Inside The Cybercrime Industry

Online security specialist Avast has created a report looking at the history and potential future of cyberattacks and cybercrime. The report, available here, outlines the various players in the build-up to a cyberattack and hacking and how cybercrime has kept pace with online business practices and their supporting technologies.


The report states: "Perpetrators of the attacks are the ones who actually steal information from users. They usually do not develop the malware themselves, but hire developers to create the malware to steal user information online.  Once they have the stolen user information, they then sell it on the dark web to cybercriminals who specialize in using stolen information (such as credit card numbers, login credentials, etc.) to make money.


"Cybercrime has kept pace – perhaps not surprisingly – with the evolution of e-commerce. As the general public grew more and more accustomed to entering credit card numbers online, cybercriminals quickly realized the impact that some strategically placed malware could have on this new digital marketplace."

more news

BA, Marriott Face Massive Fines For Data Loss


If proof was needed that poor data protection is bad for the corporate wallet, two examples have demonstrated that substantial fines face those organisations that have lax data security.

read more

Cumbria First Police Force To Utilise NMC Tools


Cumbria Constabulary has become the first police force to use the National Management Centre (NMC) for cybersecurity set up under the National Police Chiefs’ Council (NPCC).

read more

Phishing Attacks Bypassing 2-Factor Authentication


Penetration testers and attackers have a new tool in their arsenal that can be used to automate phishing attacks in a way that defeats two-factor authentication (2FA) and is not easy to detect and block, reports CSO Magazine.

read more

Third of Breaches Caused By Unpatched Vulnerabilities


IT security professionals have admitted that a third of cybersecurity breaches are the result of vulnerabilities that they should have patched.

read more