014-10-25 16:48:30 - Office of Inadequate Security : There s an update to a case previously noted on this blog A member of an international cybercrime, identity theft and </description><link>http://www.secuobs.com/revue/news/542615.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/542615.shtml</guid></item>
<item><title>Man sentenced for part in global cybercrime ring</title><description>2014-10-18 12:27:08 - Computer Security News :    A Massachusetts man who was part of an international cybercrime ring that the government says hacked into the computers of more than a dozen financial institutions and the US military's payroll service was sentenced Friday to 2A1 2 years in prison Lamar Taylor, 38, of Salem, Massachusetts, was also ordered to pay restitution of  338,649 </description><link>http://www.secuobs.com/revue/news/541064.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/541064.shtml</guid></item>
<item><title>Report  Cybercrime costs US  127M a year</title><description>2014-10-17 17:40:40 - Ars Technica   Risk Assessment : The cost of attacks on large companies is up by 10 percent </description><link>http://www.secuobs.com/revue/news/540946.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/540946.shtml</guid></item>
<item><title>Cybercrime statistics offer a glimpse into the underworld</title><description>2014-10-16 20:51:46 - Security Bloggers Network : A crime-reporting survey in Canada has offered a unique insight into how cybercrime affects a large population - and an insight into a grim underworld dominated by fraud, violence and sexual abuse The post Cybercrime statistics offer a glimpse into t IMAGE  </description><link>http://www.secuobs.com/revue/news/540677.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/540677.shtml</guid></item>
<item><title>RSS  Cybercrime  The Next Entrepreneurial Growth Business </title><description>2014-10-16 08:06:13 - Tout sur la cybersociété  la cybersécurité  la cybercriminalité  la cyberdéfense  ... : Cyberspace is constantly evolving and presenting organizations with new opportunities, as the desire of businesses to quickly adopt new technologies, such as using the Internet to open new channels and adopting cloud services, provides vast opportunity But, it also brings unanticipated risks and inadvertent consequences that can have a potentially negative impact READ </description><link>http://www.secuobs.com/revue/news/540542.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/540542.shtml</guid></item>
<item><title>FBI director on threat of ISIS, cybercrime</title><description>2014-10-15 16:58:56 - Tout sur la cybersociété  la cybersécurité  la cybercriminalité  la cyberdéfense  ... : In his first major television interview, FBI Director James Comey speaks with Scott Pelley about the threat of Americans joining ISIS and the dangers posed by cybercrime and cyber espionage Lire </description><link>http://www.secuobs.com/revue/news/540248.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/540248.shtml</guid></item>
<item><title>Only 100 Cybercrime Brains Worldwide, Says Europol Boss</title><description>2014-10-11 18:18:13 - Slashdot  Your Rights Online : mrspoonsi writes There are only  around 100  cybercriminal kingpins behind global cybercrime, according to the head of Europol's Cybercrime Centre Speaking to the BBC, Troels Oerting said that law enforcers needed to target the  rather limited group of good programmers   We roughly know who they are If we can take them out of the equation then the rest will fall down,  he said  This is not a static number, it will increase unfortunately,  he said  We can still cope but the criminals have more resources and they do not have obstacles They are driven by greed and profit and they produce malware at a speed that we have difficulties catching up with  The biggest issue facing cybercrime fighters at the moment was the fact that it was borderless  Criminals no longer come to our countries, they commit their crimes from a distance and because of this I cannot use the normal tools to catch them  I have to work with countries I am not used to working with and that scares me a bit,  he said The majority of the cybercrime  kingpins  were located in the Russian-speaking world, he said  IMAGE   IMAGE  Share on Google  Read more of this story at Slashdot  IMAGE   IMAGE   IMAGE   IMAGE   IMAGE IMAGE IMAGE  </description><link>http://www.secuobs.com/revue/news/539684.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/539684.shtml</guid></item>
<item><title>Modern-Day Intrusion Detection  Of Needles, Haystacks, and Cybercrime</title><description>2014-10-07 18:11:59 - Security Bloggers Network : After a corporation discovers a data breach, there is a flurry of law enforcement activity From the FBI, Department of the Treasury, and Secret Service to state and local police, a cadre of law enforcement officials will be part of the investigation into how the data breach occurred, how detection technologies could have been more effective, and who was criminally responsible One of the hardest lessons learned from recent data breaches is that most organizations and law enforcement agencies sorely lack capabilities for detecting intrusions There are certainly many reasons for this, one IMAGE  </description><link>http://www.secuobs.com/revue/news/538968.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/538968.shtml</guid></item>
<item><title>Cybercrime Researchers  JPMorgan Hack Could Trigger Years of Fraud</title><description>2014-10-04 17:20:09 - Computer Security News :    The 83 million customer records that hackers stole from JPMorgan Chase   Co could fuel years of fraud, as criminals use the information to  phish  for customer passwords and ferret out other accounts that consumers may have, cybercrime researchers said </description><link>http://www.secuobs.com/revue/news/538549.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/538549.shtml</guid></item>
