cybercrime   1515

« earlier    

RT : Gisteravond boeiende en informatieve avond over met veel nuttige adviezen om
cybercrime  from twitter
3 days ago by femkecc
Steal This Show S04E18: ‘You’ll See This Message When It Is Too Late’ - TorrentFreak
Today we bring you the next episode of the Steal This Show podcast, discussing renegade media and the latest decentralization and file-sharing news. In this episode, we talk cybersecurity policy professor and author Josephine Wolff.
In this episode we meet Josephine Wolff, who wrote a new book on financial and economic cybercrime, You’ll See This Message When It Is Too Late.
We discuss two important case studies from the book. First, the massive financial fraud botnet GameOver Zeus, which innovated by using P2P to distribute its command and control infrastructure, and a network of money mules to route funds to its owners, making it extremely hard to detect.
Moving on to the case of PLA 61398, we discuss the Chinese deployment of hacking resources for economic advancement via China’s so-called APT or Advanced Persistent Threat Units. Wrapping up, we discuss the question of international law and order in the context of massive, distributed cyber operations that remain extremely hard to detect and police.
security  privacy  podcast  books  interview  cybercrime  finances  economics 
4 days ago by rgl7194
A Predator In Your Pocket - A Multidisciplinary Assessment of the Stalkerware Application Industry
By Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, and Ronald Deibert. Citizen Lab Research report #119, University of Toronto, June 2019.
cybercrime  web  Internet  tools  violence  mobile  women  girls  trans 
11 days ago by kmo
It’s a pleasure and honor to be in this book with the other 99 fascinating females fighting ☺️ so many…
cybercrime  from twitter_favs
6 weeks ago by tguemes
Comment faire face au racisme en ligne?
Cette trousse vise à informer le public sur des moyens pour faire face au racisme en ligne. Élaborée par le Musée de l’Holocauste Montréal. Diffusé en avril 2019. ENG:
trousse  toolkit  racism  racisme  web  Internet  cybercrime  cyberbullying  discrimination  outils  tools 
7 weeks ago by kmo
A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments - The New York Times
Sophisticated surveillance, once the domain of world powers, is increasingly available on the private market. Smaller countries are seizing on the tools — sometimes for darker purposes.
The man in charge of Saudi Arabia’s ruthless campaign to stifle dissent went searching for ways to spy on people he saw as threats to the kingdom. He knew where to go: a secretive Israeli company offering technology developed by former intelligence operatives.
It was late 2017 and Saud al-Qahtani — then a top adviser to Saudi Arabia’s powerful crown prince — was tracking Saudi dissidents around the world, part of his extensive surveillance efforts that ultimately led to the killing of the journalist Jamal Khashoggi. In messages exchanged with employees from the company, NSO Group, Mr. al-Qahtani spoke of grand plans to use its surveillance tools throughout the Middle East and Europe, like Turkey and Qatar or France and Britain.
The Saudi government’s reliance on a firm from Israel, an adversary for decades, offers a glimpse of a new age of digital warfare governed by few rules and of a growing economy, now valued at $12 billion, of spies for hire.
Today even the smallest countries can buy digital espionage services, enabling them to conduct sophisticated operations like electronic eavesdropping or influence campaigns that were once the preserve of major powers like the United States and Russia. Corporations that want to scrutinize competitors’ secrets, or a wealthy individual with a beef against a rival, can also command intelligence operations for a price, akin to purchasing off-the-shelf elements of the National Security Agency or the Mossad.
NSO and a competitor, the Emirati firm DarkMatter, exemplify the proliferation of privatized spying. A monthslong examination by The New York Times, based on interviews with current and former hackers for governments and private companies and others as well as a review of documents, uncovered secret skirmishes in this burgeoning world of digital combat.
gov2.0  politics  internet  cybercrime  nytimes  hack  security  privacy  surveillance 
8 weeks ago by rgl7194
Online Harms White Paper
Published in April 2019 by the UK government: Secretary of State for Digital, Culture, Media & Sport and the Secretary of State for the Home Department. "Given the prevalence of illegal and harmful content online, and the level of public concern about online harms, not just in the UK but worldwide, we believe that the digital economy urgently needs a new regulatory framework to improve our citizens’ safety online." -- "This White Paper sets out a programme of action to tackle content or activity that harms individual users, particularly children, or threatens our way of life in the UK, either by undermining national security, or by undermining our shared rights, responsibilities and opportunities to foster integration."
UK  government  policy  web  Internet  security  violence  cybercrime  economy 
8 weeks ago by kmo
Fachvortrag Cyber-Kriminalitä Swiss Marketing
Fachvortrag Cyber-Kriminalität
Der Schaffhauser Yves Sturzenegger arbeitet bei der Kriminalpolizei Stadt Zürich als Digital Forensics Investigator und gibt uns einen Einblick in seine tägliche Arbeit. Dabei geht es um die grundlegenden Fragen, was Cyber-Kriminalität bedeutet, welchen Bedrohungen insbesondere Firmen ausgesetzt sind und wie man sich schützen kann. Ein spannendes Referat zu einem sehr aktuellen Thema!
cybercrime  IoT  Internet  IAD  SfG 
10 weeks ago by gwippich
Advocacy Assembly - courses
" ... the world's only free online training platform for human rights activists, campaigners and journalists." // "Our online multimedia courses are taught by human rights, media, design and data professionals from leading organisations from around the world." Including subjects such as social media strategy, staying safe online, online gender-based violence (by APC -, etc.
elearning  web  Internet  education  rights  writing  blog  journalism  world  activism  socialmedia  security  gender  violence  cybercrime 
march 2019 by kmo
Backdoor Targets U.S. Companies via LinkedIn
A malicious campaign attempting to infect business users in the United States with a backdoor has been ongoing for over half a year.
news  &  industry  malware  cybercrime 
march 2019 by SecurityFeed
Facts + Statistics: Identity theft and cybercrime | III
in 2017, there were 16.7 million victims of identity fraud, a record high that followed a previous record the year before. The amount stolen hit $16.8 billion.

