Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS » Computational Criminology

Spora: dangerous criminal malware. Is ISIS behind it?

Spora: dangerous criminal malware. Is ISIS behind it?

Nowadays, ransomware has become the most dangerous type of criminal malware. Most of the new families are prepared by amateurs (script-kiddies) and they are distributed on a small scale. Inside…

New law: Metadata must be kept for two years by Australian telecoms.

New law: Metadata must be kept for two years by Australian telecoms.

Large amounts of telecommunications metadata must now be kept for two years by Australian telecommunications companies, under a new law which came into effect last week. READ ARTICLE HERE…

Japan’s Cybercrime Underground Reports increased 40% in one year.

Japan’s Cybercrime Underground Reports increased 40% in one year.

According to DARKREADING “Japan’s cybercrime operations mainly target Japanese citizens. But their interest in banking malware, ransomware and DDoS tools would indicate their targets could go global”,  Kelly Jackson Higgins…

To counter PRC attacks, Taiwan and U.S. conducting cyber security drill.

To counter PRC attacks, Taiwan and U.S. conducting cyber security drill.

Taiwan wants to join a major anti-hacking drill conducted by the United States to strengthen cyber security ties with its staunchest ally, its vice premier said on Monday, a move…

How to avoid being hacked during World Cup Brazil 2014

How to avoid being hacked during World Cup Brazil 2014

When the 2014 World Cup kicks of in Brazil this week, the event is expected to draw hundreds of thousands of diehard soccer fans from around the world. Since those fans are…

Secure cloud in Australia: more interaction, encryption, tighter rules, real-time monitoring.

Secure cloud in Australia: more interaction, encryption, tighter rules, real-time monitoring.

Most of the total data in the world today (90%) has been created in the period 2011-2013, and 2014 and beyond will see exponentially increase of data. Australia has put…

New Zealand company Wynyard Group launched crime analytics software.

New Zealand company Wynyard Group launched crime analytics software.

Recently, the New Zealand company Wynyard Group launched a crime analytics software that has the capability of expanding its global network.   Wynyard is teaming up with the British firm…

Asia Pacific cyber security insurance market is booming.

Asia Pacific cyber security insurance market is booming.

  Interest from Asia Pacific companies in cyber insurance is growing in the whole region. The reason behind this booming business are the constant cases and reports of security breaches.…

Hong Kong also threatened by Chinese hackers.

Hong Kong also threatened by Chinese hackers.

Security experts have warned multinationals with bases in Hong Kong that they are not immune to cyber attack from China despite the shared sovereignty between the Special Administrative Region (SAR)and…

U.S. Pacific goals: contain China and North Korea.

U.S. Pacific goals: contain China and North Korea.

The U.S. Defense Secretary Leon Panetta, speaking at an annual security forum in Singapore, announced the U.S. strategy for The Pacific region: to contain China’s emergence as a global power.…

Page 1 of 3123