<item><title>Microsoft and FS-ISAC Announce Collaboration to Combat Cybercrime</title><description>2014-10-02 20:13:49 - Security Bloggers Network : The post Microsoft and FS-ISAC Announce Collaboration to Combat Cybercrime appeared first on The State of Security IMAGE  </description><link>http://www.secuobs.com/revue/news/538222.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/538222.shtml</guid></item>
<item><title>Commonwealth Cybercrime Initiative  Quick Guide </title><description>2014-09-29 16:10:26 - Security Bloggers Network : I've previously written about my and ICANN's participation in the Commonwealth Cybercrime Initiative  CCI  in the Internet Technical Advisory Committee  ITAC  Newsletter Recently, the Commonwealth Secretariat has prepared a Quick Guide to promote the  IMAGE  </description><link>http://www.secuobs.com/revue/news/537398.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/537398.shtml</guid></item>
<item><title>What s behind the rise in cybercrime  Find out from this recorded presentation</title><description>2014-09-23 14:09:43 - Security Bloggers Network :    Home Depot says it was hacked to the tune of 56 million payment cards What is behind the current wave of cybercrime  This recorded presentation offers answers and some defensive strategies for organizations at risk The post What s behind the rise in cybercrime  Find out from this recorded presentation appeared first on We Live Security  IMAGE IMAGE  </description><link>http://www.secuobs.com/revue/news/536364.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/536364.shtml</guid></item>
<item><title> European banks and Europol join forces to fight cybercrime</title><description>2014-09-23 08:52:38 - Help Net Security : The European Banking Federation  EBF  and Europol's European Cybercrime Centre  EC3  signed a Memorandum of Understanding  MoU  which paves the way for intensifying cooperation between law enforcement </description><link>http://www.secuobs.com/revue/news/536330.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/536330.shtml</guid></item>
<item><title>Kaspersky Lab France   10 arrestations qui ont fait trembler le monde du cybercrime</title><description>2014-09-16 21:09:44 - Global Security Mag Online : À l'occasion des 10 ans de Kaspersky Lab France cette semaine, Kaspersky Lab revient sur dix arrestations de cybercriminels récentes qui ont marqué le secteur Pour ne pas faire mentir l'actualité récente, les vols de photos dénudées de stars y ont une place de choix  À la recherche de photos sexys Si vous êtes jeune, beau et que vous êtes récemment devenu célèbre, utilisez immédiatement des mots de passe complexes et installez une protection complète sur votre ordinateur C'est une leçon que la chanteuse    - Malwares </description><link>http://www.secuobs.com/revue/news/535210.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/535210.shtml</guid></item>
<item><title>Cybercrime, Data Protection, and Multi-Factor Authentication  MFA </title><description>2014-09-16 19:22:47 - Security Bloggers Network : By Adrienne Hall, General Manager, Trustworthy Computing Most people are familiar with the concept of an arms race In the world of cybersecurity, this phrase is also in use A cybersecurity  arms race  typically refers to escalating respon IMAGE  </description><link>http://www.secuobs.com/revue/news/535192.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/535192.shtml</guid></item>
<item><title>Internationally Renowned Security Expert Bruce Schneier to Keynote the 2015 ISSA-LA Information Security Summit on Cybercrime Solutions</title><description>2014-09-12 17:41:56 - Security Bloggers Network : Bruce Schneier, one of the world s leading experts on computer security and privacy issues, will deliver the keynote address at the Los Angeles Chapter of the Information Systems Security Association  ISSA-LA  Seventh Annual Information Security Summit on June 4, 2015, at the Hilton Universal City Hotel in Los Angeles IMAGE  </description><link>http://www.secuobs.com/revue/news/534692.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/534692.shtml</guid></item>
<item><title>The rise and rise of cybercrime targeting global sporting events</title><description>2014-09-09 15:20:54 - Security Bloggers Network : Power of networksBy Ramiro Rodrigues, Chief Information and Cyber Security Officer, BT Global Services Since the inception of the internet, every major sporting event has become the target of cybercrime With hundreds of thousands of fans, organisations and governmental forces invested in global events, they are the perfect opportunity for criminals of all calibres to take advantage  IMAGE  </description><link>http://www.secuobs.com/revue/news/533825.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/533825.shtml</guid></item>
<item><title>e 02 Septembre 2014 Europol lance sa task force internationale contre le cybercrime</title><description>2014-09-03 10:26:57 - Tout sur la cybersociété  la cybersécurité  la cybercriminalité  la cyberdéfense  ... : Le FBI et la NCA, l agence britannique de lutte contre le crime, se joignent à Europol pour s attaquer au cybercrime au sein de l unité opérationnelle J-CAT Sous le nom de J-CAT, pour   Joint Cybercrime Action taskforce  , Europol vient de lancer l unité opérationnelle qu il avait annoncée fin juillet pour lutter contre le cybercrime dans   </description><link>http://www.secuobs.com/revue/news/532753.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/532753.shtml</guid></item>
<item><title> Expert international cybercrime taskforce tackles online crime</title><description>2014-09-02 09:36:59 - Help Net Security   News : Hosted at the European Cybercrime Centre  EC3  at Europol, the Joint Cybercrime Action Taskforce  J-CAT , which is being piloted for six months, will coordinate international investigations with partn </description><link>http://www.secuobs.com/revue/news/532544.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/532544.shtml</guid></item>
