Cybercrime

Cybercrime / Most Viewed

Yellow Parking Violation Fliers on Windshields Get Drivers to Visit Malicious Website

Security expert and malware analyst, Lenny Zeltser has examined a creative malware distribution method in the real world where fliers placed on windshield of cars scare drivers into visiting a malicious website. Zeltser writes: "Several days ago, yellow fliers were placed on the cards in Grand Forks, ND. They stated: 'PARKING VIOLATION This vehicle is in violation of standard parking regulations. To view pictures with information about your parking preferences, go to website-redacted' ... If you went to the website, you'd see several photos of cars on parking lots in that specific town..." more»

Universities Spending $80K to Over $100K Per Year on Policing P2P Activities

As a result of the new P2P filesharing mandates signed into U.S. law this past summer, the country's 4400 colleges and universities are required to address issues of illegal P2P filesharing -- particularly music and movies. For instance, colleges and universities are "required to consider the use of technology-based deterrents" in developing plans to counter illegal P2P activity, such as traffic monitoring and bandwidth shaping. A new study by the Campus Computing Project reports the results of a summer 2008 survey aimed at addressing the campus costs of compliance with the new P2P filesharing mandates. more»

Notorious Spam King Scheduled to be Sentenced on Monday by the U.S. District Court

Notorious spammer Robert Alan Soloway is scheduled to be sentenced on Monday by the U.S. District Court in Seattle after pleading guilty to single counts of mail fraud, e-mail fraud, and tax evasion. The long list of individuals testifying in federal court for the sentencing of the so-called 'King of Spam' has resulted in an unusual two-day hearing which began on Friday. Soloway is the second person to be convicted of criminal spamming under the 2004 "Can-Spam" law. more»

ACMA: 30,000 PC's Infected in Australia Per Day

Anti-spam and malware enforcement agency ACMA reports on this (shocking high?) figure. Keep this up and ca. 50% of the Australian population is infected within a year. I remember a presentation from Sweden only a few years ago, that there were only a little over a thousand infected pc's in Sweden. (Reactions were: that can't be correct. Too low) Do you know what the numbers are for your country and maybe more importantly what your government and/or Industry is/are doing about it? more»

Attack Traffic: 10 Countries Source of Almost 75% of Internet Attacks

A recent quarterly report titled "State of the Internet" has been released by Akamai providing Internet statistics on the origin of Internet attack traffic, network outages and broadband connectivity levels around the world. According to the report, during the first quarter of 2008, attack traffic originated from 125 unique countries around the world. China and the United States were the two largest traffic sources, accounting for some 30% of traffic in total. The top 10 countries were the source of approximately three quarters (75%) of the attacks measured. Other observations include... more»

New Research Reveals 56% Rise in Cost of Cybercrime

New research indicates cyberattacks increasingly plague businesses and government organizations, resulting in significant financial impact, despite widespread awareness. Conducted by the Ponemon Institute, the Second Annual Cost of Cyber Crime Study revealed that the median annualized cost of cybercrime incurred by a benchmark sample of organizations was $5.9 million per year, with a range of $1.5 million to $36.5 million each year per organization. This represents an increase of 56 percent from the median cost reported in the inaugural study published in July 2010. more»

NATO Nations Sign Agreement on Cyber Defense Center

Seven NATO nations gave their backing on Wednesday to a new cyber defense centre in Estonia, the ex-Soviet state which last year faced weeks of attacks on its Internet structure after a row with Russia. Germany, Italy, Latvia, Lithuania, Slovakia and Spain agreed to help fund and staff the centre in the Estonian capital Tallinn. The United States will initially send an observer to the project, aimed at boosting defenses against such attacks. more»

How a Resilient Society Defends Cyberspace

Seventy-five years ago today, on May 29th, 1934, Egyptian private radio stations fell silent, as the government shut them down in favor of a state monopoly on broadcast communication. Egyptian radio "hackers" (as we would style them today) had, over the course of about fifteen years, developed a burgeoning network of unofficial radio stations... It couldn't last. After two days of official radio silence, on May 31st, official state-sponsored radio stations (run by the Marconi company under special contract) began transmitting a clean slate of government-sanctioned programming, and the brief era of grass-roots Egyptian radio was over... more»

