blog trackingRealtime Web Statistics Criminals | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Criminals’

Money secrets of cyber criminals revealed

Source: National Cyber Security – Produced By Gregory Evans

A cyber criminal economic network ensures the continued operations of illicit activities on the web, a new report has found. According to the Criminal Hideouts for Lease: Bulletproof Hosting Services report by security firm Trend Micro, criminals find economic infrastructure for their internet activities through hosting malicious content on Bulletproof Hosting Services (BPHS). These hosting services typically take serious measures to guard against law enforcement activities and will readily host content for a fee. “The reputation of BPHS providers also relies on how long they’ve been serving customers in the cyber criminal underground without having to change their name or domain. Being able to keep their name or domain for a long time shows that they are able to ensure the confidentiality of their customers’ activities from the prying eyes of security researchers and law enforcers,” the report says. Pricing for hosting depends on the kind of content being hosted. For low risk content, BPHS providers will charge around $2 per month, but that price goes up to $300 for “critical infrastructure projects or high-risk content”. Popular content Some of the high risk content includes child pornography and exploitation as well as malware and botnet command and control software hosted […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Money secrets of cyber criminals revealed appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber criminals are most likely to go after your sales staff

Source: National Cyber Security – Produced By Gregory Evans

UK sales staff are the most likely to suffer a cyber attack, according to a new report from Intel Security, cited by Computer Business Review. Their frequent online contact with non-staff members makes companies’ sales teams more vulnerable to online attacks than other workers or even the company chief technology officer (CTO). Call centre and customer services teams are next in line for attack, said the report. Even so, companies are failing to provide security training to non-technical staff, claims Intel Security. More than half (51%) of UK companies do not provide their sales staff with IT security training, despite the risks. Meanwhile, one in ten UK companies are failing to provide any of their staff with mandatory online security training. This is the highest rate across Europe. At the same time, the researchers noted a rise in the number of untrained staff clicking on dangerous links and unwittingly exposing their organisation to a browser attack. The number of suspect URLs soared 87% between 2013 and 2014. Advanced stealth attacks (which disguise themselves to sneak into company networks) are also on the rise – Intel Security uncovered 387 new threats every minute. Browser attacks, along with network abuse, stealthy attacks, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber criminals are most likely to go after your sales staff appeared first on National Cyber Security.

View full post on National Cyber Security

Global hunt for cyber criminals behind online black market

Source: National Cyber Security – Produced By Gregory Evans

High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. Seventy people across the globe have been charged or face search warrants in connection to the online hacking marketplace Darkode, which has been shut down in an investigation that spanned 20 countries in the largest takedown of a cyber crime forum. Darkode was used by cyber criminals as a black market for credit card data, hacking tools, ransomware, email addresses and other information useful in targeting individuals, companies and governments. High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. h Of the 70 people wanted in relation to Darkode, 28 have been arrested and 12 are facing charges in the US. A notice on darkode.com on Wednesday said the domain and website had been seized by the FBI and the US attorney’s office in Pittsburgh. “Of the roughly 800 criminal internet forums worldwide, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Global hunt for cyber criminals behind online black market appeared first on National Cyber Security.

View full post on National Cyber Security

10 Cyber Criminals On The Most Wanted List Still At Large In The World

Source: National Cyber Security – Produced By Gregory Evans

The FBI recently updated its list of Most Wanted Men. But this time it is cyber criminals who top the list, and not terrorists, murderers, drug dealers, psychopaths or rapists who usually find an easy entry on the FBI’s hit list. Cyber criminals are a relatively new breed of criminals who are highly educated, intelligent, talented, clever and sophisticated. These criminals can, by the click of a mouse, rob millions, steal confidential databases, dupe online users, hack your account and maybe even steal your identity. These computer geeks commit illegal activities online and are popularly known as hackers. Take a look at who’s wanted the most. 1. Evgeniy Bogachev This Russian cyber criminal tops the list of FBI’s most wanted hackers in the world. Popularly known as ‘Lucky12345’ and ‘Slavik’, he is the mastermind behind the Zeus Banking Trojan malware which resulted in a theft of $100 million. He is also accused of transferring money to many overseas banks via illegal wire transfers. 2. Nicole Popescu Who would have thought that a fake online auction could fetch you millions? Well this guy thought of it and made it happen. The 34-year-old Romanian is accused of duping Americans with fake auction […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post 10 Cyber Criminals On The Most Wanted List Still At Large In The World appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber criminals target Bureau of Unclaimed Property

