CCI

Today's Cybercrime News

.

HISTORIC TREND CHART

ID Theft

current insight


recent incidents

Date Type Country Industry Data Type Records
2014-02-19 Accidentally made publicAustraliaA government agency.Names, individual's nationalities, home addresses, and travel information.10000
2014-02-04 HackersTurkeyA government organization.Names, home addresses, ID numbers, phone numbers, email addresses, and bank account details.600
2014-02-14 HackersUnited KingdomA retail chain.Email addresses, user names, and passwords.2239
2014-02-07 HackersUnited KingdomA bank in the United Kingdom.Names, home addresses, passport numbers, and national insurance numbers, medical information, insurance policies, and financial information.27000
2014-02-11 HackersUnited StatesA casino chain in Nevada.Names, email addresses, Social Security numbers, administrator passwords, driver's license numbers, banking information, and credit card details.0
2014-02-03 HackersUnited StatesA medical center in Minnesota.Tax records including names, home addresses, and financial information.1000
2014-02-19 HackersUnited StatesA university in Maryland.Name, Social Security number, date of birth, and student numbers.309079
2014-02-14 HackersUnited StatesA media organization.Names, email addresses, user names, and passwords.1056986
2014-02-10 HackersUnited StatesTaxi services in Chicago.Debit and credit card numbers.0
2014-02-21 Accidentally made publicUnited StatesA university in Indiana. Names, addresses, birth dates, and Social Security numbers.145966

fraud

current insight



where dangrous phishing sites are hosted

1 United States

2 Germany

3 United Kingdom

4 Netherlands

5 France

6 Brazil

7 Russia

8 Turkey

9 Canada

10 Hong Kong

11 Italy

12 Poland

13 Spain

14 Singapore

15 Vietnam


malware

current insight



a few of today's most hijacked search terms

Cybercriminals insert these terms on infected sites to manipulate search engines results and trick people into visiting these sites. Use caution with these search terms.


today's most dangerous websites

These sites have been infected with malware and can attack your computer just by visiting them. Avoid these "dirty" sites.


top malware attacks


top malware attacks

1 United States

2 China

3 Taiwan

4 Canada

5 Brazil

6 United Kingdom

7 France

8 Italy

9 Germany

10 Hungary

11 Korea, South

12 Japan

13 Poland

14 Spain

15 Israel

spam

An OpenSSL vulnerability, dubbed Heartbleed, can allow an attacker to access your sensitive information. Stay vigilant.

Symantec is aware of and currently investigating the OpenSSL vulnerability, dubbed Heartbleed, which allows attackers to read the memory of the systems using vulnerable versions of the OpenSSL open source library. This allows access to sensitive information such as private keys of certificates and login credentials, or other personal data. Advice for Consumers 1. Be aware that your sensitive data such as passwords may have been seen by a third party if the sites you visit used a vulnerable version of the OpenSSL library. 2. Monitor any notices from the vendors or companies you use. Once a vendor has communicated to you to change your passwords, do so promptly. 3. Watch out for potential phishing emails from attackers asking you to update your password. To avoid going to an impersonated website, stick with the official site domain. 4. Stick to reputable websites and services. They are most likely to have immediately addressed the vulnerability. 5. Monitor your bank and credit card statements to check for any unusual transactions

https://www.youtube.com/watch?v=wguZ4XY8xy0&feature=youtu.be

current insight

Data breaches happen frequently. Change passwords regularly to minimize your exposure to this risk.


Frequently Asked Questions

WHAT IS THE NORTON CYBERCRIME INDEX?

The Norton Cybercrime Index is a free tool, available to everyone, which measures and warns people about cybercrime risks around the world, and how it can affect them. The Norton Cybercrime Index's number changes daily to reflect real cybercrime risk and the relative threat that this poses to people. The Norton Cybercrime Index's Daily Cybercrime News alert indicates the day's top cybercrime threat, and tells people what they can do to avoid it.

WHY HAS NORTON CREATED THE CYBERCRIME INDEX?

We created the Norton Cybercrime Index to show people that cybercrime is real, it can happen to anybody, and that there is something you can do to protect yourself. In fact, 65% of adults worldwide have already been victims of cybercrime. As an industry leader in Internet Security, it is our duty to raise awareness of the issue and provide advice and tools to keep people safe. Cybercrime is avoidable, and the Norton Cybercrime index will provide advice on how to help Internet users safely navigate the Web.

