blog trackingRealtime Web Statistics Criminals Archives - Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘Criminals’

Police want white hat hackers to catch Ashley Madison criminals

Source: National Cyber Security – Produced By Gregory Evans

Toronto police have appealed to the ‘white hat’ hacker community for help in tracking down Impact Team, the perpetrators of the Ashley Madison data breach, after revealing two people may have taken their own lives due to the leaks. “Team Impact,” Superintendent Bryce Evans said at a press conference, directly addressing the criminals behind the hack, “I want to make it very clear to you — your actions are illegal and will not be tolerated.” Evans said the suicide reports were unconfirmed as yet, and it is unknown if it was members of the site or other persons who had been killed. But Toronto Police stressed the “enormous social and economic fallout” caused by the hackers, who published the usernames, real names, street addresses and partial credit card numbers of some 36 million dating site users. Evans thanked the open source tech community for its help so far, and told journalists that Avid Life Media — owners of Ashley Madison and sister dating site Established Men — is offering a reward of $500,000 to anyone providing information that leads to the identification, arrest or prosecution of the person or people behind the hack. “You know the Impact Team has crossed […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Police want white hat hackers to catch Ashley Madison criminals appeared first on National Cyber Security.

View full post on National Cyber Security

Police force pioneers new technology to catch criminals on the roads

Source: National Cyber Security – Produced By Gregory Evans

A NEW generation of Automatic Number Plate Recognition (ANPR) cameras are being rolled out across North Yorkshire as part of a £1m investment to catch travelling criminals. The first phase of new, moveable cameras, known as re-deployable cameras, has been introduced following an announcement of substantial investment in ANPR technology by the force last year. The cameras use the very latest technology to produce enhanced images and have the ability to capture distinguishing marks on a vehicle. North Yorkshire Police force is the first in the UK to use this model of ANPR camera. It works by reading the registration number of a vehicle and after checking the number against a database of information will issue an alarm if the vehicle is linked to criminality. They are used by the police to prevent and detect crime, as well as helping search for vulnerable missing people, wanted criminals and to target uninsured and untaxed vehicles. The cameras will be used by local police teams to tackle crime issues in their area. If an area is experiencing a spate of crime such as burglaries, the local policing team can request ANPR cameras in that area until the issue has been resolved. The […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Police force pioneers new technology to catch criminals on the roads appeared first on National Cyber Security.

View full post on National Cyber Security

Money secrets of cyber criminals revealed

Source: National Cyber Security – Produced By Gregory Evans

A cyber criminal economic network ensures the continued operations of illicit activities on the web, a new report has found. According to the Criminal Hideouts for Lease: Bulletproof Hosting Services report by security firm Trend Micro, criminals find economic infrastructure for their internet activities through hosting malicious content on Bulletproof Hosting Services (BPHS). These hosting services typically take serious measures to guard against law enforcement activities and will readily host content for a fee. “The reputation of BPHS providers also relies on how long they’ve been serving customers in the cyber criminal underground without having to change their name or domain. Being able to keep their name or domain for a long time shows that they are able to ensure the confidentiality of their customers’ activities from the prying eyes of security researchers and law enforcers,” the report says. Pricing for hosting depends on the kind of content being hosted. For low risk content, BPHS providers will charge around $2 per month, but that price goes up to $300 for “critical infrastructure projects or high-risk content”. Popular content Some of the high risk content includes child pornography and exploitation as well as malware and botnet command and control software hosted […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Money secrets of cyber criminals revealed appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber criminals are most likely to go after your sales staff

