This 2007 worm infected millions of computers and then took its infections further than the last two worms on our list, as cybercrooks
moved from notoriety to professionalism.
can operate anywhere, making local law enforcement efforts difficult.
That is just one of the findings of the Symantec team, which spends much of its time in the dark corners of the Internet, in chat rooms and on message boards where cybercrooks
Brazil quicky embraces new technology, yet the country is becoming a haven for cybercrooks
who rob hanks.
From footwear to pharmaceuticals, cybercrooks
are moving knockoffs across the Internet.
Thus, the information technology revolution is said to herald a society of leisure and plenty or instead, a society of unemployment and exclusion; the Internet to constitute a utopian space of free communication equality, democracy or, alternatively, the global lair of pedophiles, neo-nazis, cybercrooks
But there is also a new generation of cybercrooks
who can operate from anywhere in the world, hide their identity and disappear from the web in seconds.
Sometimes people act too quickly and end up destroying evidence that could be used to prosecute the cybercrooks
or prevent recurring attacks.
Engineers have crammed an electromechanical combination lock onto a computer chip that they say can shut out cybercrooks
In most cases, the cybercrooks
get away scot-free because cyber fraud is not generally covered by individual state or federal consumer protection laws.
despite consumer concerns about protecting their privacy on the Internet, the "smart home" of the future, with online access to and from many sources, may provide cybercrooks
with "one-stop" shopping of personal information.
5) iPhone 5, iPad Mini and other hot holiday gift scams--The kind of excitement and buzz surrounding Apple's new iPhone 5 or iPad Mini is just what cybercrooks
dream of when they plot their scams.
Rebecca Herold, president of the Des Moines, Iowa-based SIMBUS and CEO of The Privacy Professor, said, "The propensity for cybercrooks
to target and load data-capturing/stealing POS systems has been increasing in the past few years, but yet the security controls have not improved
Federal Bureau of Investigation to track down the cybercrooks
who stole $81 million from its central bank's U.
According to a report by US computer security software-maker McAfee, the so-called "embedded systems", that control an array of car's functions including door locking, engine ignition, navigation, brakes and communications, are reliant on connectivity via cables, WiFi, Bluetooth and 3G networks, meaning they could easily be hacked by cybercrooks