IT Brief UK - Technology news for CIOs & IT decision-makers

Cybercrime stories - Page 21

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Story image
Holiday alert: Cyberattacks can rise over 20 per cent starting now
Wed, 29th Nov 2017
#
cybersecurity
#
carbon black
#
cybercrime
As we approach the holidays organisations need to be on the lookout for cyber attacks if history offers an indication of what's to come.
Story image
Cybercrime selling like hotcakes: Ransomware sales soar 2500% in one year
Tue, 28th Nov 2017
#
malware
#
ransomware
#
cybersecurity
​The way criminals ply their trade has changed dramatically since the rise of the digital era, and not for the better – at least for the victims.
Story image
Cisco & Interpol embark on rapid threat intelligence sharing partnership
Mon, 27th Nov 2017
#
cybersecurity
#
cisco
#
cybercrime
Cisco and INTERPOL’s Global Complex for Innovation (IGCI) are now working together to share threat intelligence.
Story image
Round 2: New line-up of cybersecurity maestros comment on Uber breach
Fri, 24th Nov 2017
#
firewalls
#
breach prevention
#
ai security
We covered an expert commentary story of the Uber breach - this is round 2 with Check Point, Barracuda, Digital Shadows, Mimecast, and Webroot.
Story image
Experts share their opinions on Uber breach - some supportive, some scathing
Thu, 23rd Nov 2017
#
firewalls
#
network infrastructure
#
network security
A number of experts have come forward to share their opinions on the huge Uber breach affecting 57m people that was kept under wraps for a year.
Story image
Why business is looking good for ransomware criminals
Wed, 22nd Nov 2017
#
malware
#
ransomware
#
cybersecurity
New findings from a report that Carbon Black has released show it is easier than ever for criminals to extort money from victims through ransomware.
Story image
A force multiplier solution – the answer to the security skills gap crisis
Wed, 22nd Nov 2017
#
risk & compliance
#
cybersecurity
#
cso / ciso
​It’s no secret that there is a yawning skills gap in the cybersecurity industry - but now RSA has come up with a way to 'multiply' your staff.
Story image
Police say everyone in UK has been hacked – Expert says not quite
Tue, 21st Nov 2017
#
data privacy
#
cybersecurity
#
dark web
UK's Police representatives have revealed virtually everyone in the country has been hacked, however, High-Tech Bridge's CEO disagrees.
Story image
Expert says Cash Converters cybersecurity breach ‘yet ANOTHER wakeup call’
Tue, 21st Nov 2017
#
breach prevention
#
cybersecurity
#
data breach
Cash Converters breached, hackers have access to UK customer account details, usernames, passwords, addresses and partial credit card numbers.
Story image
Mobile security starts with a powerful AI-based scanning engine
Fri, 17th Nov 2017
#
smartphones
#
wireless networks
#
ai
This principal analyst from Camden Associates says the secret sauce to securing mobile users is AI-based zero packet inspection.
Story image
'Leaker' behind massive NSA breach possibly still working at agency
Wed, 15th Nov 2017
#
breach prevention
#
cybersecurity
#
nsa
A cybersecurity expert has said it is a ‘stunning admission’ by the former CIA director about the NSA breach that is being touted as catastrophic.
Story image
Current IT security not up to the job – time to make some changes
Tue, 14th Nov 2017
#
data protection
#
iot
#
breach prevention
IDC says billions of dollars are spent around the world every year on various forms of IT security, and yet, data breaches are still happening.
Story image
ESET survey: Lack of funding a major problem for Japan SMBs
Mon, 13th Nov 2017
#
malware
#
cybersecurity
#
smb
Small and medium-sized businesses (SMBs) in Japan are struggling to enhance their cybersecurity due to the high costs involved, according to a survey by ESET.
Story image
Lessons learned from the latest ransomware attacks - there's more to come
Fri, 10th Nov 2017
#
malware
#
ransomware
#
cybersecurity
According to Europol, Europe needs to prepare itself for a large increase in the number of cyber-attacks - an expert discusses what lies ahead.
Story image
Experts discuss implications of massive Paradise Papers leak
Fri, 10th Nov 2017
#
cybersecurity
#
data leak
#
cybercrime
Leaked Paradise Papers shed light on offshore secrets of the rich and powerful, sparking global debate and security concerns.
Story image
CASE STUDY: War on ransomware marching forward with Europol coalition
Tue, 7th Nov 2017
#
malware
#
firewalls
#
ddos
Authorities estimated global losses from ransomware in 2016 to be more than $200 billion - this coalition was formed to address this.
Story image
Expert says effective IT security starts with effective training
Tue, 7th Nov 2017
#
malware
#
it training
#
cybersecurity
Tony Glass, GM & VP EMEA at Skillsoft, discusses why effective training holds the key to robust IT security in a challenging business environment.
Story image
Illicit code signing certificates more valuable than handguns
Sat, 4th Nov 2017
#
cybersecurity
#
venafi
#
dark web
Venafi has released its findings of a six month investigation into the lucrative sale of digital code signing certificates on the dark web.
Story image
How Bitcoin’s blockchain is aiding cybersecurity
Tue, 31st Oct 2017
#
cryptocurrency
#
blockchain
#
cybersecurity
Bitcoin defies a unique set of security concerns through innovations and structures which are influencing how cybersecurity will face new threats.
Story image
Check Point uncovers major security flaw in LG smart devices
Fri, 27th Oct 2017
#
cybersecurity
#
hackers
#
cybercrime
The vulnerabilities in the SmartThinQ mobile app and cloud application enabled hackers to gain control of home appliances and spy on users.