Youth Pathways into Cybercrime

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Acrobat Youth Pathways into Cybercrime
Author: Research leads: Professor Mary Aiken, Professor Julia Davidson & Dr Philipp Amann
Source: http://www.mdx.ac.uk/
Overview: Many security and police professionals spend their time analysing the technical and mechanical aspects of cybercrime, dissecting malware and exploit tools, forensically analysing code and techniques. However, few actively focus on the social and psychological aspects: who for example is the attacker, what motivates them, and more importantly how and when did this deviant behaviour begin? Understanding the behavioural and developmental aspects of cybercriminality is becoming increasingly important, and underlies the necessity of a shift in focus from sanctions to deterrence and prevention. That being said, there is an urgent need to understand the pathways that lead some young people into cybercrime hence it is important for parents to be aware of their own youth’s online activity and risk. Read More

Ascending the Ranks : The Brazilian Cybercriminal Underground in 2015

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Acrobat Ascending the Ranks : The Brazilian Cybercriminal Underground in 2015
Author: Trend Micro Security Team – Forward-Looking Threat Research (FTR) Team
Source: http://www.trendmicro.com/
Overview: The fastest route to cybercriminal superstardom can be found in Latin America, particularly in Brazil. Any criminal aspirant can gain overnight notoriety with just a little bit of moxie and the right tools and training, which come in abundance in the country’s untamed underground. Read More

2016 Trend Micro Security Predictions: The Fine Line

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Acrobat 2016 Trend Micro Security Predictions: The Fine Line
Author: Trend Micro Security Team
Source: http://www.trendmicro.com/
Overview: Every year, the triumphs and failures reflected in cyber security stories not only leave us with valuable lessons but also hints of the foreseeable future. Looking closely, we get to pick pieces of the puzzle that we can use to build a vivid picture of what’s to come. Read More

Drive-by downloads

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Drive-by DownloadsIt’s 4:37 a.m, I am woken up by a continuous humming noise coming from my phone. I try to ignore the unending vibrations but after gathering the courage to get out of bed, I grabbed my phone and immediately realised the vibrations where not due to the reminders set on my phone, neither were they being triggered by an active phone call, I discovered the vibrations were due to the SMSes I kept receiving continuously.  The SMSes were being generated in real-time from my Online Banking Portal and the notifications kept

Read more

CryptoLocker Ransomware

It's only fair to share...Share on FacebookTweet about this on TwitterShare on LinkedInShare on Google+Email this to someonePrint this pageShare on RedditShare on StumbleUpon

Since the discovery of the unforgiving CryptoLocker ransomware in the wild late last year, sometime in September 2012, the Internet has been gripped by one kind of a mysterious and malicious program! But what is ransomware? What is CryptoLocker really capable of? Before I explain any further, we need to understand that this deadly malware is spreading in the form of spam emails. The spam emails appear to be coming from financial institutions and contain attachments which in actual fact is the CryptoLocker ransomware.

Ransomware comprises, I quote from Wikipedia a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed.” Assuming the spam email recipient opens the attachment, the CryptoLocker immediately

Read more