Cybercrime Week in Review 19 September 2015 Fraud Alert: Criminals Test Stolen Credit-Card Numbers on Charity Websites (#Philanthropy) Criminals are using poorly protected charity websites to test the validity of stolen credit-card numbers, cybersecurity experts said this week, costing some groups thousands of dollars. Simplified online donation pages make it easy for people to give…
Windows devices account for 80% of malware infections transmitted via mobile networks
Windows devices account for 80% of malware infections transmitted via mobile networks As PC owners increasingly take to mobile connections for Internet access, malware follows. Microsoft may have just a single-digit slice of the mobile market, but there’s one segment of mobile that it’s winning: Malware infections delivered via mobile networks. According to a Wednesday…
Cybercrime Week in Review 12 September 2015
Cybercrime Week in Review 12 September 2015 Did FFIEC guidelines curb account takeover? Survey says… (PhishLabs) In a recent study conducted by Info Security Media Group (ISMG), respondents indicated that, despite efforts to comply with updated authentication guidance set forth by the Federal Financial Institutions Examination Council (FFIEC), account takeover (ATO) has not decreased. In…
2015 saw 888 data breaches 246 million records compromised worldwide
2015 saw 888 data breaches 246 million records compromised worldwide Gemalto revealed that in the first six months of this year a total of 888 data breaches occurred, compromising 246 million records worldwide. Compared to the first half of 2014, data breaches increased by 10% while the number of compromised data records declined by 41%…
Cybercrime Week in Review 5 September 2015
Cybercrime Week in Review 5 September 2015 Account Takeovers: Did FFIEC Guidance Make a Difference? (Bank Info Security) It’s been four years since the Federal Financial Institutions Examination Council issued its updated authentication guidance, which focuses on helping banks and credit unions defend against account takeover schemes. Since then, institutions have made significant investments to…
49 new Regin backdoor modules discovered
49 new Regin backdoor modules discovered Since Symantec and Kaspersky Lab researchers presented their findings on the Regin backdoor late last year, there has been only one additional publicly revealed sighting of (a part of) the sophisticated espionage tool, and it pointed to the conclusion that the malware is wielded by the Five Eyes intelligence…
Cybercrime Week in Review 29 August 2015
Cybercrime Week in Review 29 August 2015 Chinese spies target US intellectual property (CSO) The U.S. economy is losing hundreds of billions of dollars each year to economic espionage, mainly from China, experts say. Some of the problem is political, but plenty of it is due to a ‘stupefying’ lack of security The Ashley Madison…
Spotting fake invoice scams – what UK SMEs need to know
Spotting fake invoice scams – what UK SMEs need to know How do you know an invoice is genuine? With great difficulty, it turns out UK businesses are coming under attack from by a wave of fake invoicing scams with smaller and medium businesses a favoured target, according to Action Fraud and fraud prevention service…
Cybercrime Week in Review 22 August 2015
Cybercrime Week in Review 22 August 2015 Financially-Motivated Advanced Targeting (Phishlabs) Cybercriminals have recently spent more time zeroing in on a specific target and deploying spear phishing attacks which have resulted in a surge of high-profile security breaches and/or major fraud schemes leaving organizations with millions in financial losses. Smarten Your Data Security or Risk…
Hackers Finally Post Stolen Ashley Madison Data
Hackers Finally Post Stolen Ashley Madison Data Hackers who stole sensitive customer information from the cheating site AshleyMadison.com appear to have made good on their threat to post the data online. A data dump, 9.7 gigabytes in size, was posted on Tuesday to the dark web using an Onion address accessible only through the Tor…