Profile cover photo
Profile photo
VFAC Cybercrime
51 followers -
The Virtual Forum Against Cybercrime
The Virtual Forum Against Cybercrime

51 followers
About
VFAC's posts

Post has attachment
Enhancing cybersecurity in Africa not only requires government engagement at the highest level, but also training to ensure local law enforcement and technical personnel have the tools and training required to enhance and enforce security laws and related IT, said UNCTAD's Barayre. - See more at: http://www.cfoworld.com/technology/84442/west-african-countries-look-adopt-coordinate-cyberlaws#sthash.nmEzekul.dpuf

Post has attachment
his post examines an opinion a federal judge in Alabama issued in a civil suit:  Michael and Tanya Bruce sued Joshua McDonald, James R. McKoon, Jr., and Melissa B. Thomas and her law firm, asserting interception, disclosure, and use of electronic communications in violation of the Wiretap Act of 1968, as amended, 18 U.S. Code § 2511.”  Bruce v. MacDonald, 2014 WL 931522 (U.S. District Court for the Middle District of Alabama 2014).

Post has attachment
"Attackers are exploiting a newly discovered vulnerability in Microsoft Word that makes it possible to remotely seize control of computers, the company warned."

Post has attachment
"Apps that exploit the denial-of-service vulnerability work on Android versions 2.3, 4.2.2, 4.3, and possibly many other releases of the operating system, researcher Ibrahim Balic wrote in a blog post published last week. Attackers could exploit the underlying memory corruption bug by hiding attack code in an otherwise useful or legitimate app that is programmed to be triggered only after it is installed on a vulnerable handset."

Post has attachment
Panda Security, The Cloud Security Company, has published the results of its 2013 Annual Report, drawn up by PandaLabs. According to the report, malware creation hit a new milestone. In 2013 alone, cyber-criminals created and distributed 20 percent of all malware that has ever existed, with a total of 30 million new malicious strains in circulation, at an average of 82,000 per day.

Post has attachment
Businesses should not have to comply with a complex set of differing rules on cyber security.

Post has attachment
Hackers steal 12 million customer records from South Korean phone giant

Post has attachment
Final countdown, CryptoLocker payout and Full Disk Encryption – 60 Sec Security [VIDEO]

Post has attachment
"We are watching you / Don't close your eyes," they wrote on the site, which conceivably might have been scary if they'd actually managed to hack their (presumably) intended target, Yorkshire Bank."

Post has attachment
 US researchers have found that a traffic analysis of ten HTTPS-secured Web sites yielded “personal data such as medical conditions, legal or financial affairs or sexual orientation”
Wait while more posts are being loaded