<item><title>Cybercrime  Top experts to form international crook-hunting force</title><description>2014-09-01 18:19:00 - Security Bloggers Network :    As many as 18 top cybercrime experts from around the world will form a new Joint Cybercrime Action Task Force based in the Hague, which will target  top-level criminals  The post Cybercrime  Top experts to form international crook-hunting force appeared first on We Live Security  IMAGE  </description><link>http://www.secuobs.com/revue/news/532478.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/532478.shtml</guid></item>
<item><title>SSCC 162   What are  you  doing to fight cybercrime in the next 12 months   PODCAST </title><description>2014-08-29 15:49:46 - Security Bloggers Network : Here's this week's Chet Chat podcast  Chester caught Duck half way up a mountain to talk about why we need synergy to fight cybercrime IMAGE  </description><link>http://www.secuobs.com/revue/news/532155.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/532155.shtml</guid></item>
<item><title> Smash   Grab  cybercrime attacks have been active since mid-June</title><description>2014-08-28 22:54:24 - Security Bloggers Network :   IMAGE  Last week, researchers at Proofpoint reported an attack campaign, which was dubbed  Smash   Grab,  targeting customers of JP Morgan Chase Based on intelligence from the Phishlabs RAID  Research, Analysis, and Intelligence Division , the  Smash   Grab  operations have been active since at least mid-June using the same phishing and malware combination tactics described in the initial report Our analysis also indicates a possible connection to cybercriminal actors currently or previously involved in GameOver Zeus operations  IMAGE  </description><link>http://www.secuobs.com/revue/news/532059.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/532059.shtml</guid></item>
<item><title>Cybercrime Exposed Part 2  When Adware Goes Bad   A Closer Look at Adware</title><description>2014-08-19 21:48:28 - TrendLabs Security Intelligence Blog : With the ostensibly harmless nature of adware, we are constantly tricked into believing that they are nothing but online nuisances But underneath, they are marketing-engineered software that could potentially carry malicious programs to target your browsing behavior and spy on your other online activities What is adware and why does it exist  Upfront, adware are   Post from  Trendlabs Security Intelligence Blog - by Trend Micro Cybercrime Exposed Part 2  When Adware Goes Bad   A Closer Look at Adware </description><link>http://www.secuobs.com/revue/news/530572.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/530572.shtml</guid></item>
<item><title>Cybercrime and Effective Cyber Law Enforcement</title><description>2014-08-19 18:27:45 - Security Bloggers Network : These days, it's rare to open a news source  print or digital  without finding a story about cybercrime Cybercriminals are hacking into databases, stealing credit and debit card account numbers, compromising individuals' identities, and shutting down legitimate websites These articles highlight how necessary cyber law enforcement has becomeAlthough data security budgets keep climbing and computer users are increasingly aware of security protocols, cybercrimes remain on the rise Local police forces seem unable to get a handle on this type of crime or criminal, and even the most advanced IMAGE  </description><link>http://www.secuobs.com/revue/news/530537.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/530537.shtml</guid></item>
<item><title>Russian cybercrime team   another reason to use VIP</title><description>2014-08-19 11:04:10 - Security Bloggers Network :    If anyone needed another reason to be wary of using solely passwords to protect their accounts, the recent report of the Russian cybercrime team that stole 12 billion usernames and passwords from 420,000 websites is that reason It makes you wonder, 12 Billion Login Details Stolen Time To Retire The Password  Although the attackers have not sold much of the stolen data, because of our propensity for password reuse the risk is there to cause significant personal damage, fraud, and outright theft One of the best ways to protect your online accounts is through a second factor of authentication - that way even if your password is compromised your account is still protected Below are some tips to protect your online data    Use strong, unique passwords and never reuse them across other online accounts   Activate two-factor authentication on websites that provide it Symantec s Validation and ID Protection  VIP  Service lets businesses implement both two-factor and risk-based token-less authentication   Consider using a password manager, such as Norton Identity Safe, which safely stores different passwords for online services Follow VIP on Twitter  SymantecVIP  IMAGE   IMAGE   IMAGE   IMAGE IMAGE IMAGE  </description><link>http://www.secuobs.com/revue/news/530475.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/530475.shtml</guid></item>
