SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers

Cybercrime stories - Page 12

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Story image
Musk says AI 'more dangerous than nukes' - expert stays optimistic
Tue, 13th Mar 2018
#
ai
#
cybersecurity
#
cybercrime
Elon Musk spoke at SXSW and used examples of AI's rapid advancements to show why it ‘scares the hell’ out of him - Kolochenko remains optimistic.
Story image
New research finds China tampering with public vulnerability data
Mon, 12th Mar 2018
#
cybersecurity
#
fraud
#
cybercrime
Recorded Future believes China has been altering public vulnerability data to allow the Ministry of State Security to play with it first.
Story image
Engineer says Emirates is virtually handing customer data to hackers
Fri, 9th Mar 2018
#
cloud services
#
storage
#
breach prevention
After the allegations about Emirates' customer data policies emerged, High-Tech Bridge ran a test on the site's security - with interesting results.
Story image
Blueliv makes plea for cybercrime intelligence sharing across industries
Thu, 8th Mar 2018
#
malware
#
uc
#
gdpr
With malware continually evolving, Blueliv says it's crucial that the 'good guys' begin to collaborate in the fight against cybercrime.
Story image
Are remote workers really the answer? Report finds huge security issues
Wed, 7th Mar 2018
#
network infrastructure
#
cloud services
#
network management
​The swelling generation of mobile workers is causing headaches for IT staff with more than half connecting to unsecured networks every week.
Story image
REPORT: Ransomware decreasing in quantity but increasing in potency
Wed, 7th Mar 2018
#
malware
#
ransomware
#
cybersecurity
A new report from SonicWall has shed light on the current threat landscape with the company recording an astonishing 9.32b malware attacks in 2017.
Story image
GDPR is imminent but 69% of businesses can’t secure customer data
Wed, 7th Mar 2018
#
data protection
#
storage
#
gdpr
​GDPR is looming (May 25) over the heads of IT staff throughout Europe and beyond but this survey found data is still not being managed properly.
Story image
Exclusive: Is cybersecurity losing because it’s too profit-focused?
Tue, 6th Mar 2018
#
ai
#
cybersecurity
#
industry experts
Cybercriminals currently have the edge in the battle against cybersecurity, according to High-Tech Bridge CEO Ilia Kolochenko.
Story image
New Zealand is one of the 'Cyber Five' APAC countries most at risk of cyber attacks
Mon, 5th Mar 2018
#
cybersecurity insurance
#
ddos
#
phishing
According to Delta, there is now a perception that a cyber attack victim is punished by publicity, rather than the perpetrator.
Story image
Why banks need to show more initiative in tackling cyber fraud
Thu, 1st Mar 2018
#
ddos
#
malware
#
cybersecurity
Why financial institutions need to combat the increasingly complex and intelligent threat landscape with a holistic security approach.
Story image
Cybercriminals likely to attempt GDPR extortion for greater ROI
Thu, 1st Mar 2018
#
malware
#
ransomware
#
phishing
Trend Micro says cybercriminals are becoming more business-minded and are likely to target organisations that are trying to comply with GDPR.
Story image
Unwanted cybercrime awards: Russia tops ‘dark web medals’ table
Wed, 28th Feb 2018
#
dark web
#
email security
#
cybersecurity
RepKnight published an 'alternative olympics' medal table that details the countries that feature most heavily on the dark web - infographic included.
Story image
CrowdStrike detail rise of state-sponsored attacks in new global threat report
Tue, 27th Feb 2018
#
ransomware
#
malware
#
ai security
CrowdStrike flags rise in state-linked cyber threats, notes 'trickle-down' from gov to hackers.
Story image
Cybercrime becomes most common form of fraud in UK
Tue, 27th Feb 2018
#
cybersecurity
#
fraud
#
online fraud
PwC's study has found for the first time ever cybercrime has become the most common form of fraud with nearly a quarter resulting in a loss of £700k.
Story image
Are UK councils prioritising data collection over security?
Fri, 23rd Feb 2018
#
firewall
#
breach prevention
#
cybersecurity
A slamming report found 1 in 4 UK councils experienced a security breach in the last 5 years and more than half didn't even report the incident.
Story image
Kiwis' contradictory habits costing millions in cybercrime damage
Thu, 22nd Feb 2018
#
cybersecurity
#
symantec
#
norton
New Zealanders lost more than $177 million to cybercrime last year but it seems people are not paying enough attention.
Story image
Mandatory data breach law comes into force THIS Thursday - are you ready?
Wed, 21st Feb 2018
#
breach prevention
#
creative technologies
#
cybersecurity
Despite the imminent law with crippling fines that affects almost every significant sized AU business, a Canon study has found 3 in 5 are unaware.
Story image
INTERVIEW: What Google’s decision to distrust Symantec certificates means
Wed, 21st Feb 2018
#
devops
#
app development
#
apm
Last year Chrome announced a formal plan to remove trust from Symantec-issued certificates - Venafi's Walter Goulet discusses the implications.
Story image
New malicious search engine trawls AWS servers for sensitive data
Sat, 17th Feb 2018
#
cloud services
#
hyperscale
#
public cloud
​As if it wasn’t easy enough already, the lives for hackers has just been made a lot easier with a tool that lays bare AWS S3 servers.
Story image
Gartner provides 7 steps for dealing with Spectre and Meltdown
Fri, 16th Feb 2018
#
iaas
#
cybersecurity
#
spectre
​No doubt you’ve heard of Spectre and Meltdown before, given security researchers are calling them ‘catastrophic’ - here's Gartner's advice.
Story image
New advisory platform finds 41m PDFs part of a cyberattack in last 3 months
Fri, 16th Feb 2018
#
firewall
#
ransomware
#
malware
Barracuda announced the availability of its new platform that provides advanced threat trends in real time - along with some shocking findings.
Story image
67% of organisations say they're understaffed to handle cybersecurity
Thu, 15th Feb 2018
#
managed services
#
partner programmes
#
cybersecurity
RiskIQ's survey paints a grim picture that forecasts a 'perfect storm' where the problem of staff shortages collides with escalating cybercrime.
Story image
From Vietnam without love: Asia Pacific's next cyber attack hub
Wed, 14th Feb 2018
#
blockchain
#
cryptocurrency
#
cybersecurity
Vietnam may be called the next Silicon Valley for its technology prowess, but for the first time it is now one of the top five cyber attack sources.
Story image
Winter Olympics hacked: Was it just disruptive or something more sinister?
Tue, 13th Feb 2018
#
cybersecurity
#
industry experts
#
cybercrime
The Winter Olympics recently fell victim to a cyberattack which seemed to be just a disruption, but this expert says there could be more behind it.