HOW DOES THE NORTON CYBERCRIME INDEX FUNCTION?

The Norton Cybercrime Index functions much like the Dow Jones crossed with an online traffic report - providing people with an unprecedented, holistic look at the current state of online threats. It calculates attacks both quantitatively and qualitatively, and provides an easy-to-understand and visually compelling representation of the cybercrime risk-level people face, helping them to know on a daily basis if more diligence and safety measures are required when going online on any given day. Moreover, it provides on-going Daily Cybercrime News alerts and permanent tracking to show trends and changes over time.

WHERE CAN I EXPERIENCE THE NORTON CYBERCRIME INDEX?

It will also be available through Norton 360 version 5, via a link within the product.

WHERE DOES THE NORTON CYBERCRIME INDEX DATA COME FROM?

The data used to populate the Norton Cybercrime Index comes from three primary sources:

Symantec's Global Intelligence Network, ID Analytics and DataLossDB.

The majority of the Norton Cybercrime Index's data comes from the Symantec Global Intelligence Network, one of the Industry';s most comprehensive sources of intelligence about online threats. The Symantec Global Intelligence Network:

  • Monitors 133 Million servers around the world, providing malware detection
  • Has 240,000 sensors in more than 200 countries, providing details of cyber activity
  • Incorporates 80,000 technologies, providing vulnerability detection
  • Monitors eight billion email messages a day, providing spam and phising exposure

In addition, Norton has partnered with ID analytics and DataLossDB, allowing for an even greater, holistic look at cybercrime.

ID analytics provides US data regarding personal identity fraud. Some of the largest U.S. companies and critical government agencies rely on ID Analytics to make risk-based decisions that protect people. http://www.idanalytics.com

DataLossDB is a research project from the Open Security Foundation and their volunteers, aimed at documenting known and reported data loss incidents worldwide. http://www.datalossdb.org

HOW IS THE NORTON CYBERCRIME INDEX NUMBER CALCULATED?

The Norton Cyb

ercrime Index number is calculated using a statistical model and algorithm, which assigns values to the number of online threats observed each day. Threats include malware, fraud, identity theft, spam, phishing, and social engineering trickery. Once threats are quantified and processed through and algorithm, the Norton Cybercrime index number is generated. The algorithm has been endorsed by the University of Texas San Antonio as a valid measurement reflecting the risk of cybercrime.

WHAT TYPES OF CYBERCRIME DOES THE NORTON CYBERCRIME INDEX MEASURE?

The Norton Cybercrime Index measures the levels of various threats including malicious software (or "malware"), fraud, identity theft, spam, phishing, and social engineering trickery.

DOES THE NORTON CYBERCRIME INDEX REPRESENT CYBERCRIME WORLDWIDE?

Yes. The Norton Cybercrime Index represents cybercrime happening around the world. Data within the Norton Cybercrime Index is worldwide except for one source, ID Analytics (identity theft) which is exclusively collected from North America.

IS THERE A THIRD PARTY THAT SUPPORTS THE VALIDITY OF THE NORTON CYBERCRIME INDEX?

Yes. The Institute for Cyber Security at The University of Texas has endorsed the Norton Cybercrime Index algorithm as a valid measurement tool reflecting the risk of cybercrime.

DO I NEED TO BUY NORTON PRODUCTS TO VIEW THE NORTON CYBERCRIME INDEX?

No, everyone can view the Norton Cybercrime Index for free, regardless of whether or not you are a Norton customer. The mission of the Norton Cybercrime Index is to educate people about the problem of cybercrime and empower them to keep safe online by providing the right tools to solve the problem. Norton offers both educational information about safe online behavior and security software solutions. We hope people will make the Norton Cybercrime Index one of their daily rituals.

HOW FREQUENTLY DOES THE NORTON CYBERCRIME INDEX PROVIDE UPDATES?

The Norton Cybercrime Index updates once a day in the morning (Pacific Time). In case of a large-scale cybercrime attack, the Norton Cybercrime Index will be updated to reflect what's happening, even if it is outside of the normal update schedule.

WHICH LANGUAGES WILL THE NORTON CYBERCRIME INDEX BE AVAILABLE IN?

At the time the Norton Cybercrime Index is available only in English.

WHAT SHOULD PEOPLE DO IF THEY FALL VICTIM TO CYBERCRIME?

