376 Hits in 4.8 sec

Breaking the Target: An Analysis of Target Data Breach and Lessons Learned [article]

Xiaokui Shu, Ke Tian, Andrew Ciambrone, Danfeng Yao
2017 arXiv   pre-print
It includes a thorough step-by-step analysis of this attack and a comprehensive anatomy of the malware named BlackPOS.  ...  Credit card security is discussed at the end of the paper with several best practices given to customers to hide their card information in purchase transactions.  ...  The multiform alarming method utilizes different ways to interact with different people.  ... 
arXiv:1701.04940v1 fatcat:ojnve4fdrfbmvooxphpflqoi4a

When Governments Hack Opponents: A Look at Actors and Technology

William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson
2014 USENIX Security Symposium  
In addition to off-the-shelf remote access trojans and the use of third-party IP-tracking services, we identify commercial spyware marketed exclusively to governments, including Gamma's FinSpy and Hacking  ...  Repressive nation-states have long monitored telecommunications to keep tabs on political dissent.  ...  The authors would like to thank the following individuals for their help in various aspects of our analysis: Bernhard Amman, Collin D.  ... 
dblp:conf/uss/MarczakSMP14 fatcat:2lxwt6qdwrcqfgzwf2pmpg2shq

Folklore and Crime

Joel Conn
2019 Ethnologies  
The process of transferring money to accounts in China and then to additional financial institutions makes tracking and recovering the funds much more difficult for investigators and the companies that  ...  ") malware.  ... 
doi:10.7202/1069847ar fatcat:tpcaw63h5jdatiamxjeifi6e44

Competence in Cybercrime: A Review of Existing Laws

Nibras Salim Khudhair
2021 Revista GEINTEC  
assaults on essential infrastructure. 3 Due to the tremendous cost of cybercrime to society, administration, and citizens, dealing with it has become critical.  ...  The practise of cyber hunting is a different approach to traditional cyber security, in which technologies and human intelligence are used to discover potential threats.  ...  Punishment-Up to three years in prison or a fine.  ... 
doi:10.47059/revistageintec.v11i4.2246 fatcat:wppu5vptyzcvdfwwsobxiinvdi

Emerging Threats and Vulnerabilities [chapter]

Malcolm Harkins
2013 Managing Risk and Information Security  
The Zeus malware family provides a useful case study showing how complex this industry has become and how hard it is to accurately track developments.  ...  Edge cases can include unlikely interactions between two familiar objects.  ... 
doi:10.1007/978-1-4302-5114-9_6 fatcat:7zxrpnshlnh7pgfjbi4dzega7e

A New Sensors-Based Covert Channel on Android

Ahmed Al-Haiqi, Mahamod Ismail, Rosdiadee Nordin
2014 The Scientific World Journal  
Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system.  ...  Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data.  ...  One way to model covert channels is the prisoner problem proposed by Simmons [7] . Two prisoners are planning to escape in the presence of a closely watching warden.  ... 
doi:10.1155/2014/969628 pmid:25295311 pmcid:PMC4177823 fatcat:5ptqjk56jrdixjhemltewlrhqy

Review of Mobile Malware Forensic

Ahmet Efe, Ayşe Nur Dalmış
2019 Journal of International Scientific Researches  
Thousands of innocents have suffered because of this malware. This kind of threats is also considered to have some negative impact of m-government solutions and development.  ...  Afterwards, it was discovered that the malicious software was infected to some of nun-member suspects' mobile phones by Morbeyin operation which was discovered and revealed by mobile malware forensic experts  ...  Fraudulent Message Shown to The User by Malware The user is provided with a SMS containing a link to the mobile phone that when filling in the information shown in fig. 5 and pressing the create button  ... 
doi:10.23834/isrjournal.566676 fatcat:3wmssmw465epvbzbc3boqumc4u

Studying Malicious Websites and the Underground Economy on the Chinese Web [chapter]

Jianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, Wei Zou
2008 Managing Information Risk and the Economics of Security  
Second, our research proves that a significant amount of websites within China's part of the Web contain some kind of malicious content: our measurements reveal that about 1.49% of the examined sites contain  ...  malicious content that tries to attack the visitor's browser.  ...  In September 2007, Li Jun was sentenced to four years in prison, Wang Lei two and a half years, Zhang Sun two years.  ... 
doi:10.1007/978-0-387-09762-6_11 fatcat:y3y6d7nogzaulhxldyyxugf3se