Source: National Cyber Security – Produced By Gregory Evans

UK sales staff are the most likely to suffer a cyber attack, according to a new report from Intel Security, cited by Computer Business Review. Their frequent online contact with non-staff members makes companies’ sales teams more vulnerable to online attacks than other workers or even the company chief technology officer (CTO). Call centre and customer services teams are next in line for attack, said the report. Even so, companies are failing to provide security training to non-technical staff, claims Intel Security. More than half (51%) of UK companies do not provide their sales staff with IT security training, despite the risks. Meanwhile, one in ten UK companies are failing to provide any of their staff with mandatory online security training. This is the highest rate across Europe. At the same time, the researchers noted a rise in the number of untrained staff clicking on dangerous links and unwittingly exposing their organisation to a browser attack. The number of suspect URLs soared 87% between 2013 and 2014. Advanced stealth attacks (which disguise themselves to sneak into company networks) are also on the rise – Intel Security uncovered 387 new threats every minute. Browser attacks, along with network abuse, stealthy attacks, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber criminals are most likely to go after your sales staff appeared first on National Cyber Security.

View full post on National Cyber Security

Global hunt for cyber criminals behind online black market

Source: National Cyber Security – Produced By Gregory Evans

High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. Seventy people across the globe have been charged or face search warrants in connection to the online hacking marketplace Darkode, which has been shut down in an investigation that spanned 20 countries in the largest takedown of a cyber crime forum. Darkode was used by cyber criminals as a black market for credit card data, hacking tools, ransomware, email addresses and other information useful in targeting individuals, companies and governments. High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. h Of the 70 people wanted in relation to Darkode, 28 have been arrested and 12 are facing charges in the US. A notice on darkode.com on Wednesday said the domain and website had been seized by the FBI and the US attorney’s office in Pittsburgh. “Of the roughly 800 criminal internet forums worldwide, […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Global hunt for cyber criminals behind online black market appeared first on National Cyber Security.

View full post on National Cyber Security

10 Cyber Criminals On The Most Wanted List Still At Large In The World

Source: National Cyber Security – Produced By Gregory Evans

The FBI recently updated its list of Most Wanted Men. But this time it is cyber criminals who top the list, and not terrorists, murderers, drug dealers, psychopaths or rapists who usually find an easy entry on the FBI’s hit list. Cyber criminals are a relatively new breed of criminals who are highly educated, intelligent, talented, clever and sophisticated. These criminals can, by the click of a mouse, rob millions, steal confidential databases, dupe online users, hack your account and maybe even steal your identity. These computer geeks commit illegal activities online and are popularly known as hackers. Take a look at who’s wanted the most. 1. Evgeniy Bogachev This Russian cyber criminal tops the list of FBI’s most wanted hackers in the world. Popularly known as ‘Lucky12345’ and ‘Slavik’, he is the mastermind behind the Zeus Banking Trojan malware which resulted in a theft of $100 million. He is also accused of transferring money to many overseas banks via illegal wire transfers. 2. Nicole Popescu Who would have thought that a fake online auction could fetch you millions? Well this guy thought of it and made it happen. The 34-year-old Romanian is accused of duping Americans with fake auction […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post 10 Cyber Criminals On The Most Wanted List Still At Large In The World appeared first on National Cyber Security.

View full post on National Cyber Security

Cyber criminals target Bureau of Unclaimed Property

Source: National Cyber Security – Produced By Gregory Evans

Targeting cyber criminals attempting to defraud Floridians of what is rightfully theirs, Chief Financial Officer Jeff Atwater announced last week the arrest of Thomas Harry Penquite and Maria Lourdes Gutierrez after the two allegedly concocted an elaborate scheme designed to steal more than $730,000 from the state of Florida’s unclaimed property program. According to the probable cause affidavit, Penquite and Gutierrez devised a scheme to fraudulently collect unclaimed assets from at least three inactive Florida corporations.  These corporations included Castle Construction & Development Co., Ditco Service Corp., and the Ferrer Network.  By breathing new life into these inactive corporations, the fraudsters attempted to legitimately make claim to funds potentially owed them. An investigation conducted by the Office of Fiscal Responsibility revealed that Penquite and Gutierrez – both of West Palm Beach – had purchased public records associated with each of the corporations and used those records to submit fraudulent reinstatement paperwork with the Florida Department of State. The two co-conspirators also secured UPS private mailboxes registered to each of the corporations and created email addresses in an attempt to assume the identity of these closed companies. “The unclaimed property program works daily to reunite Floridians with what rightfully belongs to them, and I commend the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Cyber criminals target Bureau of Unclaimed Property appeared first on National Cyber Security.

