Internet Crime

First reported Jul 30 2014 - Updated 12 mins ago - 2 reports

Kaspersky: Companies Dangerously Unaware of Virtual Security Threats

So, you’re a solution provider whose end users have steadily begun to embrace virtualization. Great. They’re taking steps to reduce costs and ratchet up their efficiency. In the meantime, many of those same end users are using conventional security solutions ... [Published Channelnomics - 12 mins ago]
First reported 5 hours ago - Updated 22 mins ago - 2 reports

US warns retailers on data-stealing malware

US government cybersecurity watchdogs warned retailers Thursday about malware being circulated that allows hackers to get into computer networks and steal customer data.The Department of Homeland Security's Computer Emergency Readiness Team said retailers ... [Published PhysOrg.com - 1 hour ago]
First reported 48 mins ago - Updated 25 mins ago - 2 reports

Twitter buys a password security startup, then sets it free

NOTE: GrowthBeat -- VentureBeat's provocative new marketing-tech event -- is a week away. Twitter just scooped up password security startup Mitro, its second acquisition this week. Mitro is a secure password manager that lets users share password information ... [Published Atlanta Journal And Constitution - 25 mins ago]
First reported 5 hours ago - Updated 27 mins ago - 4 reports

Voter ID law upheld, tweaked

The State Supreme Court has upheld Wisconsin’s voter ID law but has altered a provision of the measure so people can obtain identification cards at no cost.The court ruled in two separate cases, one from the NAACP and one from the League of Women Voters, ... [Published IB Madison - 27 mins ago]
First reported 5 hours ago - Updated 28 mins ago - 3 reports

Paddy Power admits hackers stole details of 600,000 users four years ago

Gambling website Paddy Power admits that hackers stole the personal details of more than 600,000 customers in a cyber attack four years ago, but that it failed to announce it publicly - now a Canadian man has been found in possession of the information ... [Published Telegraph - 3 hours ago]
First reported 6 hours ago - Updated 1 hour ago - 2 reports

Fake Evernote Notification Spam Comes With Malware Attachment

Cybercriminals taking advantage of the popularity of certain legitimate applications is nothing new, and this spam attack that leverages Evernote's credibility and usefulness is but one of the many examples of why this is true. Our engineers found this ... [Published Trend Micro - 1 hour ago]
Entities: Spam, Evernote, Malware, Fake
First reported 5 hours ago - Updated 2 hours ago - 3 reports

Federal court system warns of new e-mail jury scam

US CourtsThe US Federal Court System is warning people of yet another scam targeting potential jurors.This time around the Administrative Office of the U.S. Courts says citizens are getting e-mails claiming they have been selected for jury service and ... [Published NetworkWorld - 2 hours ago]
First reported Jul 30 2014 - Updated 3 hours ago - 3 reports

Nation's Top Ten Consumer Complaints

- Do-not-call violations and other telemarketing abuses were the fastest-growing complaints in 2013, according to the latest report from the annual survey of state and local consumer protection agencies conducted by Consumer Federation of America (CFA) ... [Published YubaNet - 3 hours ago]
First reported Jul 30 2014 - Updated 8 hours ago - 6 reports

Many antivirus products are riddled with security flaws

It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned. According ... [Published Security - Infoworld - 8 hours ago]
First reported Jul 30 2014 - Updated 12 hours ago - 6 reports

India security to mark $1.06 billion by 2015

According to research firm Gartner, Indian security market is expected to reach $ 1.06 billion by 2015. This prediction is based on the increasing number of enterprises which are investing in security solutions to protect their business, especially in ... [Published ITvoir.com - 12 hours ago]
First reported Jul 29 2014 - Updated Jul 30 2014 - 6 reports

Internet of Things devices riddled with security errors, claims HP

Internet of Things (IoT) devices are riddled with basic security flaws, such as weak passwords, unencrypted network services, insecure interfaces and cross-site scripting risks.That is the conclusion of a study into 10 connected devices examined by HP ... [Published Computing.co.uk - Jul 30 2014]
First reported Jul 29 2014 - Updated Jul 30 2014 - 14 reports

Android fake ID bug exposed

In response to the news that security researchers have discovered an Android flaw that lets malware insert malicious code into other apps, gain access to the user's credit card data and take control of the device's settings, Craig Young, security researcher ... [Published Vigilance Security Magazine - Jul 30 2014]

Quotes

"Apparently my name is being used," said Broward Sheriff's Office Major Don Peterson . "Utilizing my name as a law enforcement officer, they try to get these victims to send money. Basically it's an extortion."
...Larry Ponemon, chairman and founder of the Ponemon Institute. "These fears manifest because they believe their technology is in need of an overhaul and there is a widening gap in the knowledge and resource sharing among IT security professionals and executive staff. Encouragingly, the survey revealed plans for technology and education investment in place for the future."
DHS said it has been working with the security firm Trustwave Spiderlabs "to provide relevant and actionable technical indicators for network defense."
"To make matters worse, cleanup after an incident is hard: Simply reinstalling the operating system – the standard response to otherwise ineradicable malware – does not address BadUSB infections at their root. The USB thumb drive, from which the operating system is reinstalled, may already be infected, as may the hardwired webcam or other USB components inside the computer. A BadUSB device may even have replaced the computer’s BIOS – again by emulating a keyboard and unlocking a hidden file on the USB thumb drive. Once infected, computers and their USB peripherals can never be trusted again."

