Cybercrime / Most Viewed

Malaysia Wants to Handle Internet Related Crimes via 'Cyber Court'

Malaysia is considering establishing a "cyber court" to deal with the increasing number of crimes related to the Internet and blogging, a report said Tuesday. Communications Minister Shaziman Abu Mansor said more than 30 Internet-linked cases had been submitted to the country's attorney general in the past three years. "If in future if we cannot cope any more due to too many cases, we may need to have a cyber court," he said, according to the official news agency Bernama. more»

Yellow Parking Violation Fliers on Windshields Get Drivers to Visit Malicious Website

Security expert and malware analyst, Lenny Zeltser has examined a creative malware distribution method in the real world where fliers placed on windshield of cars scare drivers into visiting a malicious website. Zeltser writes: "Several days ago, yellow fliers were placed on the cards in Grand Forks, ND. They stated: 'PARKING VIOLATION This vehicle is in violation of standard parking regulations. To view pictures with information about your parking preferences, go to website-redacted' ... If you went to the website, you'd see several photos of cars on parking lots in that specific town..." more»

Experts Concerned Over U.S. Spyware Legislation Being Overly Broad

U.S. Senate bill aims at limiting spyware by seemingly allowing broadband providers, computer hardware and software vendors, financial institutions and other businesses to scan users' computers without authorization. "We think this language is overly broad and could protect activities which could be harmful to computer users," Butler told the Senate Commerce, Science and Transportation Committee. "It would, in effect, allow a software vendor to truly monitor everything that's on a user's computer, essentially setting [vendors] up as an ad hoc police force." more»

Notorious Spam King Scheduled to be Sentenced on Monday by the U.S. District Court

Notorious spammer Robert Alan Soloway is scheduled to be sentenced on Monday by the U.S. District Court in Seattle after pleading guilty to single counts of mail fraud, e-mail fraud, and tax evasion. The long list of individuals testifying in federal court for the sentencing of the so-called 'King of Spam' has resulted in an unusual two-day hearing which began on Friday. Soloway is the second person to be convicted of criminal spamming under the 2004 "Can-Spam" law. more»

Deadline of April 10 to Apply For CARIS Workshop on Coordinating Response to Internet Attacks

You have just a couple of days to either complete a survey or submit a paper to join the "Coordinating Attack Response at Internet Scale (CARIS)" Workshop happening on June 19, 2015, in Berlin, Germany... If you are interested in helping improve the overall security and resilience of the Internet through increased communication between the groups responding to the large-scale attacks happening on the Internet every day, I would strongly encourage you to apply! more»

Attack Traffic: 10 Countries Source of Almost 75% of Internet Attacks

A recent quarterly report titled "State of the Internet" has been released by Akamai providing Internet statistics on the origin of Internet attack traffic, network outages and broadband connectivity levels around the world. According to the report, during the first quarter of 2008, attack traffic originated from 125 unique countries around the world. China and the United States were the two largest traffic sources, accounting for some 30% of traffic in total. The top 10 countries were the source of approximately three quarters (75%) of the attacks measured. Other observations include... more»

New Research Reveals 56% Rise in Cost of Cybercrime

New research indicates cyberattacks increasingly plague businesses and government organizations, resulting in significant financial impact, despite widespread awareness. Conducted by the Ponemon Institute, the Second Annual Cost of Cyber Crime Study revealed that the median annualized cost of cybercrime incurred by a benchmark sample of organizations was $5.9 million per year, with a range of $1.5 million to $36.5 million each year per organization. This represents an increase of 56 percent from the median cost reported in the inaugural study published in July 2010. more»

How a Resilient Society Defends Cyberspace

Seventy-five years ago today, on May 29th, 1934, Egyptian private radio stations fell silent, as the government shut them down in favor of a state monopoly on broadcast communication. Egyptian radio "hackers" (as we would style them today) had, over the course of about fifteen years, developed a burgeoning network of unofficial radio stations... It couldn't last. After two days of official radio silence, on May 31st, official state-sponsored radio stations (run by the Marconi company under special contract) began transmitting a clean slate of government-sanctioned programming, and the brief era of grass-roots Egyptian radio was over... more»

