• virus_android

Cyber Hackers on course for One Million Malware Apps

Google’s Android mobile operating system is so besieged by cyber hackers’ malicious apps that the malware count is on track to hit the million mark by 2014, a new report from cyber analysts Trend Micro warns.

In contrast, it took a decade for PC malware to hit that number versus just several years for mobile phone malware apps.

The rise in cyber attacks on Google’s Android mobile operating system comes as Android continues to dominate the smartphone market. Android now controls 79.3% of the global smartphone market, up from 69.1% a year ago, according to the latest data from IDC.

The majority of […]

By |August 7th, 2013|Cyber News|0 Comments
  • Cyber Security

Top destinations for Cyber Security Professionals

Semper Secure announced the results of its Cyber Security Census. Based on a survey of 500 cyber security professionals from 40 different industries across 43 states, the District of Columbia, and Puerto Rico, and underwritten by Northrop Grumman, NetApp, and MeriTalk’s Cyber Security Exchange, the census reveals what motivates today’s cyber security professionals as well as how to train and recruit the next generation.

According to the report, cyber security professionals earn on average $116,000 annually, but are driven by more than a paycheck – they want to work for an employer with a reputation for honor and integrity.

Today’s cyber security […]

By |August 7th, 2013|Computer Security|0 Comments
  • Edward Snowden

Cyberterrorists Likely to Retaliate if Snowden Is Caught

Hackers and government transparency groups are likely to commit cyber-terrorism attacks if the U.S. ever takes secret information leaker Edward Snowden into custody, retired Air Force Gen. Michael Hayden has warned.

“They may want to come after the U.S. government, but frankly, you know, the dot-mil stuff is about the hardest target in the United States,” the former director of both the CIA and NSA said at a meeting of the Bipartisan Policy Center in Washington, D.C, The Guardian reports.

“I’m just trying to illustrate that you’ve got a group of people out there who make demands, whose demands may not be […]

By |August 7th, 2013|Cyber News|0 Comments
  • cybercrime

The Cybercrime of Things

Once everything in your house contains a computer, everything in your house can be hacked.

Recent work by security researchers indicates that one of the problems with having a “smart” home is that some day, it might be smart enough to attack you. The essence of the forthcoming “internet of things” is that everything we own, from our refrigerators and egg cartons to our cars and thermostats, will some day be outfitted with internet-connected sensors and control systems, allowing all our possessions, and ultimately all of our civic infrastructure, to communicate with each other and be controlled remotely.

The potential security implications […]

By |August 7th, 2013|Cybercrime|0 Comments
  • advertise

Advertise on Cyber Criminals Most Wanted

Are you a Computer Forensic Specialist or does your company have Computer Forensics Specialists for hire , If so you should consider advertising with as we receive lots of searchs daily for these terms, we can provide cost effective advertising to help you help our visitors find the service they need.

Maybe its a Data Recovery Service or help finding a Stolen Computer or maybe your a Cyber Crime Investigator who can help catch Internet Criminals and Cyber Criminals or Cyber Crime Lawyers as well are in demand.

If your […]

By |August 6th, 2013|Cybercrime|0 Comments
  • toilet

Cyber Attack in the Bathroom: Japanese Toilet Can Be Hacked

As if the idea of your computer or smartphone being hacked wasn’t troubling enough, your own toilet could be the next target of a cyber attack – thanks to a Bluetooth vulnerability with the commode’s Android app.

Increasingly, electronics manufacturers are pushing “always-connected” devices that can be controlled by smartphones via companion applications. Smart TVs, washing machines, air conditioning units, and even light bulbs can be controlled remotely, as long as Wi-Fi or Bluetooth has them tethered to a smartphone. The added convenience comes with added risk, as any device with a live connection could potentially be exploited by a savvy […]

By |August 5th, 2013|Cyber News|0 Comments
  • Identity theft

The Internet Knows More Than You Think! Identity Theft Infographic

The Huffington Post and the makers of the new movie Paranoia which stars Harrison Ford and Gary Oldman put together this Identity Theft infographic to make people aware that they need to protect their data.

Google and Facebook know a lot about us and we are helping them learn more each day by just surfing online and updating Facebook profiles.


Heres the Trailer from the movie, looks like the Summer Blockbuster for sure!

By |August 4th, 2013|Cyber News|0 Comments
  • snowden

UK and US collaborating on cyber weapons, says Snowden

The US National Security Agency (NSA) and UK intelligence agency GCHQ are collaborating on cyber weapons, the latest documents released by whistleblower Edward Snowden reveal.

GCHQ blames China and Russia for most of cyber attacks against the UK and is working with the NSA to provide each country’s military forces with a cyber warfare capability, according to the Guardian.

This should come as no surprise following the publication of the latest annual report by the UK’s Intelligence and Security Committee (ISC) in July that references a more proactive approach.

According to the report, the ISC believes that military cyber “could involve disrupting an […]

By |August 2nd, 2013|Cyber News|0 Comments
  • FBI_Federal_Bureau_of_Investigation

FBI Expands Cyber Spying Tools Using Hacker Tactics

The PRISM scandal and Snowden’s revelations about the NSA snooping around in private matters were a little upsetting for the gullible public. But it was just the tip of the iceberg! Big government has tentacles that penetrate deep into the structure of the laity. The cyber spying efforts of the government have gone way overboard.

Recent reports from the Def Con Hacking Conference held in Las Vegas showed that the FBI is light years ahead of both the NSA and PRISM. The bureaucrats sitting in the FBI’s command centers may routinely turn on a microphone in their computers and eavesdrop on […]

By |August 2nd, 2013|Cyber News|0 Comments
  • Robber and the thief in a mask hijacks the car

Cars now a genuine target for cyber criminals

Cars are now a genuine target for cyber criminals and it is possible for attackers to gain control of a vehicle while it is in motion, with risky consequences. For instance, as Alex Fidgen, director at IT security company MWR InfoSecurity, explains, this could have serious consequences if the brakes were applied at high speed.

This comment was made after Volkswagen allegedly sued the University of Birmingham to stop it from publishing how it had hacked anti-theft systems on luxury cars including Lamborghinis and Porsches.

“Vendors should not try to block security research, they should work together with the researchers to understand […]

By |August 1st, 2013|Cybercrime|0 Comments