<item><title>Russian cybercrime team - another reason to use VIP</title><description>2014-08-19 09:14:15 - Symantec Connect   Security   Blog Entries :    If anyone needed another reason to be wary of using solely passwords to protect their accounts, the recent report of the Russian cybercrime team that stole 12 billion usernames and passwords from 420,000 websites is that reason It makes you wonder, 12 Billion Login Details Stolen Time To Retire The Password  Although the attackers have not sold much of the stolen data, because of our propensity for password reuse the risk is there to cause significant personal damage, fraud, and outright theft One of the best ways to protect your online accounts is through a second factor of authentication - that way even if your password is compromised your account is still protected Below are some tips to protect your online data    Use strong, unique passwords and never reuse them across other online accounts   Activate two-factor authentication on websites that provide it Symantec s Validation and ID Protection  VIP  Service lets businesses implement both two-factor and risk-based token-less authentication   Consider using a password manager, such as Norton Identity Safe, which safely stores different passwords for online services Follow VIP on Twitter  SymantecVIP  IMAGE   IMAGE   IMAGE   IMAGE IMAGE  </description><link>http://www.secuobs.com/revue/news/530462.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/530462.shtml</guid></item>
<item><title>Checking In On Africa  The Latest Developments in Cybercrime</title><description>2014-08-11 22:47:17 - TrendLabs Security Intelligence Blog : In the early 2000s, Africa gained notoriety due to the 419  Nigerian  scam This scam involved making payments in exchange for a reward for helping so-called high-ranking Nigerian officials and their families While all the scams may not have necessarily originated from Africa, the use of Nigerian officials was imprinted upon the public consciousness, thereby   Post from  Trendlabs Security Intelligence Blog - by Trend Micro Checking In On Africa  The Latest Developments in Cybercrime </description><link>http://www.secuobs.com/revue/news/529332.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/529332.shtml</guid></item>
<item><title>After Russian hackers breach 12 billion records  Where is cybercrime going next </title><description>2014-08-09 20:11:37 - Security Bloggers Network :  IMAGE  </description><link>http://www.secuobs.com/revue/news/529131.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/529131.shtml</guid></item>
<item><title>L Europe se dote d un centre de lutte contre le cybercrime</title><description>2014-08-03 19:15:48 - Tout sur la cybersociété  la cybersécurité  la cybercriminalité  la cyberdéfense  ... : L an dernier, la Commission européenne annonçait la mise en place d ici à 2013 d un centre dédié à la lutte contre la cybercriminalité et l ouverture d une réflexion sur la stratégie d ensemble à adopter pour disposer d une  meilleure protection  contre les attaques informatiques ciblant les pays européens Un an plus tard, Bruxelles a dévoilé son calendrier     </description><link>http://www.secuobs.com/revue/news/528176.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/528176.shtml</guid></item>
<item><title>Vulnerability Management Help Law Enforcement Investigate Cybercrime</title><description>2014-07-30 18:22:35 - Security Bloggers Network : Have we had a day in recent memory when cybercrime was not part of the global news cycle  According to a newly released report from RSA, over 50 percent of phishing attacks in March 2014 targeted brands located in the United States, United Kingdom, India, Australia, and Canada  an April 2014 RSA report reviewing 2013 data noted phishing caused  59 billion in losses to global organizations that year, and 75 percent of data breaches were motivated by financial gain or fraud Does vulnerability management have a role in reducing the likelihood of being a cybercrime victim  Oftentimes, it does  IMAGE  </description><link>http://www.secuobs.com/revue/news/527643.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/527643.shtml</guid></item>
<item><title>Cybercrime Exposed Part 1  The Security Risks of Phishing</title><description>2014-07-28 22:34:46 - TrendLabs Security Intelligence Blog : While new threats are emerging that hit new avenues or targets like PoS systems and cryptocurrencies, old threats like phishing remains to be an effective means of gathering user data A simple spam email that leverages holidays, online shopping, release of anticipated gadgets, and hot current news items can redirect unsuspecting users to survey scams and phishing pages that   Post from  Trendlabs Security Intelligence Blog - by Trend Micro Cybercrime Exposed Part 1  The Security Risks of Phishing </description><link>http://www.secuobs.com/revue/news/527284.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/527284.shtml</guid></item>
<item><title>How Cybercrime Exploits Digital Certificates</title><description>2014-07-28 16:12:57 - Security Bloggers Network : What is a digital certificate  The digital certificate is a critical component of a public key infrastructure It is an electronic document that associates the individual identity of a person to the Go on to the site to read the full article IMAGE  </description><link>http://www.secuobs.com/revue/news/527227.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/527227.shtml</guid></item>
<item><title>Why the Joint Cybercrime Action Taskforce is a positive for Europe</title><description>2014-07-25 12:28:12 - Security Bloggers Network :  IMAGE  </description><link>http://www.secuobs.com/revue/news/526932.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/526932.shtml</guid></item>
<item><title>How To Combat Advanced Threats Using Cybercrime Controls</title><description>2014-07-24 06:31:38 - Security Bloggers Network : The post How To Combat Advanced Threats Using Cybercrime Controls appeared first on The State of Security IMAGE  </description><link>http://www.secuobs.com/revue/news/526657.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/526657.shtml</guid></item>
<item><title>Officials  More than 1,600 StubHub Users Affected in International Cybercrime Scheme</title><description>2014-07-24 02:16:48 - Computer Security News :    Six people have been indicted for their roles in an international crime ring involving online ticket-reseller StubHub, officials announced Wednesday </description><link>http://www.secuobs.com/revue/news/526644.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/526644.shtml</guid></item>