Source: National Cyber Security – Produced By Gregory Evans

Targeting cyber criminals attempting to defraud Floridians of what is rightfully theirs, Chief Financial Officer Jeff Atwater announced last week the arrest of Thomas Harry Penquite and Maria Lourdes Gutierrez after the two allegedly concocted an elaborate scheme designed to steal more than $730,000 from the state of Florida’s unclaimed property program. According to the probable cause affidavit, Penquite and Gutierrez devised a scheme to fraudulently collect unclaimed assets from at least three inactive Florida corporations.  These corporations included Castle Construction & Development Co., Ditco Service Corp., and the Ferrer Network.  By breathing new life into these inactive corporations, the fraudsters attempted to legitimately make claim to funds potentially owed them. An investigation conducted by the Office of Fiscal Responsibility revealed that Penquite and Gutierrez – both of West Palm Beach – had purchased public records associated with each of the corporations and used those records to submit fraudulent reinstatement paperwork with the Florida Department of State. The two co-conspirators also secured UPS private mailboxes registered to each of the corporations and created email addresses in an attempt to assume the identity of these closed companies. “The unclaimed property program works daily to reunite Floridians with what rightfully belongs to them, and I commend the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber criminals target Bureau of Unclaimed Property appeared first on National Cyber Security.

View full post on National Cyber Security

Beating cyber criminals with quantum solutions

Source: National Cyber Security – Produced By Gregory Evans

As hackers get more sophisticated in their cyber crime efforts, we need to look to new technology to make our systems more secure, and potentially unhackable. For some types of hacking, we already know the ultimate answer: quantum physics provides a way to share information with absolute security, guaranteed by the laws of nature. The basic quantum communication idea is simple and elegant. But simple ideas often crash into real-world practicalities. Fortunately, quantum physics research is providing even more sophisticated tools that will finish the job. The technology isn’t mature yet, but it is coming. The key to the problem Here’s the scenario: two parties, call them Alice and Bob, want to send secure messages over a network – perhaps credit card data for an online purchase. Let’s say they each have an identical list of random numbers that is private to them. They can use this list as a secret key to encode and send uncrackable messages. But how do they make the shared key in the first place? With conventional methods that don’t use quantum physics, Alice sends Bob a key that is made up of ordinary bits (0s and 1s) of information. But it is possible that […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Beating cyber criminals with quantum solutions appeared first on National Cyber Security.

View full post on National Cyber Security

How To Outwit The Cunning Cyber Criminals

Users of sites like Facebook, Instagram and Twitter do not always know how the information they make public can be used against them by criminals. Once it is there, erasing digital footprints can be a complex process. On this week’s Swipe, the team speak to experts in the field about what security steps people can take to help prevent an attack. Digitalis Reputation chief executive Dave King told Sky News: “We tell clients to make the right friends, lock the doors and not advertise their whereabouts. Essentially, we are talking about being streetwise in a virtual sense. “All of our digital footprints are growing and as that content about us online grows so to does a criminals ability to use that information, a process we call social engineering, to facilitate crime against us and our families.” Facebook has recently announced its own strategy to help fight cyber crime. Twitter, Yahoo and Tumblr are among some of the big web companies collaborating with them on the project called ThreatExchange. They are sharing information with each other about malicious links, malicious software – or malware – and phishing attempts. They hope to stamp out security threats before they reach subscribers. Veeemotion chief executive […]

