Archive for the ‘cybercrime/malcode’ category: Page 203
Feb 18, 2016
What is ransomware and how to protect your business from it
Posted by Karen Hurst in categories: business, cybercrime/malcode
What would it mean if you lost all of your personal documents, such as your family photos, research or business records? How much would you pay to get them back? There’s a burgeoning form of cybercrime that hinges on the answers to these questions.
You have probably heard of viruses and malware. These dangerous pieces of software can make their way into your computer and wreak havoc. Malware authors are intent on stealing your data and disrupting the proper functioning of your digital devices.
Then there is ransomware. This is crafted by cyber-criminals for extorting data from innocent users, and is rapidly becoming a threat to individuals, small business and corporate users alike.
Feb 18, 2016
Ransomware: People Would Pay Ransom to Recover Photos, but Not Work Files
Posted by Karen Hurst in category: cybercrime/malcode
Feb 18, 2016
Man vs machine: Bio-chip implants will make us stronger but an open target for hackers
Posted by Karen Hurst in categories: biotech/medical, cybercrime/malcode, privacy, security
Absolutely; it will and that is the real danger in technology. This is why security roles will be increasingly in demand over the next 7 to 10 years.
Kaspersky director Marco Preuss looks at the future of biometric technology and bio-cybersecurity.
Feb 17, 2016
Mazar BOT Can Erase Android Phones
Posted by Karen Hurst in categories: cybercrime/malcode, internet, mobile phones, robotics/AI, security
Lookout for MAZAR Bot — Androids should be scared.
One interesting feature of Mazar is that it can not be installed on smartphones running Android with “Russian” selected as the operating system’s language.
The malware allows the attackers to spy on nearly every activity capable on an Android device, including establishing a backdoor connection, sending premium SMS messages, reading texts sent to the device, including bank authentication PINs.
Feb 17, 2016
Virtual extortion a big business for cyber criminals
Posted by Karen Hurst in categories: business, cybercrime/malcode, robotics/AI, transportation
And, this is only going to get worse with the newer AI technology until we can get a handle on hacking and tracking of AI such as bots and cars.
Virtual extortion is causing havoc as cyber criminals target companies of all sizes for ransom, according to the FBI. Here’s what needs to be done.
Feb 17, 2016
Cops want special courts that try only cyber criminals
Posted by Karen Hurst in category: cybercrime/malcode
Special courts for cyber criminals.
Police dept asks govt for two courts dedicated to dealing with online crime, to improve conviction rate.
Mumbai: As crimes increasingly go digital, Mumbai police are pushing for the creation of courts that would try only cyber crimes. They have submitted a proposal to the government seeking to establish two special courts for the purpose, in a move aimed to cut back delays in trials.
Continue reading “Cops want special courts that try only cyber criminals” »
Feb 17, 2016
Expert Edward McAndrew says nation is facing ‘perfect cyber-crime storm’
Posted by Karen Hurst in category: cybercrime/malcode
Feb 17, 2016
Filename-handling slip let attackers evade FireEye analysis
Posted by Karen Hurst in category: cybercrime/malcode
Giving FireEye the slip.
Malware could be on your application whitelist if you haven’t caught up on patching.