If people fall victim to cybercrime, the first thing they need to do is report the crime to law enforcement, credit agencies, financial institutions, and any of their friends who might be exposed to the risk.

The should also immediately secure their data and accounts by changing all their passwords to new, unique and complex ones and regularly review their bank accounts, credit reports, and credit card activity for any charges or activity.

HOW CAN I STAY SAFE FROM CYBERCRIME?

The first step to online safety is a comprehensive Internet security solution, such as Norton 360 or Norton Internet security. This will keep you safe from cybercrime by protecting your computer and your private information. In addition, safe online behavior is another key factor to staying sage. Receive a free scan of your computer at the Norton 'Protect Yourself' webpage.

http://www.Norton.com/protectyourself

Questions or comments can be provided on Norton Forums

http://community.norton.com/t5/Other-Norton-Products-bd-p/other

Norton by Symantec

Norton is here to help inform people about how to protect themselves online and minimize the financial and emotional impact of cybercrime.

terms & conditions

Use of the Norton Cybercrime Index is subject to acceptance of the Norton License Agreement. (You must scroll all the way down and click I agree)

NORTON LICENSE AGREEMENT

Norton Cybercrime Index


IMPORTANT:PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT ("LICENSE AGREEMENT") CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW). SYMANTEC CORPORATION, IF YOU ARE LOCATED IN THE AMERICAS; OR SYMANTEC ASIA PACIFIC PTE LTD, IF YOU ARE LOCATED IN THE ASIA PACIFIC RIM OR JAPAN; OR SYMANTEC LIMITED, IF YOU ARE LOCATED IN EUROPE, THE MIDDLE EAST OR AFRICA ("SYMANTEC") IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED BELOW AS "YOU" OR "YOUR") ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND SYMANTEC. BY DOWNLOADING THE SOFTWARE, CLICKING THE "I AGREE" OR "YES" BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK THE "CANCEL" OR "NO" OR "CLOSE WINDOW" BUTTON OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHER USE OF THE SOFTWARE.

1. DEFINITION.

"Content Updates" means content used by certain Symantec software which is updated from time to time, including but not limited to: updated anti-spyware definitions for anti-spyware software; updated antispam rules for antispam software; updated virus definitions for antivirus software; updated URL lists for content filtering and antiphishing software; updated firewall rules for firewall software; updated intrusion detection data for intrusion detection software; updated lists of authenticated web pages for website authentication software; updated policy compliance rules for policy compliance software; updated vulnerability signatures for vulnerability assessment software, and updated information on cybercrime, malware, spam, and other forms of threats for security status reporting software.

"Information" means information on cybercrime, malware, spam, and other forms of threats reported by the Licensed Software. "Documentation" means the user documentation Symantec provides with the Licensed Software, if any. "Licensed Software" means the Norton Cybercrime Index software, in object code form, accompanying this License Agreement, including any Information, Documentation and/or Content Updates included in, reported by, or provided for use with, such software or that accompanies this License Agreement.

2. LICENSE GRANT.

The Licensed Software is the property of Symantec or its licensors, and is protected by copyright law. Although Symantec continues to own the Licensed Software, You will have certain rights to use the Licensed Software after Your acceptance of this License Agreement. This License Agreement governs any releases, revisions, or enhancements to the Licensed Software that Symantec may furnish to You. Subject to Symantec's right to terminate pursuant to this Section 2 or for Your breach pursuant to Section 11, Symantec grants to You a non-exclusive, non-transferable license to use the Licensed Software solely for Your personal purposes. Symantec may, at any time and at its sole discretion with or without notice to You, discontinue providing Content Updates, discontinue providing Information, discontinue providing the Licensed Software, and/or may terminate this License Agreement. Symantec may add, modify or remove features of the Licensed Software at any time with or without notice to You.

3. LICENSE RESTRICTIONS.

You may not, without Symantec's prior written consent, conduct, cause or permit the: (i) use, copying, modification, rental, lease, sublease, sublicense, or transfer of the Licensed Software except as expressly provided in this License Agreement; (ii) creation of any derivative works based on the Licensed Software; (iii) reverse engineering, disassembly, or decompiling of the Licensed Software (except that You may decompile the Licensed Software for the purposes of interoperability only to the extent permitted by and subject to strict compliance under applicable law); (iv) use of the Licensed Software in connection with service bureau, facility management, timeshare, service provider or like activity whereby You operate or use the Licensed Software for the benefit of a third party; nor (v) use of the Licensed Software by any party other than You.