View full post on National Cyber Security

MCPF wants cops to stop trend of juvenile criminals

ASA_0564_c1339764_15226_348

Source: National Cyber Security – Produced By Gregory Evans

KUALA LUMPUR: The involvement of juveniles in crime is a new trend which the police and society must give special attention, said Malaysian Crime Prevention Foundation (MCPF) vice-chairman Tan Sri Lee Lam Thye. “We want the non-governmental organisations to have campaigns on crime prevention with interesting activities to get the young generation to participate. “The crime prevention club has also been set up in many schools to make the pupils more aware of the dangers of juvenile crimes,” he said when launching a crime prevention campaign at the Pudu Ulu recreational park in Cheras today. He added there was also a need for more counselling teachers in schools to tackle the problem of juvenile crimes. Lee said that most cases of juvenile crimes was a result of negative peer influence and involvement in gangsterism. According to federal police crime statistics index, from January to October, last year, 9,509 criminal cases involving children were reported compared to 7,647 cases during the same period in 2013 – an increase of 24.3%. The campaign was organised by the MCPF in cooperation with the police, Cybernetics International College of Technology and several other organisations. source: http://www.thesundaily.my/news/1340411

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post MCPF wants cops to stop trend of juvenile criminals appeared first on National Cyber Security.

View full post on National Cyber Security

More criminals being caught due to cloud technology

icloud

Source: National Cyber Security – Produced By Gregory Evans

HOUSTON – When Randy Schaefer’s iPad was stolen he never thought he’d see it again. The device, along with $5,000 cash were stolen when his truck was broken into while parked on the street in front of his home in his River Oaks neighborhood. Then, Schaefer found selfies of two men posing with a wad of cash on his iCloud account. “There were several pictures,” Schaefer said. “There were about 15 pictures.” The two even made a video bragging about their crime. The video was uploaded to the Internet and went viral, making national headlines. “Hello America. This is Dorian from the Money Team. This is my brother, Dillan, also Money Team, and this my good people is what we get from a good night’s hustle,” the man who called himself Dorian said as he held up a stack of $100 bills. “We doing ‘Big Face Ben’ over here [in reference to Benjamin Franklin] new, old, we just hustle. Don’t worry about how.” But, there was just one thing they were apparently unaware of when they snapped the selfies and video; the iPad was backed up to Schaefer’s iCloud, and led police straight to them. “I feel relieved they finally […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post More criminals being caught due to cloud technology appeared first on National Cyber Security.

View full post on National Cyber Security

Comprehensive review of law enforcement system crucial for countering criminals’ new strategies

1424588754848

Source: National Cyber Security – Produced By Gregory Evans

 Powered by Max Banner Ads Strong international, technological, political and social forces are changing the criminal challenge to Australia. The increasing use of cyberspace to perpetrate crime, the growing internationalisation of criminal networks, and the widening range of economic activities that can be exploited by criminals are leading this change. This means that the Australian Government will to need to take a greater role in law enforcement in the future. But so far, the Commonwealth’s responses to these challenges have been evolutionary, reactive or incremental. While they include excellent innovations, some change occurs because events make recent decisions redundant – a concern demonstrated in the recent major counterterrorism spending package. There are also questions about where national leadership is needed to meet these challenges, and whether our current responses, particularly to serious and organised crime, are still optimal. All our law enforcement agencies face important organisational challenges, especially in getting people with the right skills, sharing information and incorporating technology into their operations. An examination of these factors will show that it’s time for the federal cabinet to take a coordinated and strategic look at the government’s law enforcement responsibilities, starting with a review and leading to a white paper on […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Comprehensive review of law enforcement system crucial for countering criminals’ new strategies appeared first on National Cyber Security.

View full post on National Cyber Security

Page 1 of 712345»...Last »

My Twitter

Gregory D. Evans On Facebook