In the United States, the average cost of a data breach was $7.91 million.

According to the Insurance Information Institute (I.I.I.) and J.D. Power 2018 Small Business Cyber Insurance and Security Spotlight SurveySM, 10 percent of small businesses surveyed suffered one or more cyber incidents in the prior year, and the average cost of cyber-related losses over the past year was $188,400. Only about one-third of firms surveyed had cyber insurance

How long it takes to recover: 40-200 hours over ~6 months (via, which all seem to point to a 2007 report by the FTC)

From (which keeps harping on public WiFi being insecure, ignoring the pervasiveness of HTTPS, but does give sources):

* 6.64 percent of all consumers were victims of identity fraud in 2017
* 52% of small businesses don’t invest in cyber risk mitigation, believing that they don’t store any private information. However, 68% at a minimum store email addresses, which is one potential entry vector for hackers.
identity  theft  statistics  cybercrime  data  breach  cost 
march 2019 by dandv

« earlier    

related tags

&  00000  201  2018  460  4th_amendment  5th_amendment  661  abuse  activism  adfraud  ai  analysis  and  android  arrested  asia  bad...  baltimore  banking  battle  been  believe  blockchain  blog  blogging  blogs  book  books  breach  canada  canadian  catherine_de_bolle  cbc  censorship  charged  communautaire  communications  consumerprotection  content  contentmarketing  cost  coursework  creativity  crime  criminalité  culture  cyber  cyberapprentissage  cyberattacks  cyberbullying  cyberharrassment  cyberlaw  cybersec  cybersecurity  cyberwar  darknet  data-leaks  data  databreaches  dataprotection  ddos  democracy  digital  digitalmarketing  discrimination  dodoma  don't  economics  economy  education  effects  elearning  encryption  epoca  ethereum  europe  europol  facebook  filles  filter  finances  find  for  formation  formationadistance  fortnite  fraud  fraude  from...  gdpr  gender  girls  going_dark  gouvernement  gov2.0  government  guide  hack  hackers!!  hackers  hacking  harassment  harcelement  hard  harmful  has  i  iad  identity.theft  identity  in  industry  infographic  informatique  instead  internet  interview  iot  isdp  it  its  it…  jeunes  jm  journalism  journalist  krebs  law  law_enforcement  learning  legal_tech  lhrc  list  longread  magufuli  malware  marketing  media  media_freedoms  media_law  memory  mob  mobile  money  money_laundering  movies  my  nation  ncpw2018  netpolicynotes  netsweeper  news  nigeria  novel  novels  npcc  nytimes  object  of  office365  on  one  onlinesafety  opsec  outils  passwords  people  phishing  pinterest  podcast  police  policing  policy  politics-newmedia  politics  power  privacy  programmatic  quebec  racism  racisme  ransomware  reference  reviews  richard_clayton  rights  russia  securite  security  securitynews  see  seo  service  sexisme  sexting  sfg  shiny  smallbiz  smart.home  smartcontracts  so  social  social_media  socialmedia  software  someone  sp_issues  state  statistics  surveillance  syllabus  sécurité  taking  tanzania  tax  teaching  that  the  theft  theory  to  toolkit  tools  training  trans  trousse  tumblr  twitter  uk  under  undesirable  university  usa  ux  victim  victims!  victoria  video  violence  waterloo  web  websecurity  why  wikipedia  witchcraft  with  women  word  world  writing  year  you  your  |   

Copy this bookmark: