eCommerceNews New Zealand - Technology news for digital commerce decision-makers

Cybercrime stories - Page 41

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Security wall breach

BT says investing in all the latest cybersecurity is no silver bullet

Tue, 29th Aug 2017
#
malware
#
ransomware
#
cybersecurity
Throwing money at cybersecurity is a mistake that can make firms a target not just for cyber criminals but also for over-zealous IT salespeople.
Thinkstockphotos 641382150

Survey reveals digital transformation playing into cybercriminals' hands

Thu, 24th Aug 2017
#
digital transformation
#
cybersecurity
#
cybercrime
Digital transformation has many positives but it also benefits cybercrime as organisations are trying to walk before they can crawl.
Thinkstockphotos 87660809

New report reveals hackers weaponising old vulnerabilities

Wed, 23rd Aug 2017
#
malware
#
ddos
#
cybersecurity
Akamai's Q2 2017 report shows a 28% increase in DDoS attacks, with the PBot malware being a major contributor.
Data breached by hacker

Two dark web markets shut down but expert says 'one door closes, a window opens'

Tue, 22nd Aug 2017
#
cybersecurity
#
market
#
dark web
The recent shutdown of AlphaBay and Hansa has left dark web marketplaces on shaky ground, says Digital Shadows CEO Alastair Paterson.
Cyber tool kit

Global cybersecurity spending to reach USD$93b in 2018 – GDPR a main driver

Wed, 16th Aug 2017
#
devops
#
dlp
#
apm
Gartner's latest findings reveal a burgeoning cybersecurity market that is in line with growing awareness and the imminent GDPR.
Mountain documents

Comodo opens up threat library to public – almost 100m incidents in Q217 alone

Fri, 11th Aug 2017
#
advanced persistent threat protection
#
cybersecurity
#
cyber threat
​Comodo has opened its 'library' to university, governmental, and non-profit educators and researchers in an industry-first.
Data out the backdoor

HBO breach: Centrify says 'winter is coming' for passwords

Thu, 10th Aug 2017
#
cybersecurity
#
hbo
#
centrify
HBO's soft underbelly was laid bare to the world after hackers stole 1.5 TB of data from its systems - Centrify says passwords' days are limited.
Targeting cyber threats

Cybercrime: What to expect for the rest of 2017 and how to prepare

Wed, 9th Aug 2017
#
malware
#
ddos
#
vpns
​So far this year we have already borne witness to a multitude of serious cybercrime. NordVPN has provided insights for what the second half may hold.
Hand data

Want to cause chaos? ICIT says hacking elections is easy

Mon, 7th Aug 2017
#
ddos
#
cybersecurity
#
elections
Hackers at DEFCON were able to exploit vulnerabilities in voting machines in a matter of minutes - ICIT breaks down just how easy it is.
Wall break

Dicker Data: What NZ companies need to know about cybersecurity

Fri, 4th Aug 2017
#
malware
#
ransomware
#
cybersecurity
There is a significant weakness with cybersecurity in New Zealand – and according to Dicker Data, it stems from one of our strengths.
Treasure trove

HBO's Game of Thrones treasure chest ransacked by hackers

Tue, 1st Aug 2017
#
malware
#
ransomware
#
cybersecurity
​It would seem winter has come for HBO after hackers have stormed the company's servers and looted the jewels within to leak data online.
Email scam

Nearly a quarter of 'unsafe' emails getting through to user inboxes

Fri, 28th Jul 2017
#
malware
#
ransomware
#
cybersecurity
There is a continuous challenge of securing organisations from malicious attachments, dangerous files type, impersonation attacks as well as spam.
Trojan virus

Malware found prowling within every app of alternative Android store

Thu, 27th Jul 2017
#
malware
#
cybersecurity
#
apps
Malware researcher at ESET, Lukáš Štefanko says this is the first time he has ever seen an entire Android market infected like that.
Cybercriminall

The Dark Web: Is your company at risk?

Thu, 27th Jul 2017
#
risk & compliance
#
cybersecurity
#
opinion
Not only is information on a company's assets available, but information about new techniques to compromise targets is for sale on the dark web.
Data out the backdoor

Cisco reveals alarming findings from Midyear Cybersecurity Report

Wed, 26th Jul 2017
#
malware
#
ransomware
#
cybersecurity
The Cisco Midyear Cybersecurity Report warns of rapidly evolving threats and potential 'destruction of service' (DeOS) attacks.
Data leaky tap

Digital Shadows discovers credit card crime ring cashing in on $24b a year

Tue, 25th Jul 2017
#
risk & compliance
#
cybersecurity
#
credit card fraud
A professional ecosystem has emerged that is providing e-learning courses to allow aspiring cybercriminals to make USD$12k in monthly earnings.
Network padlock broken

Hackers steal $32m of ethereum cryptocurrency – expert commentary and advice

Sat, 22nd Jul 2017
#
crypto
#
blockchain
#
ai security
​In the second heist this week, hackers have stolen around US$32 million - Webroot senior threat analyst shares his commentary and insights.
Screen shot 2017 06 21 at 12

The malware that brought down Ukraine – is it really that sophisticated?

Wed, 21st Jun 2017
#
malware
#
cybersecurity
#
hackers
Tenable director says the significance of this malware as a stand-alone event is in fact quite small - but vendors have some catching up to do.
Thinkstockphotos 653516378

Arbor Networks digs deep into the Lazarus Group's DDoS attacks

Mon, 19th Jun 2017
#
ddos
#
cybersecurity
#
arbor networks
It is not clear whether the IPs listed in the report were part of a command and control infrastructure or simply bots - or both.
Thinkstockphotos 673040004

War of the words: How cybercriminals are selling fake news through the underground

Wed, 14th Jun 2017
#
cybersecurity
#
trend micro
#
cybercrime
Fake news is being sold as a service on the underground market, with criminals offering to manipulate public opinion for a price.