View full post on National Cyber Security

Beating cyber criminals with quantum solutions

Source: National Cyber Security – Produced By Gregory Evans

As hackers get more sophisticated in their cyber crime efforts, we need to look to new technology to make our systems more secure, and potentially unhackable. For some types of hacking, we already know the ultimate answer: quantum physics provides a way to share information with absolute security, guaranteed by the laws of nature. The basic quantum communication idea is simple and elegant. But simple ideas often crash into real-world practicalities. Fortunately, quantum physics research is providing even more sophisticated tools that will finish the job. The technology isn’t mature yet, but it is coming. The key to the problem Here’s the scenario: two parties, call them Alice and Bob, want to send secure messages over a network – perhaps credit card data for an online purchase. Let’s say they each have an identical list of random numbers that is private to them. They can use this list as a secret key to encode and send uncrackable messages. But how do they make the shared key in the first place? With conventional methods that don’t use quantum physics, Alice sends Bob a key that is made up of ordinary bits (0s and 1s) of information. But it is possible that […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Beating cyber criminals with quantum solutions appeared first on National Cyber Security.

View full post on National Cyber Security

How To Outwit The Cunning Cyber Criminals

Users of sites like Facebook, Instagram and Twitter do not always know how the information they make public can be used against them by criminals. Once it is there, erasing digital footprints can be a complex process. On this week’s Swipe, the team speak to experts in the field about what security steps people can take to help prevent an attack. Digitalis Reputation chief executive Dave King told Sky News: “We tell clients to make the right friends, lock the doors and not advertise their whereabouts. Essentially, we are talking about being streetwise in a virtual sense. “All of our digital footprints are growing and as that content about us online grows so to does a criminals ability to use that information, a process we call social engineering, to facilitate crime against us and our families.” Facebook has recently announced its own strategy to help fight cyber crime. Twitter, Yahoo and Tumblr are among some of the big web companies collaborating with them on the project called ThreatExchange. They are sharing information with each other about malicious links, malicious software — or malware — and phishing attempts. They hope to stamp out security threats before they reach subscribers. Veeemotion chief executive […]

View full post on National Cyber Security

MCPF wants cops to stop trend of juvenile criminals

ASA_0564_c1339764_15226_348

Source: National Cyber Security – Produced By Gregory Evans

KUALA LUMPUR: The involvement of juveniles in crime is a new trend which the police and society must give special attention, said Malaysian Crime Prevention Foundation (MCPF) vice-chairman Tan Sri Lee Lam Thye. “We want the non-governmental organisations to have campaigns on crime prevention with interesting activities to get the young generation to participate. “The crime prevention club has also been set up in many schools to make the pupils more aware of the dangers of juvenile crimes,” he said when launching a crime prevention campaign at the Pudu Ulu recreational park in Cheras today. He added there was also a need for more counselling teachers in schools to tackle the problem of juvenile crimes. Lee said that most cases of juvenile crimes was a result of negative peer influence and involvement in gangsterism. According to federal police crime statistics index, from January to October, last year, 9,509 criminal cases involving children were reported compared to 7,647 cases during the same period in 2013 – an increase of 24.3%. The campaign was organised by the MCPF in cooperation with the police, Cybernetics International College of Technology and several other organisations. source: http://www.thesundaily.my/news/1340411

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post MCPF wants cops to stop trend of juvenile criminals appeared first on National Cyber Security.

View full post on National Cyber Security

Page 1 of 712345»...Last »

My Twitter

Gregory D. Evans On Facebook