MarkMonitor, the global leader in online brand protection conducted a report about consumer trust and cybercrime. According to the research, 16 percent of Dutch consumers lose confidence in a brand that is involved in cybercrime.
Read more on Deep Dot Web
The security landscape has evolved to a point where most IT threats occur with the intention of generating financial gain for their creators and financiers. Based on this premise, various attack or threat types have proliferated and evolved to affect a greater number of users and organizations. The cybercrime “business model” is based on creating a value chain that offers new methods, for example cybercrime as a service, that is, the practice of facilitating illegal activities via services. In other words, anyone could acquire everything they need to organize frauds or cyberattacks, whatever their skills or technical knowledge.
Read more on We Live Security
The accused ringleader of a cyber fraud gang that allegedly rented out access to a criminal cloud hosting service known as “Avalanche” is now a fugitive from justice following a bizarre series of events in which he shot at Ukrainian police, was arrested on cybercrime charges and then released from custody.
Read the full article on Krebs On Security
These days, all you need to do is type “botnet,” “hacking,” “DDoS,” “CVV2,” or any other cybercrime-related term into the search bar on most social media platforms, and you will find a plethora of fraud activity occurring in plain sight. As reported earlier this year by RSA, social media has become a breeding ground for cybercrime-related activity, attracting fraudsters from around the world who take advantage of these platforms because they are free, easy-to-use, and offer a global reach.
Full article via RSA
Inside McAfee Labs’ predictions (PDF) for 2017 is this: criminals will use machine learning to analyze massive quantities of stolen records to identify potential victims and build contextually detailed emails that very effectively target these individuals. In short, just as defenders use machine learning to detect attacks, attackers will use machine learning to automate attacks and evade detection.
Read the full article on Security Week
With nothing more than a standard Web browser, cybercriminals can find personal, private information all over the public Internet. It isn’t just legitimate services – from genealogy sites to public records and social media – that can be mined and exploited for nefarious purposes. Openly malicious criminal activities are also happening on the public Internet.
Read the full article on Dark Reading
From the bad guy’s perspective, advanced ransomware is highly lucrative with very little risk involved. The FBI estimates it will be a $1 Billion dollar ‘business’ in 2016. RSA did an analysis which gives us some insight in the money to be made.
Read the full blog post on Know Be4
Nearly half of surveyed manufacturing executives lack confidence their assets are protected from external threats, according to a new study from Deloitte and the Manufacturers Alliance for Productivity and Innovation (MAPI).
Read the full article on Help Net Security
Learning more about how cyber criminals operate on the dark web by Andrei Barysevich.
Read the full article on Recorded Future