ICANN to Work With VeriSign, US Government, to Address Core Internet Security Issue

ICANN announced today that it will work with the U.S. Department of Commerce's National Telecommunications and Information Administration (NTIA), the National Institute of Standards and Technology (NIST) and VeriSign on the goal of an operationally Signed Root Zone as soon as feasible in 2009. "We've been working towards a signed root for more than three years. In fact, ICANN has operated a root zone signing test bed for more than two years. So ICANN is aware of the urgency around signing the root to enhance stability and security" Paul Twomey, President and CEO of ICANN said. more»

Obama Expected to Announce "Cyber Czar" in a Few Days

President Obama is expected to announce late this week that he will create a "cyber czar," a senior White House official who will have broad authority to develop strategy to protect the nation's government-run and private computer networks, according to people who have been briefed on the plan... The announcement will coincide with the long-anticipated release of a 40-page report that evaluates the government's cybersecurity initiatives and policies. more»

ISP Owners Could Face Jail Under Proposed Canadian Child Porn Bill

Canadian government has introduced legislation requiring ISPs to notify authorities of any reports of child pornography or face fines and possible imprisonment. If enacted, the bill would require ISPs to notify police of tips they receive regarding websites where child pornography may be available, and to safeguard evidence if they suspect a child pornography offence has been committed using an internet service that they provide. more»

Pakistan Sets Death Penalty for Cyber Terrorism

Causing death through "cyber terrorism" will be punishable by death in Pakistan, according to a decree issued by President Asif Ali Zardari on Thursday. The Prevention of Electronic Crimes law will be applicable to anyone who commits a crime detrimental to national security through the use of a computer or any other electronic device, the government said in the ordinance. "Whoever commits the offence of cyber terrorism and causes death of any person shall be punishable with death or imprisonment for life," according to a copy of the ordinance, published by the state-run APP news agency. more»

VeriSign Expands DNS Capacity From 400 Billion to Over 4 trillion Queries Per Day

Since 2000, the volume of Internet traffic on VeriSign's global infrastructure has increased from an average of 1 billion domain name system queries per day to a peak of more than 50 billion DNS queries per day under normal traffic conditions, reports VeriSign in a press release today. Under Project Titan, VeriSign reports it will increase its daily DNS query capacity from 400 billion queries a day to over 4 trillion queries a day and will increase the aggregate network bandwidth of its primary resolution centers around the world from more than 20 gigabits per second (Gbps) to greater than 200 Gbps per second. VeriSign also plans to expand its deployment of Regional Internet Resolution Sites to more than 100 locations across the globe by 2010. Plans also include deploying new proprietary security upgrades and monitoring tools to identify, track and isolate malicious Internet traffic generated from cyber attacks. more»

NJ Content Liability Law Ruled Inconsistent with Sec. 230 (just like in Washington and Tennesse)

Back in a time before most members of Congress or prosecutors knew that there was an Internet, there was Prodigy. Prodigy, as part of its service, ran family-friendly chat rooms that it moderated in an effort to keep kids protected from unfortunate content. In a different Prodigy chat room, some unknown third party said something apparently bad about an investment firm Stratton-Oakmont. Stratton-Oakmont didn't like that very much, and sued. more»

Popular Mechanics on Vulnerability of US Infrastructure to a Major Cyberattack

The next world war might not start with a bang, but with a blackout. An enemy could send a few lines of code to control computers at key power plants, causing equipment to overheat and melt down, plunging sectors of the U.S. and Canadian grid into darkness. Trains could roll to a stop on their tracks, while airport landing lights wink out and the few traffic lights that remain active blink at random. In the silence and darkness, citizens may panic, or they may just sit tight and wait for it all to reboot. Either way, much of the country would be blind and unresponsive to outside events. And that might be the enemy's objective: Divert America's attention while mounting an offensive against another country... more»