Remove 2001 Remove Cybercrime Remove Encryption
article thumbnail

South African telecom provider Cell C disclosed a data breach following a cyberattack

Security Affairs

The company founded in 2001 offers prepaid and postpaid mobile plans, data bundles and internet services, fiber broadband, roaming and international calling, SIM-only plans and device deals. Unlike other extortion group, the gang doesnt encrypt data, but focuses on data theft to speed up its activity. Victims include AMD and Keralty.

article thumbnail

Cyber CEO: The History Of Cybercrime, From 1834 To Present

Herjavec Group

We can learn a lot from the cybercrime of the past…the history of cybercrime is a glimpse into what we can expect in the future. In the past 18 months, we’ve experienced the beginning of an era that has seen cybersecurity and cybercrime at the center of it all. Dateline Cybercrime . Robert Herjavec.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UN approves Russia-Cina sponsored resolution on new cybercrime convention

Security Affairs

The United Nations on Friday have approved a Russian-sponsored and China-backed resolution to create a new convention on cybercrime. The United Nations on Friday has approved a Russian-sponsored and China-backed resolution to create a new convention on cybercrime. It will only serve to stifle global efforts to combat cybercrime.”

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

As cybercrime flourishes and evolves, organizations need a fleet of tools to defend and investigate incidents. Be it advanced locks, encryption barriers, or deleted and unknown content, the UFED (Universal Forensic Extraction Device) can extract physical and logical data. ProDiscover.

Software 139
article thumbnail

The History of Computer Viruses & Malware

eSecurity Planet

Going Mobile and Going Global: 2001-2010. In July 2001, the Code Red Worm attempted to subject the entire Internet to a distributed denial of service (DDoS) attack. In fact, China itself would fall prey to the second iteration of Code Red in August 2001. It later evolved to also include file encryption.

Malware 140