Human Risk Management Blog

Cybercrime

We report on the latest trends in cybercrime to help you stay informed and aware of what the current threat landscape looks like.

Cybercrime and Espionage

[caption id="attachment_1225" align="alignleft" width="300" caption="Shadowy Espionage"][/caption] The world's most extensive case of cybercrime-espionage, including attacks on U.S. ...

The Changing Face of Cybercrime

Once upon a time being the victim of theft meant that someone picked your pocket, grabbed your purse and ran, or robbed your home. They were there and then gone, along with your ...

Cybercrime – a growing expense for all organizations

[caption id="attachment_1203" align="alignleft" width="300" caption="Cybercrime Costs Rising"][/caption] Cybercrime cost corporations 56 percent more this year than last, according to an ...

FBI Apprehends International Cybercrime Rings

The Federal Bureau of Investigation (FBI) has managed to apprehend two international cybercrime rings that were peddling scareware. The scareware was directed towards numerous victims by ...

Cybercrime Soon to Be FBI #1 Priority

The FBI said that cybercrime is the agency's No. 3 priority but it will likely rise to No. 1 in a few years. FBI Supervisory Special Agent Robert White said that criminals always find new ...

Cybercrime Crimewave Hits Churches

Cybercriminals are truly criminals and are the antithesis of the Robin Hood criminal of storybooks. Stealing money raised by a church to help homeless and abused women is pretty low. But ...

Cybercrime Profit from Norway Tragedy

Within 24 hours of the recent bombing and shootings in Norway, Internet thieves were committing cybercrimes by sending out phishing emails to collect donations to aid victims. ...

Protecting Your Organization from Cybercrime

[caption id="attachment_1162" align="alignleft" width="200" caption="orangized cybercrime"][/caption] Following is an excerpt from an article by Rockie Brockway, Security Practice ...

A True Story of Organized Cybercrime

[caption id="attachment_1156" align="alignleft" width="300" caption="Hackerville, Romania"][/caption] Following is an excerpt from a fascinating but very scary story that affects s all of ...

June was a Busy Month for Cybercriminals

[caption id="attachment_1150" align="alignleft" width="192" caption="cybercriminals"][/caption] Last month Russian cybercriminals tried their luck at “making money for nothing” using the ...

Five Generations of Cybercrime

It helps to understand more about the history of hacking, when you need to defend yourself or your organization against cybercrime.

Federal Law Overhaul Needed to Fight Today’s Cybercrime

[caption id="attachment_1132" align="alignleft" width="300" caption="Congressional Law Makers"][/caption] In mid-May, the Obama administration called on Congress to expand the definition ...

Today’s Organizational Cyber Security Challenge

[caption id="attachment_1126" align="alignleft" width="160" caption="cyber security"][/caption] The most challenging cybercrime attacks exploit human vulnerabilities rather than ...

Ohio’s Cybercrime Woes

A look at cyberheists and other cybercrimes in Ohio recently shows more than 25,000 private records from school districts, hospitals, retirement benefits firms and others have been ...

Cybercrime Statistics are Bad, But No one Agrees How Bad…

[caption id="attachment_1115" align="alignleft" width="300" caption="cybercrime statistical chart"][/caption] The news media, the government, and countless Internet security organizations ...

National and Local Government Debate Cybercrime Issues

From the White House to Congress, federal leaders are looking at a range of policy options to bolster the United States’ ability to thwart Internet threats ranging from cybercrime to ...

Take a Bite Out of Cybercrime—Not!

[caption id="attachment_1095" align="alignleft" width="173" caption="Cybercrime prevention"][/caption] A big problem we are facing in the fight against financial cybercrimes is that the ...

FFIEC Updates Internet Banking Environment Guidelines

Federal banking regulators today released a long-awaited supplement to the 2005 guidelines that describe what banks should be doing to protect e-banking customers from cybercrime, hackers ...

The World Wide Web is being re-branded as the World Wild Web

[caption id="attachment_1070" align="alignleft" width="300" caption="World Wild Web"][/caption] Increasingly, cyber-criminals are using mobile malware and fake apps as monetizing ...

Users Are the Weak Link in IT Security!

[caption id="attachment_1060" align="alignleft" width="300" caption="Weak Link in IT Security"][/caption] Firewalls and antivirus software can only go so far. Jeff James of Windows IT ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.