4. OWNERSHIP/TITLE.

The Licensed Software is the proprietary property of Symantec or its licensors and is protected by copyright law. Symantec and its licensors retain any and all rights, title and interest in and to the Licensed Software, including in all copies, improvements, enhancements, modifications and derivative works of the Licensed Software. Your rights to use the Licensed Software shall be limited to those expressly granted in this License Agreement. All rights not expressly granted to You are retained by Symantec and/or its licensors.

5. CONTENT UPDATES.

You are granted the right to use, as part of the Licensed Software, Content Updates as and when they are made generally available to Symantec's end users.

6. WARRANTY DISCLAIMERS.

AS THIS LICENSE AGREEMENT PROVIDES YOU AN OPPORTUNITY TO USE THE LICENSED SOFTWARE WITHOUT CHARGE, SYMANTEC DOES NOT WARRANT THE LICENSED SOFTWARE IN ANY WAY. YOU UNDERSTAND THAT THE LICENSED SOFTWARE (INCLUDING THE INFORMATION, DOCUMENTATION, AND CONTENT UPDATES) IS PROVIDED "AS-IS." SYMANTEC AND ITS SUPPLIERS EXPRESSLY DISCLAIM ALL CONDITIONS AND WARRANTIES, INCLUDING BUT NOT LIMITED TO ANY IMPLIED WARRANTY OF MERCHANTABILITY, SATISFACTORY QUALITY, ACCURACY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT, OR ANY OTHER WARRANTY, WHETHER EXPRESSED OR IMPLIED. SYMANTEC MAKES NO WARRANTIES OR REPRESENTATIONS THAT THE LICENSED SOFTWARE (INCLUDING THE INFORMATION, DOCUMENTATION, AND CONTENT UPDATES), WILL MEET YOUR REQUIREMENTS OR THAT OPERATION OR USE OF THE LICENSED SOFTWARE (INCLUDING THE INFORMATION, DOCUMENTATION, AND CONTENT UPDATES) WILL BE UNINTERRUPTED OR ERROR-FREE. YOU MAY HAVE OTHER WARRANTY RIGHTS, WHICH MAY VARY FROM STATE TO STATE AND COUNTRY TO COUNTRY.

7. LIMITATION OF LIABILITY.

SOME STATES AND COUNTRIES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL SYMANTEC OR ITS LICENSORS, RESELLERS, SUPPLIERS OR AGENTS BE LIABLE TO YOU FOR (i) ANY COSTS OF PROCUREMENT OF SUBSTITUTE OR REPLACEMENT GOODS AND SERVICES, LOSS OF PROFITS, LOSS OF USE, LOSS OF OR CORRUPTION TO DATA, BUSINESS INTERRUPTION, LOSS OF PRODUCTION, LOSS OF REVENUES, LOSS OF CONTRACTS, LOSS OF GOODWILL, OR ANTICIPATED SAVINGS OR WASTED MANAGEMENT AND STAFF TIME; OR (ii) ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES WHETHER ARISING DIRECTLY OR INDIRECTLY OUT OF THIS LICENSE AGREEMENT, EVEN IF SYMANTEC OR ITS LICENSORS, RESELLERS, SUPPLIERS OR AGENTS HAS BEEN ADVISED SUCH DAMAGES MIGHT OCCUR. IN NO CASE SHALL SYMANTEC'S LIABILITY EXCEED TEN U.S. DOLLARS (US $10.00). NOTHING IN THIS AGREEMENT SHALL OPERATE SO AS TO EXCLUDE OR LIMIT SYMANTEC'S LIABILITY TO YOU FOR DEATH OR PERSONAL INJURY ARISING OUT OF NEGLIGENCE OR FOR ANY OTHER LIABILITY WHICH CANNOT BE EXCLUDED OR LIMITED BY LAW. THE DISCLAIMERS AND LIMITATIONS SET FORTH ABOVE WILL APPLY REGARDLESS OF WHETHER OR NOT YOU ACCEPT THE LICENSED SOFTWARE OR CONTENT UPDATES.

8. MAINTENANCE/SUPPORT.

The Licensed Software is provided without maintenance/support of any kind.

