Cybercrime: ransomware is #1 threat in Europe

Ransomware refers to this type of attack where a hacker locks a computer or file and unlocks it only against a ransom. This is the type of attack which is unfortunately most common, according to Europol, and it will get worse. In its annual report on cybercrime, Europol analyzes new threats that might affect online

Read More...

National Cyber Security Awareness Month

It’s National Cyber Security Awareness Month once again, do you know where your security weaknesses are? Read on to find out how you can stop the leaks and block the freaks. Internet Security, A Game You Can Not Afford To Lose October is National Cyber Security Awareness Month (NCSAM) which means it is once again

Read More...

New techniques of online financial scams

Cybercriminals’ techniques and creativity have no bounder, when it comes to find victims on the Internet. Here are some of the more recent financial scam techniques and how to ensure Internet security: Phishing: the objective is to collect sensitive private data from Internet users, through sending emails purporting to a large number of people from

Read More...

Thieves Steal $13 million in Three Hours from Japanese ATMs

After obtaining thousands of credit and bank card details, an organised crime syndicate consisting around 100 people in a systematic and coordinated attack on cash machines. As the thieves steal $13million in three hours from Japanese ATMs, they were soon quick to leave the country with hardly a trace. The criminals managed to steal 1.4billion yen

Read More...

Public Anonymity In Danger Due to Facial Recognition

FindFace, a newly released smartphone app, has taken Russia by storm and is potentially putting public anonymity in danger due to facial recognition. The app, developed by Artem Kukharenko and Alexander Kabakov, allows users to photograph people and work out their identities, with reliability sitting around 70%. It works by comparing photographs with the social media

Read More...

Twitter Prevents Selling of User Data to Spy Agencies

Collecting data on users has always been a valuable pursuit to certain organisations and companies, especially since the rise of social media via Twitter for example. Up until this point, it has been relatively easy for anyone to collect data that is publicly shared online. But it has been announced that Twitter prevents selling of

Read More...

Hacker Collects Over 272 Million Email Addresses and Passwords

A Russian hacker collects over 272 million email addresses and passwords that he has been collecting over a period of time. As the unnamed hacker collected so many email addresses and passwords, security firm Hold Security, managed to obtain the database. The extent of the data which was collected included email addresses from Yahoo, Gmail and

Read More...

Big Security Changes After Anthem Breach

After the breach of security at many high-profile companies, including Sony Pictures and more recently Anthem, the health insurance company that had over 80 million customer details leaked in an attack last week. This attack is just the latest in a line of breaches that have cost companies millions as well as putting even more people’s

Read More...

Cybercrime is also where you do not expect it

Trend Micro security firm just released its safety report for the first quarter of 2014. As cybercriminals always aim at maximizing their gain, they keep on developing new advanced techniques and diversifying their targets. This report entitled “Cybercrime Hits the Unexpected” describes how cybercriminals now switch to unusual targets: they do work on advanced techniques

Read More...

Cybercrime already more profitable than drug trafficking

When releasing its 2014 safety report on Data Breach Investigation Research, Verizon Wireless, the second largest U.S. security operator, made some comments about the evolution of the dangers on internet. Cybercrime is worth $ 290 billion per year, according to the Mischon de Reya New York law firm, which is specialized in dealing with such

Read More...