<item><title>Cybercrime Ring Steals Millions in StubHub Tickets, Arrests Followed</title><description>2014-07-24 01:48:24 - Security Bloggers Network : The post Cybercrime Ring Steals Millions in StubHub Tickets, Arrests Followed appeared first on The State of Security IMAGE  </description><link>http://www.secuobs.com/revue/news/526640.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/526640.shtml</guid></item>
<item><title>Five countries unite over cybercrime</title><description>2014-07-11 08:07:36 - Tout sur la cybersociété  la cybersécurité  la cybercriminalité  la cyberdéfense  ... : The Attorneys General from 5 countries are meeting in London this week to strengthen the international fight against cybercrime The Attorney General Dominic Grieve QC MP, is hosting the annual meeting of his counterparts from Australia, Canada, New Zealand and the USA from 9 to 11 July Cybercrime is one of the UK government s international   </description><link>http://www.secuobs.com/revue/news/524679.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/524679.shtml</guid></item>
<item><title>SSCC 155   cybercrime bust, cloud laws, phishing and malware back from extinction  PODCAST </title><description>2014-07-11 01:51:15 - Security Bloggers Network : In this episode, Sophos experts John Shier and Paul Ducklin tackle the week's interesting security stories John and Duck get stuck into  a high-profile cybercrime arrest  how mainstream brands help phishers  and why macro malware is making a comeback IMAGE  </description><link>http://www.secuobs.com/revue/news/524658.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/524658.shtml</guid></item>
<item><title>Microsoft takes down No-IP DNS domains in cybercrime fight   right or wrong   POLL </title><description>2014-07-03 14:19:03 - Security Bloggers Network : Vote in our poll  Was Microsoft's takeover of 23 of another company's domain names a justifiable step in dealing with cybercrime, or a disruptive step too far IMAGE  </description><link>http://www.secuobs.com/revue/news/523550.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/523550.shtml</guid></item>
<item><title>Microsoft Announces Third Major Malware Disruption Since Cybercrime Center Launched</title><description>2014-07-01 00:34:51 - Security Bloggers Network : Microsoft's Cybercrime unit has eliminated another threat, this time through legal action read more IMAGE  </description><link>http://www.secuobs.com/revue/news/522968.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/522968.shtml</guid></item>
<item><title>Microsoft says disrupts cybercrime rings with roots in Kuwait, Algeria</title><description>2014-06-30 23:25:32 - Computer Security News :    The operation, which began on Monday under an order issued by a federal court in Nevada, targeted traffic involving malicious software known as Bladabindi and Jenxcus, which Microsoft said work in similar ways and were written and distributed by developers in Kuwait and Algeria </description><link>http://www.secuobs.com/revue/news/522959.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/522959.shtml</guid></item>
<item><title>ENISA and Europol Team Up to Fight Cybercrime</title><description>2014-06-27 19:35:41 - Security Bloggers Network : The post ENISA and Europol Team Up to Fight Cybercrime appeared first on The State of Security IMAGE  </description><link>http://www.secuobs.com/revue/news/522608.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/522608.shtml</guid></item>
<item><title>Europe improving anti-cybercrime cooperation, but what about US and China </title><description>2014-06-27 18:39:28 - Security Bloggers Network : Cybercrime is a global danger, so it's vital that agencies in different jurisdictions work together to investigate and prosecute crimes being committed across borders Any step away from full cooperation is a step in the wrong direction IMAGE  </description><link>http://www.secuobs.com/revue/news/522599.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/522599.shtml</guid></item>
<item><title>Billions Lost to Cybercrime in Iceland</title><description>2014-06-27 01:42:04 - Computer Security News :    Cybercrime in Iceland is resulting in annual losses in the ISK billions according to the Ministry of the Interior, ruvis reports </description><link>http://www.secuobs.com/revue/news/522482.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/522482.shtml</guid></item>
<item><title>Hackonomics  Cybercrime s cost to business</title><description>2014-06-25 14:14:17 - Security Bloggers Network : How much does getting hacked actually cost a business  Looking closely at the cyber black market's cost factors is worrying, but offers insight into keeping crime's cost low IMAGE  </description><link>http://www.secuobs.com/revue/news/520630.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/520630.shtml</guid></item>
<item><title>Glasgow hosts cybercrime conference</title><description>2014-06-23 05:06:41 - Computer Security News :    More than 70 delegates from the UK, Sri Lanka, Australia, New Zealand, Canada and the US will discuss the online threats such as hacking and grooming </description><link>http://www.secuobs.com/revue/news/520146.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/520146.shtml</guid></item>
<item><title>California company sues bank over cybercrime, wins  350,000 settlement</title><description>2014-06-20 21:42:37 - Security Bloggers Network :    A California oil company that lost thousands after being attacked by hackers has won  350,000 in a legal settlement after suing its bank The post California company sues bank over cybercrime, wins  350,000 settlement appeared first on We Live Security  IMAGE  </description><link>http://www.secuobs.com/revue/news/520006.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/520006.shtml</guid></item>