More Content

All (12278) | News (8747) | Reports (3) | Blogs (3471) | Audio/Video (14) | Fact Sheets (3) | Press Releases (28)
sort by: Date | Relevance
Kaspersky: Companies Dangerously Unaware of Vir... [Published Channelnomics - 12 mins ago]
Woman charged in credit card theft [Published Cumberland Times-News - 21 mins ago]
Twitter buys a password security startup, then ... [Published Atlanta Journal And Constitution - 25 mins ago]
Voter ID law upheld, tweaked [Published IB Madison - 27 mins ago]
Garden City restaurant closed indefinitely afte... [Published Garden City Observer - 37 mins ago]
Line users battle Chinese scammers with ‘hot’ w... [Published Taipei Times Online - 40 mins ago]
Industry News: Microsoft Offers Cybersecurity I... [Published Bank Info Security - 47 mins ago]
Twitter buys a password security startup, then ... [Published Venturebeat - 48 mins ago]
"Scanned Image from a Xerox WorkCentre" spam [Published Dynamoo Blog - 48 mins ago]
Meadowview man facing identity theft charges [Published SWVA Today - 54 mins ago]
Scammers Are Using Sexts To Extort Thousands Of... [Published Business Insider - 56 mins ago]
Forgery, ID theft alleged in Malta [Published Times Union - 1 hour ago]
Safety, security and privacy risks of fitness t... [Published Forbes.com - 1 hour ago]
Global Study: Nearly 30 Percent of Security Pro... [Published FierceITSecurity - 1 hour ago]
Police investigate online fraud claim [Published Bismarck Tribune - 1 hour ago]
Breach level index shows extent of data records... [Published Pro Security Zone - 1 hour ago]
Scammers attack New Jersey! [Published Kim Komando - 1 hour ago]
US warns retailers on data-stealing malware [Published PhysOrg.com - 1 hour ago]
MINOT N.D. POLICE DPARTMENT CRACKING DOWN ON TE... [Published Montana News Association - 1 hour ago]
Feds Order “Tech Support” Scammers to Pay Milli... [Published Connecticut Business News Journal - 1 hour ago]
Bushwhacked: Scammers keep us on our toes [Published Bendigo Advertiser - 1 hour ago]
Fake Evernote Notification Spam Comes With Malw... [Published Trend Micro - 1 hour ago]
Police, Banks Issue Security Alerts After Uptic... [Published Maryland Coast Dispatch - 1 hour ago]
USB security is fundamentally broken, claim sec... [Published Cult of Mac - 1 hour ago]
(New) Internet fraud attempts increase in Nez P... [Published Klew 3 - 2 hours ago]
Farmers offered security device at discounted rate [Published Impartial Reporter - 2 hours ago]
Malicious USB device firmware the next big infe... [Published Net Security - 2 hours ago]
Federal court system warns of new e-mail jury scam [Published NetworkWorld - 2 hours ago]
Judge rules on warrant for Microsoft emails [Published Latest Econwatch Headlines - CBS News - 2 hours ago]
Judge rules on warrant for Microsoft emails [Published Latest Tech Talk Headlines - CBS News - 2 hours ago]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Twitter buys a password security startup, then ... [Published Venturebeat - 48 mins ago]
Image Credit: Mitro Twitter just scooped up password security startup Mitro, its second acquisition this week. Mitro is a secure password manager that lets users share password information within specified groups. The software uses encryption to ensure ...
"Scanned Image from a Xerox WorkCentre" spam [Published Dynamoo Blog - 48 mins ago]
This is a thoroughly old school spam with a malicious attachment.Date:Thu, 31 Jul 2014 18:16:08 +0000 [14:16:08 EDT]From:Local Scan [scan.614@victimdomain]Subject:Scanned Image from a Xerox WorkCentreYou have a received a new image from Xerox WorkCentre.Sent ...
USB security is fundamentally broken, claim sec... [Published Cult of Mac - 1 hour ago]
According to findings by security researchers Karsten Nohl and Jakob Lell, USB sticks may be profoundly broken, with no way around it. Nohl and Lell have highlighted a flaw in USB devices which potentially offer hackers the ability to sidestep… Read more ...
Judge rules on warrant for Microsoft emails [Published Latest Econwatch Headlines - CBS News - 2 hours ago]
U.S. law enforcement wants to force software company to turn over emails stored in Ireland ...
Judge rules on warrant for Microsoft emails [Published Latest Tech Talk Headlines - CBS News - 2 hours ago]
U.S. law enforcement wants to force software company to turn over emails stored in Ireland ...
1 2 3 4 5 6 7 8 9 10 ...

Audio/Video

sort by: Date | Relevance
Credit Minute - ID Theft Scheme Brought Down [Published Wall Street Journal What's News - Jul 24 2014]
Credit Minute - Dating Sites and ID Thieves [Published Wall Street Journal What's News - Jul 22 2014]
U.S. captures suspected ringleader of Benghazi ... [Published Reuters Video: Top News - Jun 17 2014]
YMM AM - Avoiding ID Theft While on Vacation [Published Wall Street Journal's Your Money Matters - Jun 16 2014]
How to beat world's deadliest virus [Published Reuters Video: Business - Jun 09 2014]
1 2 3

Press Releases

sort by: Date | Relevance
Consumer Needs for Identity Theft Security Grow... [Published Financial Services - Jul 25 2014]
Rainbow International Corporation Warns Public ... [Published GlobeNewswire: Advertising News - Jun 29 2014]
Over One Million Consumers Enroll in Credit Ses... [Published Financial Services - Jun 19 2014]
Speech: Karen Bradley Speech on UK Cyber Security [Published Keeping the UK safe in cyber space - Activity o ... - Jun 17 2014]
Speech: Karen Bradley Speech on Managing Cyber ... [Published Keeping the UK safe in cyber space - Activity o ... - Jun 17 2014]
1 2 3 4 5 6
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.