eCommerceNews UK - Technology news for digital commerce decision-makers

Cybercrime stories - Page 41

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Screen shot 2017 09 15 at 1

6 months under siege: the malware story so far in 2017

Sat, 16th Sep 2017
#
malware
#
ransomware
#
cybersecurity
Maya Horowitz, Threat Intelligence Group Manager at Check Point explores the major trends in global malware attacks during the first half of 2017.
Screen shot 2017 09 12 at 10

Expert spells out how businesses can 'block the spears'

Tue, 12th Sep 2017
#
malware
#
email security
#
cybersecurity
There is no doubt about it, but spear-phishing is big business in 2017 - Menlo Security's Jason Steer explains how businesses can protect themselves.
Screen shot 2017 09 07 at 8

Cybercriminals caught targeting gamers with sneaky malware

Fri, 8th Sep 2017
#
malware
#
gaming
#
ddos
Spread via hacked games on unofficial websites, the malware can download and install virtually any other malicious code on the victim's computer.
Phone stealing

What's up with Your mobile apps? Identifying and mitigating digital risk

Thu, 7th Sep 2017
#
cybersecurity
#
apps
#
cloud services
I'll venture to guess you're using a mobile device to read this - while mobile apps offer a host of new opportunities, they also introduce risk.
Criminal underworld

Once prominent infection method now declining - short blip or for good?

Wed, 30th Aug 2017
#
malware
#
cybersecurity
#
software development
An expert from Digital Shadows dissects the once prominent method of infection known as exploit kits and whether they remain a threat.
Security wall breach

BT says investing in all the latest cybersecurity is no silver bullet

Tue, 29th Aug 2017
#
malware
#
ransomware
#
cybersecurity
Throwing money at cybersecurity is a mistake that can make firms a target not just for cyber criminals but also for over-zealous IT salespeople.
Thinkstockphotos 641382150

Survey reveals digital transformation playing into cybercriminals' hands

Thu, 24th Aug 2017
#
digital transformation
#
cybersecurity
#
cybercrime
Digital transformation has many positives but it also benefits cybercrime as organisations are trying to walk before they can crawl.
Thinkstockphotos 87660809

New report reveals hackers weaponising old vulnerabilities

Wed, 23rd Aug 2017
#
malware
#
ddos
#
cybersecurity
Akamai's Q2 2017 report shows a 28% increase in DDoS attacks, with the PBot malware being a major contributor.
Data breached by hacker

Two dark web markets shut down but expert says 'one door closes, a window opens'

Tue, 22nd Aug 2017
#
cybersecurity
#
market
#
dark web
The recent shutdown of AlphaBay and Hansa has left dark web marketplaces on shaky ground, says Digital Shadows CEO Alastair Paterson.
Cyber tool kit

Global cybersecurity spending to reach USD$93b in 2018 – GDPR a main driver

Wed, 16th Aug 2017
#
devops
#
dlp
#
apm
Gartner's latest findings reveal a burgeoning cybersecurity market that is in line with growing awareness and the imminent GDPR.
Mountain documents

Comodo opens up threat library to public – almost 100m incidents in Q217 alone

Fri, 11th Aug 2017
#
advanced persistent threat protection
#
cybersecurity
#
cyber threat
​Comodo has opened its 'library' to university, governmental, and non-profit educators and researchers in an industry-first.
Targeting cyber threats

Cybercrime: What to expect for the rest of 2017 and how to prepare

Wed, 9th Aug 2017
#
malware
#
ddos
#
vpns
​So far this year we have already borne witness to a multitude of serious cybercrime. NordVPN has provided insights for what the second half may hold.
Hand data

Want to cause chaos? ICIT says hacking elections is easy

Mon, 7th Aug 2017
#
ddos
#
cybersecurity
#
elections
Hackers at DEFCON were able to exploit vulnerabilities in voting machines in a matter of minutes - ICIT breaks down just how easy it is.
Cyber criminal

UK SMBs estimate average cost of cyberattack more than £730,000

Wed, 2nd Aug 2017
#
malware
#
ransomware
#
phishing
UK SMBs estimated the average cost of a cyberattack where their customer records or critical business data were stolen at an eye-watering £737,677.
Treasure trove

HBO's Game of Thrones treasure chest ransacked by hackers

Tue, 1st Aug 2017
#
malware
#
ransomware
#
cybersecurity
​It would seem winter has come for HBO after hackers have stormed the company's servers and looted the jewels within to leak data online.
Security wrong man

New report details exploits of notorious cyberespionage group with EMEA targets

Mon, 31st Jul 2017
#
malware
#
cybersecurity
#
government
Known as CopyKittens, the group is politically-motivated and has increasingly been active in pursuing foreign espionage on strategic targets.
Email scam

Nearly a quarter of 'unsafe' emails getting through to user inboxes

Fri, 28th Jul 2017
#
malware
#
ransomware
#
cybersecurity
There is a continuous challenge of securing organisations from malicious attachments, dangerous files type, impersonation attacks as well as spam.
Trojan virus

Malware found prowling within every app of alternative Android store

Thu, 27th Jul 2017
#
malware
#
cybersecurity
#
apps
Malware researcher at ESET, Lukáš Štefanko says this is the first time he has ever seen an entire Android market infected like that.
Cybercriminall

The Dark Web: Is your company at risk?

Thu, 27th Jul 2017
#
risk & compliance
#
cybersecurity
#
opinion
Not only is information on a company's assets available, but information about new techniques to compromise targets is for sale on the dark web.
Data out the backdoor

Cisco reveals alarming findings from Midyear Cybersecurity Report

Wed, 26th Jul 2017
#
malware
#
ransomware
#
cybersecurity
The Cisco Midyear Cybersecurity Report warns of rapidly evolving threats and potential 'destruction of service' (DeOS) attacks.