Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
the emergence of increasingly powerful toolkits and exploits for sale online.
In the past year, cyber criminals have used increasingly powerful and targeted attacks to steal information ranging from credit card details and other personal information to intellectual property.
At the same time, international co-operation is growing and has led to several botnet takedowns and arrests in co-ordinated operations around the globe.
Here are 10 articles that illustrate some of the major trends in cyber crime in 2012:
Online cyber criminal markets are putting very sophisticated attack tools into the hands of more low-level attackers, say cyber intelligence specialists.
More attackers are now getting their hands on tools like Zeus and SpyEye, according to the cyber intelligence team at the Online Threats Managed Services (OTMS) group of RSA, the security division of EMC.
Cyber crimes are costly. The Ponemon Institute found that the average annualised cost of cyber crime for the 38 organisations is £2.1 million a year, with a range of £0.4 million to £7.7 million
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to the latest threat report from security firm GFI Software.
In November, a hacker was offering a zero-day exploit for Yahoo Mail for $700 that would enable an attacker use a cross-site scripting (XSS) vulnerability to steal cookies and hijack accounts.
The hacker, known as “TheHell”, created a video to market the exploit on an underground cyber crime market called Darkode.
Law enforcement officers arrested six people in the UK and 12 in the US in an FBI-led sting operation in June that netted a total of 24 credit card cyber fraudsters in 13 countries.
The arrests followed a two-year undercover FBI investigation that tracked those buying and selling credit card information through a fake online forum
Cross-site scripting (XSS) attacks remain the top threat to web applications, databases and websites, an analysis of 15 million cyber attacks in the third quarter of 2012 revealed.
Advanced persistent threats (APTs) are real and all companies should be taking them seriously, says telecommunications company AT&T.
In the past year, the company has set up an IT security team dedicated to researching APTs and making recommendations on how to defend against them.
A Yahoo user sued the web portal company for negligence in August for allowing more than 450,000 user names and passwords to be stolen from one of its sites.
Jeff Allan of New Hampshire, whose login credentials were posted online after a hacker infiltrated a company database on 11 July, filed a complaint in a federal court in California.
US space agency Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 employees and contractors.
This is the latest in a series of data breaches involving unencrypted laptops at Nasa in recent years and comes just eight months after the theft of a laptop containing personal information of 2,300 employees and students.
Web and mobile applications are the new frontiers in the war against cyber attack, according to a top cyber security risks report from Hewlett Packard (HP) published in May.
The report reveals that SQL injection (SQLi) attacks on web applications increased sharply from around 15 million in 2010 to more than 50 million in 2011.