Crimeware
692 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by The Historical Cyber Consortium
Scoop.it!

Hospital Declares ‘Internal State of Emergency’ After Ransomware Infection — Krebs on Security

Hospital Declares ‘Internal State of Emergency’ After Ransomware Infection — Krebs on Security | Crimeware | Scoop.it
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

Stealthy malware targeting air-gapped PCs leaves no trace of infection

Stealthy malware targeting air-gapped PCs leaves no trace of infection | Crimeware | Scoop.it
Researchers discover "self-protecting" trojan circulating in the wild.
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

WKYT Investigates: Cyber hackers focusing on taxpayers

WKYT Investigates:  Cyber hackers focusing on taxpayers | Crimeware | Scoop.it
In 2014, 27 million taxpayers filed their tax returns from their home computers, according to the Internal Revenue Service. As the number of people filing online continues to increase, the threat of cyber hackers continues to rise, as well. 'It's very serious and it's very widespread,' explained computer expert Steve Hamrin.
more...
No comment yet.
Rescooped by The Historical Cyber Consortium from SME Cyber Security
Scoop.it!

Cyber Security: Lessons for the Boardroom - YouTube

Cyber security is now topping the agenda for businesses around the globe. The WSJ asked leading experts in the field what chief executives should be doing fo...

Via Roger Smith
more...
Roger Smith's curator insight, October 15, 2014 6:05 PM

The role of CEO is so important when it comes to protecting an organiation from cybercrime.  

If the CEO believes that cyber security is an important issue then everyone else will consider it important as well.  

Scooped by The Historical Cyber Consortium
Scoop.it!

Google reveals major flaw in outdated, but widely-used SSL protocol | ZDNet

Google reveals major flaw in outdated, but widely-used SSL protocol | ZDNet | Crimeware | Scoop.it
It's no Heartbleed, but this problem in the obsolete SSL 3.0 is still sure to cause trouble.
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

Press Release - "Harkonnen Operation" | CYBERTINEL - Signature-less Endpoint Security Platform

Press Release - "Harkonnen Operation" | CYBERTINEL - Signature-less Endpoint Security Platform | Crimeware | Scoop.it
CYBERTINEL uncovers extensive computer espionage network hitting over 300 sensitive organizations in Germany, Austria and Switzerland Since 2002 the
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

Reverse Engineering Malware: ZeroAccess / Max++ / Smiscer Crimeware Rootkit - Malware Analysis / Ανάλυση Κακόβουλου Λογισμικού

Reverse Engineering Malware: ZeroAccess / Max++ / Smiscer Crimeware Rootkit - Malware Analysis / Ανάλυση Κακόβουλου Λογισμικού | Crimeware | Scoop.it
Reverse Engineering Malware: ZeroAccess / Max++ / Smiscer Crimeware Rootkit - δημοσιεύτηκε στην Malware Analysis / Ανάλυση Κακόβουλου Λογισμικού: This four part article series is a complete step-by-step tutorial on how to reverse engineer the ZeroAccess Rootkit. ZeroAcess is also known as the Smiscer or Max++ rootkit. You can either read along to gain an in-depth understand the thought process behind reverse engineering modern malware of this sophistication. The author prefers that you dow...
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

FBI Chief: China Leader in Cyber Crime - Voice of America

FBI Chief: China Leader in Cyber Crime - Voice of America | Crimeware | Scoop.it
U.S. FBI chief James Comey says China is at the top of the list of countries waging cyber warfare against American industry, with damages measured in the billions of dollars per year.

Comey tol...
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

The Three Providers Who Decide Whether You Will Be Hacked | SecurityWeek.Com

The Three Providers Who Decide Whether You Will Be Hacked | SecurityWeek.Com | Crimeware | Scoop.it
Some services are simply not cost-effective to build and manage in-house to get the required level of performance and security. Other services can only be procured from a third party vendor. Herein lies the soft underbelly of security for many organizations. How to prevent being hacked.
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

Cyber-criminals blamed for crippling Spark broadband - TVNZ

Cyber-criminals blamed for crippling Spark broadband - TVNZ | Crimeware | Scoop.it
Radio New Zealand
Cyber-criminals blamed for crippling Spark broadband
TVNZ
A co-ordinated cyber attack on websites in eastern Europe is being blamed for strangling the internet connection for thousands of New Zealanders over the weekend.
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

A new Side channel attack-how to steal encryption keys by touching PCs

A new Side channel attack-how to steal encryption keys by touching PCs | Crimeware | Scoop.it
Researchers demonstrated a new side channel attack which allow them to steal encryption keys by simply touching a laptop.
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

