Quantcast

Latest Computer crime Stories

5189618297a434d18b40963f1e431245
2010-02-03 14:21:24

The people that brought the world malicious software which can steal credit card numbers and empty bank ATMs of their cash are apparently hiring, according to Reuters. Kevin Stevens, a threat intelligence analyst for SecureWorks, said the two companies that are hiring are now advertising online.  They are seeking people that are willing to take malicious code they provide and link it to something that people will click on, like a picture of Britney Spears getting out of her car. ...

2010-01-25 09:17:00

WASHINGTON, Jan. 25 /PRNewswire-USNewswire/ -- Michael Bolcerek, Senior Vice President of Business Development for Aristotle's Integrity division, will be a featured speaker at the Combating Cybercrime Conference, co-located with the International Gaming Expo (IGE) in London on January 26, 2010. Bolcerek is a well known expert in age verification and i-gaming, having previously served as President of the Poker Players Alliance (PPA), appearing as a spokesperson in the U.S. and...

2009-12-09 10:00:00

CUPERTINO, Calif., Dec. 9 /PRNewswire/ -- Using news headlines and the latest technological trends, cybercriminals are brilliantly agile at exploiting whatever is trendy for cash and profit. Now, the growing popularity of cloud computing and virtualization among companies is likely to catch the attention of criminals scheming for the next hot cyber-swindle. According to the Trend Micro 2010 Future Threat Report, cloud computing and virtualization -- while offering significant benefits and...

2009-12-08 23:01:00

BASKING RIDGE, N.J., Dec. 9 /PRNewswire/ -- The latest in the Data Breach Investigations Report series by Verizon Business security experts provides enterprises with an unprecedented look at the 15 most common security attacks and how they typically unfold. In the "2009 Supplemental Data Breach Investigations Report: An Anatomy of a Data Breach," Verizon Business security experts tap the company's detailed investigative records to identify, rank and profile the most common attacks. For...

2009-11-18 10:34:00

SCOTTSDALE, Ariz., Nov. 18 /PRNewswire/ -- 41st Parameter Inc., the leading provider of fraud detection and prevention technology, forecasts increased mobile channel cybercrime and decreased effectiveness of traditional anti-fraud tactics, attributed to the rapid adoption of new mobile handsets and multiple operating systems. According to a November 2009 consumer study of U.S. mobile phone users, 18.9 percent of mobile consumers now use a smartphone, and an additional 49.2 percent plan to...

33d93bf5ebf35a4f17f7ad66782269211
2009-11-18 06:09:02

An Internet governance forum gathered at the Sharm el-Sheikh in Egypt to discuss cybercrime regulation, reported AFP. According to Gisele Da Silva Craveiro of the University of Sao Paolo in Brazil, current cyber legislation is so expansive that it could easily be subject to misuse by authorities. "Definitions for cybercrimes can be so broad as to fit everything... leaving the laws open to inappropriate use by authorities such as monitoring citizens," Craveiro told AFP at the Fourth Meeting of...

2009-10-29 08:00:00

WASHINGTON, Oct. 29 /PRNewswire-USNewswire/ -- Americans today are getting the message that Internet safety and security is critical to their daily lives but many still need to employ safer cyber hygiene, according to the 2009 National Cyber Security Alliance (NCSA)-Symantec Online Safety Study, released by the NCSA and Symantec (Nasdaq: SYMC), makers of Norton security software. The study results show that 85 percent of Americans feel they are most responsible for keeping their...

2009-10-23 13:58:00

ECI of Utica College Conference Most Successful to Date POTOMAC, Md., Oct. 23 /PRNewswire-USNewswire/ -- With all the buzz about protecting one's identity, Ponzi schemes and new jobs in cybersecurity, the 20th Economic Crime Institute (ECI) of Utica College conference -- highlighting the latest trends in the detection and prevention of identity theft, cybersecurity and economic crime -- was the most successful event in the organization's history. "Extraordinary Circumstances:...

2009-10-16 11:38:00

UTICA, N.Y., Oct. 16 /PRNewswire-USNewswire/ -- On the heels of the Department of Homeland Security announcing the creation of up to 1,000 new cybersecurity jobs, the upcoming 20th Economic Crime Institute of Utica College conference, highlighting the latest trends in the detection and prevention of identity theft, cybersecurity and economic crime, looks to be the most successful event in the organization's history. "Extraordinary Circumstances: Combating Fraud and Corruption in Hard...

2009-09-30 06:29:00

SAN JOSE, Calif., Sept. 30 /PRNewswire/ -- Finjan Inc., a leader in secure web gateway products and the provider of a unified web security solution for the enterprise market, today unveiled new research from its Malicious Code Research Center (MCRC), which uncovered new techniques used by cybercriminals to rob online bank accounts. (Logo: http://www.newscom.com/cgi-bin/prnh/20080618/309345 ) Finjan sees the techniques described in this report as the start of a new trend that is...


Word of the Day
tesla
  • The unit of magnetic flux density in the International System of Units, equal to the magnitude of the magnetic field vector necessary to produce a force of one newton on a charge of one coulomb moving perpendicular to the direction of the magnetic field vector with a velocity of one meter per second. It is equivalent to one weber per square meter.
This word is named for Nikola Tesla, the inventor, engineer, and futurist.