Tuesday, March 18, 2014

The spring of cybercrime

In the northern hemisphere, spring is knocking at our door. In the coming weeks, we will witness a explosion of colors and fragrances. However, in the field of cyber threats, spring has come to us in advance and lasted 12 months.

In fact, 20% of all malware detected in history of mankind flourished throughout the year 2013, according to a report from Panda. If we created a botanical catalog with new malware, 7 out of 10 specimens would belong to the Trojans’ family.

Given this situation and having learnt the lesson, Google has released an update to address the 4 vulnerabilities in Chrome discovered in the Pwn2Own held last week.

Meanwhile the British intelligence agency GCHQ (Government Communications Headquarters) is also aware of the need to test not only its systems but its potential candidates as well. Therefore, it arranged the Cyber ​​Security Challengean event in which 42 contestants had to deal with a simulated scenario where hackers had taken control of a nuclear power plant and the financial infrastructure had been taken down due to a DDoS attack.

While some gardeners try to get rid of weeds, others strive to spread them with a complete lack of empathy and moral values. Thus, there are cyber criminals using fake links to videos of the mysterious disappearance of Malaysia Airlines’ flight MH370 as bait to trick users on twitter and Facebook.

Fortunately, gardeners with bad intentions are caught by law enforcement sooner or later. This happened to the computer science student responsible for "sextorting" Miss Teen USA after hacking her computer and taking intimate photos and videos of the girl through her own webcam without her consent. He will face 18 months in prisonA man allegedly related to the leakage of personal data of 100,000 employees from the British supermarket chain Morrisons has also been arrested. Their identity or their possible role in filtration has not yet been unveiled, but it is believed that he could be a disgruntled employee.

The best way to avoid being a victim of allergies caused by the cyber threats’ pollen is to be well informed. Therefore, we invite you to follow us on our different channels (links at the bottom), and also on our blog: http://www.cigtr.info.


We invite you to rate our posts, to leave your comments and to share them on social networks. Also, if you want you can follow us on our profiles. At the sidebar, you’ve got the links ;-)


Post a Comment