Organizations and Cybercrime

Roderic Broadhurst, Peter Grabosky, Mamoun Alazab, Brigitte Bouhours, Steve Chon
2013 Social Science Research Network  
By contrast, protest activity tends to be less organized, with weak (if any) chain of command.  ...  Enterprise or profit-oriented activities, and especially cybercrime committed by state actors, appear to require leadership, structure, and specialisation.  ...  All faced the risk of long prison sentences.  ... 
doi:10.2139/ssrn.2345525 fatcat:6bemqytbqjeq3k3fpgc4yqqgpq

An Analysis of DDoS Attacks on the Instant Messengers

Mohammad Faisal, Sohail Abbas, Haseeb Ur Rahman, Muhammad Zahid Khan, Arif Ur Rahman
2019 Security and Communication Networks  
The analysis will help the security experts to propose appropriate countermeasures to reduce the attackers' utility, thereby making it less attractive for those attackers to launch the attack.  ...  We use a game theoretic model to analyze the feasibility of DDoS attacks on the IRC platform, keeping in view the attacker's objective.  ...  Exploiting the social engineering techniques, the malware first of all sends an SMS containing the link to download and install the software, which can sabotage all the online banking transactions from  ... 
doi:10.1155/2019/1751285 fatcat:atodcjuy7rgp7iwumsfjq6m5sq

The use of dark Web for the purpose of illegal activity spreading

Zaklina Spalevic, Milos Ilic
2017 Ekonomika  
Generally positive features such as access to information about Internet users, anonymity and protection of personal data are used with the evil intention of acquiring illegal profit and spreading ethnic  ...  Друштво економиста "Економика" Ниш THe use oF darK Web For THe purpose oF illeGal aCTiviTy spreadinG abstract The development of information and communication technologies, especially the Internet, has led to  ...  Some of these contents are horrific footage of last conversation and words of passengers in a crashing plane, a prisoners on the day of execution (for example, the electric chair in prison in Texas) or  ... 
doi:10.5937/ekonomika1701073s fatcat:4zycgufszjhz5cykyxz3i4oj2i

Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime [article]

Colin C. Ife, Toby Davies, Steven J. Murdoch, Gianluca Stringhini
2022 arXiv   pre-print
To this end, we provide an overview of the research from environmental criminology and how it has been applied to cybercrime.  ...  In this paper, we argue that it would be beneficial for the information security community to look at the theories and systematic frameworks developed in environmental criminology to develop better mitigations  ...  ACKNOWLEDGMENTS We would like to thank all those who reviewed this work. Colin C. Ife is supported by the Dawes Centre for Future Crimes, and EPSRC under grant EP/M507970/1. Steven J.  ... 
arXiv:1910.06380v2 fatcat:2jklb4lzmfd6bo7bdftef2v6am

A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems [article]

Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac
2021 arXiv   pre-print
to the real systems.  ...  However, they have become popular targets of attacks, due to their inherent limitations which create vulnerabilities.  ...  Researchers can employ open source IDS solutions such as Snort, Zeek, Suricata etc., malware analysis platforms such as Cuckoo, and next generation networking technologies such as SDN to propose novel  ... 
arXiv:2108.02287v1 fatcat:l4b23mylyfd6xjtfhrtsrin3zq

How Might Crime-Scripts Be Used to Support the Understanding and Policing of Cloud Crime? [chapter]

Steve Warren, Gavin Oxburgh, Pam Briggs, David Wall
2017 Lecture Notes in Computer Science  
Crime scripts are becoming an increasingly popular method for understanding crime by turning a crime from a static event into a process, whereby every phase of the crime is scripted.  ...  It is based on the work relating to cognitive scripts and rational-choice theory.  ...  Should the law be strictly enforced with hackers given harsh prison sentences, or will sending them to prison make the situation worse, by allowing the criminals to socialise with one another, with the  ... 
doi:10.1007/978-3-319-58460-7_38 fatcat:ue5i3qozzrbabaip2xs7bxhwgm

Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties within Phishing and Malware Networks

E. Rutger Leukfeldt, Edward R. Kleemans, Wouter P. Stol
2016 British Journal of Criminology  
Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.  ...  Forums are also used to acquire knowledge and skills. In the digital era, forums are replacing prisons as the 'university for cybercriminals'.  ...  include offenders themselves, the illegal partnerships in which they operate and the interaction with their social environment.  ... 
doi:10.1093/bjc/azw009 fatcat:zgcmngrrubfdjcc2elasx4pppy
« Previous Showing results 1 — 15 out of 376 results