NATO Nations Sign Agreement on Cyber Defense Center

Seven NATO nations gave their backing on Wednesday to a new cyber defense centre in Estonia, the ex-Soviet state which last year faced weeks of attacks on its Internet structure after a row with Russia. Germany, Italy, Latvia, Lithuania, Slovakia and Spain agreed to help fund and staff the centre in the Estonian capital Tallinn. The United States will initially send an observer to the project, aimed at boosting defenses against such attacks. more»

ICANN to Work With VeriSign, US Government, to Address Core Internet Security Issue

ICANN announced today that it will work with the U.S. Department of Commerce's National Telecommunications and Information Administration (NTIA), the National Institute of Standards and Technology (NIST) and VeriSign on the goal of an operationally Signed Root Zone as soon as feasible in 2009. "We've been working towards a signed root for more than three years. In fact, ICANN has operated a root zone signing test bed for more than two years. So ICANN is aware of the urgency around signing the root to enhance stability and security" Paul Twomey, President and CEO of ICANN said. more»

NJ Content Liability Law Ruled Inconsistent with Sec. 230 (just like in Washington and Tennesse)

Back in a time before most members of Congress or prosecutors knew that there was an Internet, there was Prodigy. Prodigy, as part of its service, ran family-friendly chat rooms that it moderated in an effort to keep kids protected from unfortunate content. In a different Prodigy chat room, some unknown third party said something apparently bad about an investment firm Stratton-Oakmont. Stratton-Oakmont didn't like that very much, and sued. more»

VeriSign Expands DNS Capacity From 400 Billion to Over 4 trillion Queries Per Day

Since 2000, the volume of Internet traffic on VeriSign's global infrastructure has increased from an average of 1 billion domain name system queries per day to a peak of more than 50 billion DNS queries per day under normal traffic conditions, reports VeriSign in a press release today. Under Project Titan, VeriSign reports it will increase its daily DNS query capacity from 400 billion queries a day to over 4 trillion queries a day and will increase the aggregate network bandwidth of its primary resolution centers around the world from more than 20 gigabits per second (Gbps) to greater than 200 Gbps per second. VeriSign also plans to expand its deployment of Regional Internet Resolution Sites to more than 100 locations across the globe by 2010. Plans also include deploying new proprietary security upgrades and monitoring tools to identify, track and isolate malicious Internet traffic generated from cyber attacks. more»

Obama Expected to Announce "Cyber Czar" in a Few Days

President Obama is expected to announce late this week that he will create a "cyber czar," a senior White House official who will have broad authority to develop strategy to protect the nation's government-run and private computer networks, according to people who have been briefed on the plan... The announcement will coincide with the long-anticipated release of a 40-page report that evaluates the government's cybersecurity initiatives and policies. more»

ISP Owners Could Face Jail Under Proposed Canadian Child Porn Bill

Canadian government has introduced legislation requiring ISPs to notify authorities of any reports of child pornography or face fines and possible imprisonment. If enacted, the bill would require ISPs to notify police of tips they receive regarding websites where child pornography may be available, and to safeguard evidence if they suspect a child pornography offence has been committed using an internet service that they provide. more»

Pakistan Sets Death Penalty for Cyber Terrorism

Causing death through "cyber terrorism" will be punishable by death in Pakistan, according to a decree issued by President Asif Ali Zardari on Thursday. The Prevention of Electronic Crimes law will be applicable to anyone who commits a crime detrimental to national security through the use of a computer or any other electronic device, the government said in the ordinance. "Whoever commits the offence of cyber terrorism and causes death of any person shall be punishable with death or imprisonment for life," according to a copy of the ordinance, published by the state-run APP news agency. more»