9. U.S. GOVERNMENT RESTRICTED RIGHTS.

The Licensed Software is deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Licensed Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Licensed Software or Commercial Computer Licensed Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software by the U.S. Government shall be solely in accordance with the terms of this License Agreement.

10. EXPORT REGULATION.

You acknowledge that the Licensed Software and related technical data and services (collectively "Controlled Technology") are subject to the import and export laws of the United States, specifically the U.S. Export Administration Regulations (EAR), and the laws of any country where Controlled Technology is imported or re-exported. You agree to comply with all relevant laws and will not to export any Controlled Technology in contravention to U.S. law nor to any prohibited country, entity, or person for which an export license or other governmental approval is required. All Symantec software, including the Controlled Technology are prohibited for export or re-export to Cuba, North Korea, Iran, Syria and Sudan and to any country subject to relevant trade sanctions. You hereby agree that You will not export or sell any Controlled Technology for use in connection with chemical, biological, or nuclear weapons, or missiles, drones or space launch vehicles capable of delivering such weapons.

11. TERMINATION.

This License Agreement shall terminate upon Your breach of any term contained in this License Agreement. Upon termination, You shall immediately stop using and destroy all copies of the Licensed Software. You may terminate this License Agreement at any time by uninstalling and/or deleting the Licensed Software, including all permitted copies thereof (if applicable), and making no further use of the Licensed Software. Pursuant to Section 2 above, Symantec may, at any time and at its sole discretion with or without notice to You, discontinue providing Content Updates, discontinue providing Information, discontinue providing the Licensed Software, and/or may terminate this License Agreement.



12. SURVIVAL.

The following provisions of this License Agreement survive termination of this License Agreement: Definitions, License Restrictions and any other restrictions on use of intellectual property, Ownership/Title, Warranty Disclaimers, Limitation of Liability, U.S. Government Restricted Rights, Export Regulation, Survival, and General.

13. GENERAL.



13.1. ASSIGNMENT

You may not assign the rights granted hereunder or this License Agreement, in whole or in part and whether by operation of contract, law or otherwise, without Symantec's prior express written consent.

13.2. COMPLIANCE WITH APPLICABLE LAW.

You are solely responsible for Your compliance with, and You agree to comply with, all applicable laws, rules, and regulations in connection with Your use of the Licensed Software.

13.3. GOVERNING LAW; SEVERABILITY; WAIVER.

If You are located in North America or Latin America, this License Agreement will be governed by the laws of the State of California, United States of America. If you are located in China, this License Agreement will be governed by the laws of the Peoples Republic of China. Otherwise, this License Agreement will be governed by the laws of England. Such governing laws are exclusive of any provisions of the United Nations Convention on Contracts for Sale of Goods, including any amendments thereto, and without regard to principles of conflicts of law. If any provision of this License Agreement is found partly or wholly illegal or unenforceable, such provision shall be enforced to the maximum extent permissible, and remaining provisions of this License Agreement shall remain in full force and effect. A waiver of any breach or default under this License Agreement shall not constitute a waiver of any other subsequent breach or default.

13.4. THIRD PARTY PROGRAMS.

This Licensed Software may contain third party software programs ("Third Party Programs") that are available under open source or free software licenses. This License Agreement does not alter any rights or obligations You may have under those open source or free software licenses. Notwithstanding anything to the contrary contained in such licenses, the disclaimer of warranties and the limitation of liability provisions in this License Agreement shall apply to such Third Party Programs.

13.5. CUSTOMER SERVICE.

Should You have any questions concerning this License Agreement, or if You desire to contact Symantec for any reason, please write to: (i) Symantec Enterprise Customer Care, 555 International Way, Springfield, Oregon 97477, U.S.A., (ii) Symantec Enterprise Customer Care Center, PO BOX 5689, Dublin 15, Ireland, or (iii) Symantec Enterprise Customer Care, 1 Julius Ave, North Ryde, NSW 2113, Australia.

13.6. ENTIRE AGREEMENT.

This License Agreement is the complete and exclusive agreement between You and Symantec relating to the Licensed Software and supersedes any previous or contemporaneous oral or written communications, proposals, and representations with respect to its subject matter. This License Agreement prevails over any conflicting or additional terms of any purchase order, ordering document, acknowledgement or confirmation or other document issued by You, even if signed and returned. This License Agreement may only be modified by a written amendment between the parties that accompanies or follows this License Agreement.