Category Archives: General – Cybercrime patterns

Cybersecurity: human failure, data leaking and knowledge of it all

Hackers Get Personal Info On 12-Million Apple Users… From An FBI Laptop | Techdirt. 4 September 2012 I like the story in that the FBI spies (illegally probably, and if legally it raises questions of human rights) and the hackers … Continue reading

Posted in Anonymous and Co, censorship, General - Cybercrime patterns, General - Legal/non legal responses to cybercrime, Offences - Hacking (unauthorised access), Prevention - Security, Surveillance | Leave a comment

La citadelle du crime: Citadel or crime makes money

La citadelle du crime « Criminalités numériques. 11 February 2012 the post is in French, but a few fundamental facts confirm what I have been writing many times: crime makes money and particularly cybercrime. A botnet named Citadel (came out … Continue reading

Posted in Countries - UK, Countries - US, EU policy, General - Cybercrime patterns, Offences - CMA s.3A | Leave a comment

The Pirate Bay: offshore?

The Pirate Bay Claims It’s Going To Host The Site Via Drones Flying Over International Waters | Techdirt. 19 March 2012 Reading the post, I thought of Radio Caroline in the sixties: some people set up the radio to hear … Continue reading

Posted in Anonymous and Co, General - Cybercrime patterns, Offences - Hacking (unauthorised access), Offences - Piracy | Leave a comment

Myths and hypes

Hollywood Hackers Vs. Reality | Techdirt. 8 March 2012 Have not seen the movie, but if this post is accurate (and probably is), then Hollywood really had not a clue about how most unauthorised access to data is gained: human … Continue reading

Posted in General - Cybercrime patterns, Offences - Child pornography, Offences - Hacking (unauthorised access), Offences - Terrorism, Prevention - Security | Leave a comment

Cybercrime to eclipse terrorism?

FBI Director says cybercrime will eclipse terrorism – Mar. 2, 2012. CNN website – money section And for comments from TechDirt, 5 March 2012, “FBI Preaches Dangers Of ‘Cybercrime’ To The Choir“, Leigh Beadon For the first post after such … Continue reading

Posted in General - Criminalisation, General - Cybercrime patterns | Leave a comment

Patterns

“Cybercriminals target non-conventional appliances” (ZDnet.co.uk, 09 April 2010). not surprising, and among the devices: mobiles phones, USB flash drives and peripherals. and DDOS attacks linked with extortion/blackmail notices, “Chinese DDoS attacks hit News Limited” (ZDnet.co.uk, 14 April 2010)

Posted in Countries - China, General - Cybercrime patterns | Leave a comment

Security review by Symantec and other issues of web security

Symantec published its report analysing cyber-issues in 2009. Most of the attacks continue to come from the US (19%), followed by China (8%) and a new comer, Brazil (6%). The bulk of the attacks (37%) focuses on acquiring data, then … Continue reading

Posted in General - Cybercrime patterns, Offences - Fraud, Offences - Hacking (unauthorised access), Offences - Unauthorised 'modification' (and co), Prevention - Security | Leave a comment

Use of social networking

The tweet was silly, but the reaction to it is no better. Everything is out of proportion on both sides. Maybe we should set a course for both on how to use Twitter and social networking? “UK Man Arrested And … Continue reading

Posted in General - Cybercrime patterns, Social networking - Twitter | Leave a comment

Privacy, piracy, copyrights and censorship

The theme of the week seems to turn around protecting privacy. “Hacking Surpassing Human Error For Data Breaches?” (TechDirt, 19 January 2010). For the author, the answer is actually positive: hacking is a major threat, more that insiders leaking data. … Continue reading

Posted in censorship, Cloud_computing, Countries - China, Countries - France, Countries - US, General - Cybercrime patterns, Offences - Hacking (unauthorised access), Offences - Piracy, Privacy | Leave a comment

View of the blog via Wordle

I use Wordle (http://www.wordle.net/create) to copy text from the blog (minus my name and the main sources TechDirt, ZDnet.co.uk as it is irrelevant to what I wanted) in order to get an idea of which words were recurring in the … Continue reading

Posted in General - Cybercrime patterns | Leave a comment