Cryptowall attacks Durham police files - Seacoastonline.com

Cryptowall attacks Durham police files - Seacoastonline.com | Crimeware | Scoop.it
Cryptowall attacks Durham police files
Seacoastonline.com
Cryptowall and Cryptodefense are two copycat viruses similar to Cryptolocker. Both have been in circulation since late last year.
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

TorrentLocker is Back and Targets Sweden & Italy | Forcepoint

TorrentLocker is Back and Targets Sweden & Italy | Forcepoint | Crimeware | Scoop.it
Since 14/FEB/16 we have been tracking a new TorrentLocker e-mail campaign which has been using PostNord and Enel themed lures. The e-mails have been specifically targeted towards Swedish and Italian users. Unlike some previous TorrentLocker lures which were set up on newly registered domains, these use fake sites hosted directly on compromised websites.
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

Email scam Petya locks down PCs until a ransom is paid

Email scam Petya locks down PCs until a ransom is paid | Crimeware | Scoop.it
A new piece of ransomware distributed via email is forcing victims to pay upwards of $400 to regain access to their computer.
more...
No comment yet.
Rescooped by The Historical Cyber Consortium from SME Cyber Security
Scoop.it!

Can cyber criminals cause a financial crash? - Cyber Risk Network

Can cyber criminals cause a financial crash? - Cyber Risk Network | Crimeware | Scoop.it
So how vulnerable is the financial sector? Could cyber criminals bring the system to its knees?

Via Roger Smith
more...
Roger Smith's curator insight, October 16, 2014 8:27 PM

There was a plan by a cyber crime group to steal 1 Billion dollars from an American bank.   I think that would have a detrimental effect on business!

Scooped by The Historical Cyber Consortium
Scoop.it!

The POODLE Attack and the End of SSL 3.0

The POODLE Attack and the End of SSL 3.0 | Crimeware | Scoop.it
Summary SSL version 3.0 is no longer secure. Browsers and websites need to turn off SSLv3 and use more modern security protocols as soon as ...
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

A Few Thoughts on Cryptographic Engineering: Attack of the week: POODLE

A Few Thoughts on Cryptographic Engineering: Attack of the week: POODLE | Crimeware | Scoop.it
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

12 years old and finally over: Is the Harkonnen Operation the longest-running malware campaign so far? | ZDNet

12 years old and finally over: Is the Harkonnen Operation the longest-running malware campaign so far? | ZDNet | Crimeware | Scoop.it
Cyber-criminals targeting European corporations and governments managed to stay undetected since 2002 - until one security company found them.
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

WikiLeaks posts 'weaponized malware' for all to download | ZDNet

WikiLeaks posts 'weaponized malware' for all to download | ZDNet | Crimeware | Scoop.it
The long and sordid story of WikiLeaks takes an astonishingly irresponsible and very dangerous turn.
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

JP Morgan Says About 76 Million Households Affected By Cyber Breach - Wall Street Journal

JP Morgan Says About 76 Million Households Affected By Cyber Breach - Wall Street Journal | Crimeware | Scoop.it
J.P. Morgan said contact information for about 76 million households and about 7 million small businesses was compromised in a cybersecurity attack detected this summer.
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

Cybercriminals Target Steam Users with New Trojan | SecurityWeek.Com

Many users of Steam, Valve’s online gaming platform, have complained over the past few weeks about game items getting stolen, and the culprit appears to be a new piece of malware.
more...
No comment yet.
Rescooped by The Historical Cyber Consortium from Identity Theft
Scoop.it!

Salesforce warns customers of malware attack

Salesforce warns customers of malware attack | Crimeware | Scoop.it
A new version of the Dyreza online banking Trojan is stealing Salesforce.com log-in credentials
more...
No comment yet.
Scooped by The Historical Cyber Consortium
Scoop.it!

Chip and pin security fears revealed

Chip and pin security fears revealed | Crimeware | Scoop.it
Could chip and pin technology be open to a new type of "skimming" fraud which is being used to steal people's cash? (RT @BBCLondonNews: Could chip and pin be open to a new type of "skimming" fraud to steal people's cash?
more...
No comment yet.
Rescooped by The Historical Cyber Consortium from Finance
Scoop.it!

Cyber crooks may have stolen billions in Brazilian online payments

(Reuters) - Cyber criminals may have stolen billions of dollars from a popular Brazilian online payment system using malicious software that caused the funds to be sent to accounts controlled by fraudsters,
more...
No comment yet.