<item><title>Pittsburgh cybersquad leads way in fighting cybercrime</title><description>2014-06-17 07:24:42 - Computer Security News :    Picture hundreds of thousands of computers, secretly enslaved to a distant puppet master who orders them to snatch funds, up to seven figures, from their owners' bank accounts </description><link>http://www.secuobs.com/revue/news/519191.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/519191.shtml</guid></item>
<item><title>A 5 Step Plan on How to Protect Yourself from Cybercrime</title><description>2014-06-16 17:12:52 - Security Bloggers Network : Recently, I wrote an article for Help Net Security to discuss the modus operandi of cybercriminals and how this can lead to different types of cyber attacks While we have previously encountered huge distributed denial of service  DDoS  attacks that appear to come from nowhere and flood the victim s network security, we have begun to  IMAGE  </description><link>http://www.secuobs.com/revue/news/519070.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/519070.shtml</guid></item>
<item><title>Targeted Attack Methodologies for Cybercrime</title><description>2014-06-10 16:37:39 - TrendLabs Security Intelligence Blog : We recently wrote about the difference between cybercrime and a cyber war, which narrows down to the attack s intent With the same intent of gaining information to use against targets, cybercriminals and attackers tend to stress less importance in their choice of  tools , as these campaigns are all about who carries out the attack Ultimately, a   Post from  Trendlabs Security Intelligence Blog - by Trend Micro Targeted Attack Methodologies for Cybercrime </description><link>http://www.secuobs.com/revue/news/518048.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/518048.shtml</guid></item>
<item><title>Bank of England steps up fight against cybercrime</title><description>2014-06-10 13:32:44 - Computer Security News :    The Bank of England sought to bolster the financial industry's defences against cyber-attacks on Tuesday when it unveiled a new framework to spot and test possible weak points at lenders </description><link>http://www.secuobs.com/revue/news/517999.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/517999.shtml</guid></item>
<item><title>Economic Impact of Cybercrime Estimated at  445 billion Worldwide</title><description>2014-06-09 18:12:53 - Security Bloggers Network : The post Economic Impact of Cybercrime Estimated at  445 billion Worldwide appeared first on The State of Security IMAGE  </description><link>http://www.secuobs.com/revue/news/517854.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/517854.shtml</guid></item>
<item><title>  445 billion lost due to cybercrime </title><description>2014-06-09 14:08:31 - Help Net Security   News : Cybercrime has a significant impact on economies worldwide A new report from the Center for Strategic and International Studies  CSIS  concludes that cybercrime costs businesses approximately  445 bi </description><link>http://www.secuobs.com/revue/news/517812.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/517812.shtml</guid></item>
<item><title>Security Slice  Are Retailers Cybercrime Victims or Cybersecurity Laggards </title><description>2014-06-09 07:24:05 - Security Bloggers Network : The post Security Slice  Are Retailers Cybercrime Victims or Cybersecurity Laggards  appeared first on The State of Security IMAGE  </description><link>http://www.secuobs.com/revue/news/517754.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/517754.shtml</guid></item>
<item><title>State of US Cybercrime  Insiders, Partners and Boardroom Risks Prevail</title><description>2014-06-05 20:23:45 - Security Bloggers Network : The post State of US Cybercrime  Insiders, Partners and Boardroom Risks Prevail appeared first on The State of Security IMAGE  </description><link>http://www.secuobs.com/revue/news/517348.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/517348.shtml</guid></item>
<item><title>GameOver Zeus  Cybercrime s Mr Big named by the FBI</title><description>2014-06-02 21:09:29 - Security Bloggers Network :     IMAGE  The US claims that Russian citizen Evgeniy Mikhaylovich Bogachev is the leader of the gang that spread the GameOver Zeus  GOZ  malware and Cryptolocker ransomware, and ran botnets that hijacked up to one million computers around the world IMAGE  </description><link>http://www.secuobs.com/revue/news/516710.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/516710.shtml</guid></item>
<item><title>International Takedown Wounds Gameover Zeus Cybercrime Network</title><description>2014-06-02 16:51:29 - Symantec Connect   Security Response   Billets :    Large swathes of infrastructure owned by the attackers behind the financial fraud botnet and Cryptolocker ransomware network seized by authorities Read more </description><link>http://www.secuobs.com/revue/news/516648.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/516648.shtml</guid></item>
<item><title>Public-private survey finds cybercrime rising, companies and government ill prepared</title><description>2014-06-01 10:16:36 - Computer Security News :    The hackers are winning, according to a survey of 500 executives of US businesses, law enforcement services and government agencies released Wednesday </description><link>http://www.secuobs.com/revue/news/516518.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/516518.shtml</guid></item>
