. Internet Crime Definition – What does Internet Crime mean? Internet crime is any crime or illegal online activity committed on the Internet, through the Internet or using the Internet. The widespread Internet crime phenomenon encompasses multiple global levels of legislation and oversight. In the demanding and continuously changing IT field, security experts are committed to combating Internet crime through preventative technologies, such as intrusion detection networks and packet sniffers. Internet crime is a strong branch of cybercrime. Identity theft, Internet scams and cyberstalking are the primary types of Internet crime.…Read More
Selected ICFO Internet Resources The broad range and depth of resources include, but are not limited to Addiction, Aging, Children’s Safety, Complaint, Identity Theft, Privacy, Scams. Spam These may include articles, blogs, how to, filing forms, tips and such Resources for your personal research, papers, and library Excellent start for your Due Diligence and further investigation Resources Warning and Recommendations Most of us know that value of a recommendation when you need something; be it a plumber, repair or the type of help resources herein Making a recommendation put your…Read More
Largest private provider Eurofins hands over undisclosed fee to regain control of systems
Britain’s largest private forensics provider has paid a ransom to hackers after its IT systems were brought to a standstill by a cyber-attack, it has been reported.
Eurofins, which is thought to carry out about half of all private forensic analysis, was targeted in a ransomware attack on 2 June, which the company described at the time as “highly sophisticated”. Three weeks later the company said its operations were “returning to normal”, but did not disclose whether or not a ransom had been paid.
Cybercrimes Cost Americans $2.7 Billion in 2018, People 60 and older are often the targets, FBI says by Katherine Skiba FBI Losses from internet crimes are up 91 percent, with people over 60 often the targets, according to a new report from the FBI that shows cybercrimes cost Americans more than $2.7 billion in 2018. Internet crimes run the gamut. People pay for goods or services they never receive. Or they get suckered into a romance fraud. Or they invest money in what turns out to be a Ponzi scheme. The annual report, released…Read More
Hey there 🙂
I just contributed to a new blog post about some cybercriminals using advanced tools to spread a cryptocurrency miner.
The full blog post is here.
Too much curiosity ultimately led to a rewarding career for Chris Kubecka
–Di Freeze, Managing Editor
Northport, N.Y. – Jul. 11, 2019
Chris Kubecka, one of the women featured in the book, “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime,” by Steve Morgan and me, is “a cybercrime fighter and cyberwar strategist.” But she wasn’t always on the right side of the fight against cybercrime.
Now an advisor and subject matter expert to governments and industries, Kubecka says her computer obsession began with her mother. “She was a single mom. She started as a data operator changing hard drive platters on night shift,” she said. “There was no money for a babysitter, so I joined her at work.”
Her mom was quickly promoted to robotics assembly manufacturing programmer and then moved up as an expert, speaker, and trainer. “She lectured on robotics and industrial controls system programming,” she said.
Her mother’s job enabled Kubecka to learn basic computer skills by the age of 6, and she fell in love with programming while sitting in front of a green screen. “I was addicted completely to technology at that point,” she said.
Her computer skills would get her in trouble at the age of 10. Her school had a computer lab, and she started “war dialing with an old-fashioned modem — the ones you put the phone on.” She discovered some weak systems, which turned out to be the Department of Justice.
After about two weeks of access, she got caught. “This was not cool,” she said. That’s because her family had connections with NASA, the NSA, the CIA, and a presidential appointment at the VOA. “I was restricted from using a computer until the age of 18,” she said.
With no college money, the military was a good option, so Kubecka took the ASVAB (Armed Services Vocational Aptitude Battery). “I missed one question,” she said. “They granted me a military moral waiver and the USAF took me in.”
Kubecka served in the U.S. Air Force as a C5 loadmaster, while flying combat and humanitarian missions. “I set up the first file server system for our flying squadron, installed antivirus and so forth,” she said.
After being injured in the line of duty, she took a role in USAF Space Command, in front of a computer full-time with Space Operations. Her role came under the heading of “Plans and Implementations of Telecommunications and CCS Systems.”
After the military, Kubecka became a disaster recover consultant for the Blair Technology Corporation and then took an internship at the Department of Veteran Affairs. She interned as a vascular surgery technician while pursuing pre-medical studies as well as interning as a database programmer.
Still fascinated by computers, she later became a network administrator for HSA Engineers & Scientists before becoming senior network operations analyst for Signature Consultants, and the senior client security advisor for flagship clients Lloyds TSB and Danone for Unisys. In that position, she detected and helped halt a second wave of cyberwar attacks against South Korea in July 2009.
She also served as the IT security manager for Achmea. In 2012, when Saudi Aramco, the state-owned national oil company of Saudi Arabia, was hit with the “Shamoon logic bomb,” a destructive virus that affected 35,000 computers and forced Aramco to take its network offline, Kubecka was brought in to set up a security operation.
She worked with Aramco for two years before founding HypaSec, based in the Netherlands. HypaSec offers expert advice, incident response management, lecturing, training in IT and ICS security, penetration testing and writing services in security.
Kubecka has chaired and presented at leading industry conferences and has authored several books regarding computer science and penetration testing, including “Hack the World with OSINT.”
To learn about more women fighting cybercrime, pick up a copy of “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime.”
The post How A 10-Year-Old War Dialer Became A Top Cybersecurity Expert appeared first on Cybercrime Magazine.
If you’re an avid Instagram user, chances are you’ve come across some accounts with a little blue checkmark next to the username. This little blue tick is Instagram’s indication that the account is verified. While it may seem insignificant at first glance, this badge actually means that Instagram has confirmed that the account is an authentic page of a public figure, celebrity, or global brand. In today’s world of social media influencers, receiving a verified badge is desirable so other users know you’re a significant figure on the platform. However, cybercriminals are taking advantage of the appeal of being Instagram verified as a way to convince users to hand over their credentials.
So, how do cybercriminals carry out this scheme? According to security researcher Luke Leal, this scam was distributed as a phishing page through Instagram. The page resembled a legitimate Instagram submission page, prompting victims to apply for verification. After clicking on the “Apply Now” button, victims were taken to a series of phishing forms with the domain “Instagramforbusiness[.]info.” These forms asked users for their Instagram logins as well as confirmation of their email and password credentials. However, if the victim submitted the form, their Instagram credentials would make their way into the cybercriminal’s email inbox. With this information, the cybercrooks would have unauthorized access to the victim’s social media page. What’s more, since this particular phishing scam targets a user’s associated email login, hackers would have the capability of resetting and verifying ownership of the victim’s account.
Whether you’re in search of an Instagram verification badge or not, it’s important to be mindful of your cybersecurity. And with Social Media Day right around the corner, check out these tips to keep your online profiles protected from phishing and other cyberattacks:
- Exercise caution when inspecting links. If you examine the link used for this scam (Instagramforbusiness[.]info), you can see that it is not actually affiliated with Instagram.com. Additionally, it doesn’t use the secure HTTPS protocol, indicating that it is a risky link. Always inspect a URL before you click on it. And if you can’t tell whether a link is malicious or not, it’s best to avoid interacting with it altogether.
- Don’t fall for phony pages. If you or a family member is in search of a verified badge for their Instagram profile, make sure they are familiar with the process. Instagram users should go into their own account settings and click on “Request on verification” if they are looking to become verified. Note that Instagram will not ask for your email or password during this process, but will send you a verification link via email instead.
- Reset your password. If you suspect that a hacker is attempting to gain control of your account, play it safe by resetting your password.
The post #Verified or Phishing Victim? 3 Tips to Protect Your Instagram Account appeared first on McAfee Blogs.