Source: IT Pro Portal
The initiative is a response to the growing threat of cyber-terrorism and online crime, aiming to work on strengthening security measures, and helping to protect sensitive business and government data from the prying tentacles of hackers.
Tag Archives: Cyber Crime
Source: Dave Piscitello, ICANN
Recent legal actions (Rustock, Coreflood and Kelihos, among others) resulting in disrupting or dismantling major criminal networks have involved seizures of domain names, DNS name server reconfiguration and transfers of domain name registrations as part of the takedown actions.
Source: Misha Glenny, The New York Times
Teenagers are not usually the main targets of the F.B.I., whose agents are used to dealing with hardened criminals. But for the Cyber Division, they appear to be the norm.
Source: Jordan Robertson, Bloomberg
For the past few months, a team of computer hackers has engaged in an aggressive form of cyber subversion.
For nearly a decade, hackers enjoyed widespread access to the corporate computer network of Nortel Networks Ltd., a once-giant telecommunications firm now fallen on hard times.
Source: Stanley Tromp, National Post
Canadian police are struggling to combat business crime in the cloud computing world, an elusive and little-controlled realm that criminals can exploit to steal money and personal identities.
Throughout 2011, I am sure that you have heard of the compromise of RSA, in which the stolen data regarding RSA’s Secure ID appears to have been used in subsequent attacks and that there were many more victims other than RSA.
Source: Fabio Assolini, Secure List
Life looks good for Brazilian hackers: the absence of a specific law against cybercrime leaves them feeling so invulnerable that the bad guys are shameless about publicizing their thefts and showing off the profits of a life of crime.
Source: Dana Gardner
As a lead-in to his Open Group presentation, entitled “What You’re Up Against: Mobsters, Nation-States, and Blurry Lines,” Joe explores the current cyber-crime landscape, the underground cyber-gang movement, and the motive behind governments collaborating with organized crime in cyber space.
Source: Melissa Hathaway, Belfer Center
Nations and corporations are embracing and quickly adopting information and communications technologies (ICT) to improve services, increase productivity, and decrease costs. Unfortunately, they have not as rapidly addressed the security measures needed to protect their growing enterprises and technological infrastructure.