<item><title>Security Researchers Threatened With US Cybercrime Laws</title><description>2014-05-30 22:52:05 - Slashdot  Your Rights Online : An anonymous reader writes  The Guardian reports that many of the security industry's top researchers are being threatened by lawyers and law enforcement over their efforts to track down vulnerabilities in internet infrastructure 'HD Moore, creator of the ethical hacking tool Metasploit and chief research officer of security consultancy Rapid7, told the Guardian he had been warned by US law enforcement last year over a scanning project called CriticalIO, which he started in 2012 The initiative sought to find widespread vulnerabilities using automated computer programs to uncover the weaknesses across the entire internet  Zach Lanier, senior security researcher at Duo Security, said many of his team had  run into possible CFAA issues before in the course of research over the last decade  Lanier said that after finding severe vulnerabilities in an unnamed  embedded device marketed towards children  and reporting them to the manufacturer, he received calls from lawyers threatening him with action   IMAGE   IMAGE  Share on Google  Read more of this story at Slashdot  IMAGE   IMAGE   IMAGE   IMAGE   IMAGE IMAGE IMAGE  </description><link>http://www.secuobs.com/revue/news/516376.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/516376.shtml</guid></item>
<item><title>2014 US State of Cybercrime, Adios TrueCrypt, USPS Malware Lure Spam  TWIC   May 30, 2014</title><description>2014-05-30 19:32:31 - Security Bloggers Network :    Each week, the PhishLabs team posts The Week in Cybercrime  TWIC  to recap noteworthy cybercrime articles and reports  open source    2014 US State of Cybercrime Survey  PWC  This year's US State of Cybercrime Survey reinforces two key points that business leaders should take to heart The first is that  The cybersecurity programs of US organizations do not rival the persistance, tactical skills, and technological prowess of their potential cyber adversaries  The second is that the correlation between how much you invest in cybersecurity and the strength of your security posture is significant  Those that demonstrate a more advanced cybersecurity posture are not necessarily smarter They have simply invested more and have learned from experience  The odds aren't in favor of those that skimp on security spending   USPS Spam Delivering Asprox Variant  Zscaler  The Zscaler team has published a good analysis of a recent US Postal Service malware lure spam campaign As with similar campaigns that have impersonated shipping companies and postal services, this attack disguises a malicious link as a shipping receipt to lure victims into downloading malware  Asprox in this case   IMAGE  </description><link>http://www.secuobs.com/revue/news/516347.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/516347.shtml</guid></item>
<item><title>New survey shows cybercrime on the rise  HP TippingPoint is putting a stop to it</title><description>2014-05-29 23:46:12 - Security Bloggers Network : A new survey shows that cybercrime is outsmarting security HP TippingPoint is on a crusade to change that  IMAGE  </description><link>http://www.secuobs.com/revue/news/516195.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/516195.shtml</guid></item>
<item><title>Public-private survey finds cybercrime on the rise</title><description>2014-05-28 14:43:58 - Computer Security News :    The hackers are winning, according to a survey of 500 executives of US businesses, law enforcement services and government agencies released Wednesday </description><link>http://www.secuobs.com/revue/news/515901.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/515901.shtml</guid></item>
<item><title>The Blackshades RAT   Entry-Level Cybercrime</title><description>2014-05-26 12:03:24 - TrendLabs Security Intelligence Blog : Earlier this week the US government announced the arrest of more than 100 individuals linked to the Blackshades remote access Trojan  RAT  While most of those arrested were merely users of this RAT, the arrests included its co-creator, a 24-year-old Swede named Alex Yücel Also arrested was a 23-year-old American named Brendan Johnston, who was involved in   Post from  Trendlabs Security Intelligence Blog - by Trend Micro The Blackshades RAT   Entry-Level Cybercrime </description><link>http://www.secuobs.com/revue/news/515448.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/515448.shtml</guid></item>
<item><title>Cat-hacking Japanese man admits cybercrime guilt</title><description>2014-05-22 16:13:15 - Network World on Security : A hacker has confessed in court to hijacking other people's computers to make murder threats in a bizarre case that saw the source code for a virus stashed in the collar of a cat </description><link>http://www.secuobs.com/revue/news/514945.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/514945.shtml</guid></item>
<item><title>A peek inside a newly launched all-in-one E-shop for cybercrime-friendly services</title><description>2014-05-21 23:41:30 - Security Bloggers Network :    Cybercriminals continue diversifying their portfolios of standardized fraudulent services, in an attempt to efficiently monetize their malicious  know-how , further contributing to the growth of the cybercrime ecosystem In a series of blog posts highlighting the emergence of the boutique cybercrime-friendly E-shops, we ve been emphasizing on the over-supply of compromised stolen accounting data, efficiently aggregated through the TTPs  tactics, techniques and procedures  described in our  Cybercrime Trends   2013  observations We ve recently spotted a newly launched all-in-one cybercrime-friendly E-shop, offering a diversified portfolio of managed DIY services products, exposing a malicious infrastructure worth keeping an eye on Let s take a peek inside the E-shop s inventory   The post A peek inside a newly launched all-in-one E-shop for cybercrime-friendly services appeared first on Webroot Threat Blog  IMAGE  </description><link>http://www.secuobs.com/revue/news/514816.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/514816.shtml</guid></item>
