29 Results for

cybercrooks

Article

Cybercrooks use DDoS attacks to mask theft of banks' millions

Analyst says three unidentified US banks have been hit with "low powered" DDoS attacks to cover fraudulent wire transfers.

By Aug. 21, 2013

Article

Cybercrooks bring their schemes to Tumblr and Pinterest

Digital criminals are expanding their social-networking nefariousness beyond Facebook and Twitter to try to trick users into downloading malicious payloads.

By May. 9, 2012

Article

McAfee: Cybercrooks target corporate trade secrets

Cybercriminals are changing focus from grabbing private information to now stealing trade secrets and other intellectual properties from major corporations.

By Mar. 28, 2011

Article

Fortinet: Job outlook improving for cybercrooks

Next year will see more cybercrooks hiring people to help create and deploy botnets, which will likely trigger further cooperation in security community to shut down malware at its source.

By Dec. 13, 2010

Article

Cybercrooks create fake Amazon receipts

A new hacking program lets cybercriminals generate phony receipts for Amazon goods, which they're using to get refunds for items that they claim were lost in the mail.

By Dec. 9, 2010

Article

CNET News Daily Podcast: Cybercrooks use typos to spread malware

Cameroon's .cm extension found to be riskiest domain, Psystar stops selling its Mac clones, AT&T gives up on its Verizon ad lawsuit, and more of today's tech news.

By Dec. 2, 2009

Video

How cybercrooks hack Web sites

Want to see what cybercriminals are up to and what the latest trends are in malicious software? CNET News.com's Joris Evers looks at what they're doing to run code off Web sites, how the threat appears to the user and what you can do about it.

Nov. 1, 2007

Article

Phishing scam masquerades as Adobe upgrade

Security provider Cloudmark continues to see more spam e-mails with fake notices promising an upgrade for Adobe Reader but instead trying to get users to provide their credit card info.

By Mar. 31, 2011

Article

How to recover your lost or stolen phones, tablets, and other devices

Technology is increasingly the target of crimes, but it can also be used to fight back against the perpetrators.

By Aug. 28, 2013

Article

Trend Micro forecasts future threats

Cloud computing and virtualization are two technologies that cybercriminals may target more heavily next year, predicts security firm Trend Micro in a new report.

By Dec. 10, 2009