Once the malware infects the computer it generates a covert channel back to the cybercriminal.
FORBES: To Stop Cybercrime: Understand Crime Logic, And Adapt
Most people probably wouldn't want their computer to lead a double life as an agent in a seething, cybercriminal organization.
But limited as it may be, the malware continues a steady trickle of new cybercriminal exploits targeting Android.
It has never been easier to become a cybercriminal, Foreign Secretary William Hague has warned an international conference in Budapest.
Brian Krebs has detailed those U.K. charges, which point to a more direct control of the cybercriminal ring, at KrebsOnSecurity.
FORBES: Massive U.S. Cybercrime Bust Mostly Nabbed Exchange Students
Then, those in the cybercriminal industry come up with some other newer technology to get around the technology we just developed.
Now security researchers have found at least one specimen of cybercriminal software that responds with the next logical countermeasure: It hijacks the phone, too.
FORBES: BlackBerry, Nokia Malware Aims To Defeat Banks' Security Scheme
If two-factor authentication becomes ubiquitous and the cybercriminal industry continues to shift its attention to smartphones, this obscure angle of attack might just catch on.
FORBES: BlackBerry, Nokia Malware Aims To Defeat Banks' Security Scheme
We must be able to track and trace cybercriminal activity, locate and arrest these bad actors, and prosecute them if we ever hope to improve cybersecurity.
FORBES: URGENT: Businesses Must Act to Stop Congress on Cyber Legislation
Such unauthorized tracking or hacking tactics are clearly cybercriminal acts within the Convention and subject to investigation, with the full cooperation and assistance authorized by the Convention.
FORBES: Caution: Active Response to Cyber Attacks Has High Risk
Security researchers will be able to upload hacking techniques, name their price and sell work that until now has been profitable only through the cybercriminal black market.
The company posted screen shots that documented a PC hijacked by cybercriminal software successfully reading the CAPTCHA to set up one Gmail account after another for spamming purposes.
Increasingly common cybercriminal exploits, particularly those that occur on the Web, still don't have to be reported under any disclosure law even after a company discovers the attack on its site.
But few Android users would have guessed that for most of the last month, a single click on their PC could have infected their phone with whatever program a cybercriminal chose.
FORBES: Android Bug Would Have Allowed Phone Infections From A Computer Click
If countries want to be connected to the Internet and be part of the global society, they have an obligation to investigate cybercriminal events and cooperate in bringing hackers to justice.
Oracle just scored points with the security community for rushing out an early patch for a critical security flaw in Java that was already being widely exploited by the cybercriminal underground.
FORBES: Oracle Quietly Releases Fix For Serious Java Security Bug--Months After It Was Reported
Here is an example of crime logic at work: the cybercriminal identifies a target enterprise and uses the wealth of information on Facebook, LinkedIn and other social networks to map the organization.
FORBES: To Stop Cybercrime: Understand Crime Logic, And Adapt
In all, this would be a much better outcome than requiring businesses to spend money that they need for jobs and economic growth on fabricated cybersecurity requirements that will not stop the cybercriminal.
FORBES: URGENT: Businesses Must Act to Stop Congress on Cyber Legislation
Before its Thursday patch, an exploit that took advantage of the Java security flaws had been included in the widely used Blackhole cybercriminal software kit as well as the Metasploit penetration testing toolset.
FORBES: Oracle's Java Security Woes Mount As Researchers Spot A Bug In Its Critical Bug Fix
Fast flux, probably innovated by a Russian cybercriminal gang known as Rock Phish, automatically changes the physical computer hosting a site as quickly as every two minutes, says Laura Mather, the APWG's director of operations.
One of the suspects still at large, 20-year old Sofya Dikova, left her MySpace profile public, and it offers a glimpse into the life of a young woman who hardly seems to be a hardened cybercriminal.
应用推荐