<item><title> Cybercrime attack targets, victims, motivations and methods</title><description>2014-05-21 16:20:17 - Help Net Security   News : Trustwave experts gathered the data from 691 breach investigations  a 54 percent increase from 2012  across 24 countries in addition to proprietary threat intelligence gleaned from the company s five  </description><link>http://www.secuobs.com/revue/news/514723.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/514723.shtml</guid></item>
<item><title>FBI Need Potheads To Fight Cybercrime</title><description>2014-05-21 01:20:05 - Slashdot  Your Rights Online : An anonymous reader writes  The rate of cybercrime is growing and growing, and law enforcement is struggling to keep up The FBI is in the process of beefing up its headcount, but they're running into a problem  many of the hackers applying for these jobs have a history of marijuana use, and the agency has a zero tolerance policy FBI Director James Comey said, 'I have to hire a great work force to compete with those cyber criminals and some of those kids want to smoke weed on the way to the interview' However, change may be on the horizon  Comey said the FBI is changing 'both our mindset and the way we do business' He also encouraged job applications from former pot users despite the policy   IMAGE   IMAGE  Share on Google  Read more of this story at Slashdot  IMAGE   IMAGE   IMAGE   IMAGE   IMAGE IMAGE IMAGE  </description><link>http://www.secuobs.com/revue/news/514586.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/514586.shtml</guid></item>
<item><title>FBI plans worldwide crackdown on cybercrime</title><description>2014-05-15 17:50:58 - Security Bloggers Network :    The FBI is gearing up for a major crackdown on cybercrime, and says that arrests of major criminals will follow in weeks Criminals in foreign countries will not be safe, a top FBI official said The post FBI plans worldwide crackdown on cybercrime appeared first on We Live Security  IMAGE  </description><link>http://www.secuobs.com/revue/news/513780.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/513780.shtml</guid></item>
<item><title>1Q 2014 Security Roundup  Cybercrime Hits the Unexpected</title><description>2014-05-13 16:41:39 - TrendLabs Security Intelligence Blog : The first quarter of the year saw cybercrime hit targets that may not have been considered worthwhile in previous quarters Multiple Bitcoin exchanges found themselves the victims of various attacks and were forced to close shop The most high-profile victim Mt Gox, which had been, at one time, the leading Bitcoin exchange in the world   Post from  Trendlabs Security Intelligence Blog - by Trend Micro 1Q 2014 Security Roundup  Cybercrime Hits the Unexpected </description><link>http://www.secuobs.com/revue/news/513304.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/513304.shtml</guid></item>
<item><title>Cybercrime boss offers a Ferrari for best online scam</title><description>2014-05-12 20:04:38 - Security Bloggers Network : A top cybercrime boss has offered up a sports car to the hacker who comes up with the best online scam, according to the head of the European Cybercrime Centre  EC3  IMAGE  </description><link>http://www.secuobs.com/revue/news/513112.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/513112.shtml</guid></item>
<item><title>McAfee révèle la face cachée des sites de jeu en ligne   Le cybercrime paie   </title><description>2014-05-12 09:16:00 - Global Security Mag Online : McAfee, filiale d'Intel Security, publie un nouveau rapport intitulé Jackpot   Money Laundering Through Online Gambling qui met en lumière l'univers souterrain du jeu en ligne Ce rapport illustre la prolifération des casinos en ligne, amenés à croître de 30 pourcents dans les trois prochaines années, et détaille la manière dont leur usage alimente la cybercriminalité, notamment en facilitant le blanchiment des revenus générés par des activités illégales L'univers des jeux en ligne génère de gros volumes de    - Malwares </description><link>http://www.secuobs.com/revue/news/513000.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/513000.shtml</guid></item>
<item><title>Cybercrime boss offers a Ferrari for hacker who dreams up the biggest scam</title><description>2014-05-11 02:30:15 - Computer Security News :    The leader of a global cybercrime syndicate offered his associates a Ferrari for the hacker who came up with the best scam, according to a senior European security source </description><link>http://www.secuobs.com/revue/news/512922.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/512922.shtml</guid></item>
<item><title>DIY cybercrime-friendly  legitimate  APK injecting decompiling app spotted in the wild</title><description>2014-05-06 19:58:49 - Security Bloggers Network :    With millions of Android users continuing to acquire new apps through Google Play, cybercriminals continue looking for efficient and profitable ways to infiltrate Android s marketplace using a variety of TTPs  tactics, techniques and procedures  Largely relying on the ubiquitous for the cybercrime ecosystem, affiliate network based revenue sharing scheme, segmented cybercrime-friendly underground traffic exchanges, as well as mass and efficient compromise of legitimate Web sites, for the purpose of hijacking legitimate traffic, the market segment for Android malware continues flourishing We ve recently spotted, yet another, commercially available DIY cybercrime-friendly  legitimate  APK injecting decompiling app The tool is capable of facilitating premium-rate SMS fraud on   The post DIY cybercrime-friendly  legitimate  APK injecting decompiling app spotted in the wild appeared first on Webroot Threat Blog  IMAGE  </description><link>http://www.secuobs.com/revue/news/512139.shtml</link><guid isPermaLink="false">http://www.secuobs.com/revue/news/512139.shtml</guid></item>

 </channel>
</rss>
