This week I was invited to speak at the Fifth Congress on Cybercrime, an event promoted by the S?o Paulo State Federation of Commerce (FECOMERCIO). There were more than 1500 participants, including journalists, politicians, lawyers, security professionals, police and businessman, all of them discussing the effects of cybercrime in the country and how society is trying to tackle it.
Some very thorough research was unveiled during the Congress, which showed how Brazilians are affected by cybercrime, data leakage, privacy concerns and mobile usage. To see the complete research, download a summary here or the complete data here (Portuguese). According to this study, the most common cybercrimes reported by the respondents were:
1) Credit card cloning
2) Malicious use of personal data
3) Theft of money from Internet banking services
4) Making purchases on fake e-commerce sites
The Congress discussed the latest cybercrime legislation, the recently approved "Carolina Dieckmann law", and its effect on society. Lawyers and experts alike concluded that the law does not go far enough ? the sentences are too lenient to deter the criminals.
Two more projects are awaiting approval. Brazil?s Government is considering two high-priority pieces of legislation which may change the cybercrime situation in the country: one is a law on personal data protection which aims to regulate how companies manage the data of Brazilian citizens; a second is the "Internet Constitution", which would regulate the neutrality of the Internet and oblige IT companies to host their servers and user data locally.
I presented an overview of Brazilian malware and botnets, detailing recent attacks such as the DSL modem vulnerabilities, the latest techniques used by the crooks and the current trends among Brazilian Trojan bankers.
At the end of the event the audience had reached a consensus: any successful battle against cybercrime will require a joint effort from government, industries, commerce, and security companies.
Subscribe to:
Post Comments (Atom)
Popular Posts
-
The percentage of spam in email traffic in August was down 3.6 percentage points and averaged 67.6%.The level of phishing increased tenfold ...
-
Bogota, Colombia August 14, 2013 The Event was ?Day of technology and DNS Security? .? This was the 3rd edition of a very technical confer...
-
The third edition of the hackday Flipkart concluded last Friday, in their Office in Bangalore. We were told that almost all from their 400 e...
-
AppId is over the quota AppId is over the quota Last week, GReAT LatAm participated in the 3rd Latin American Security Analysts Summit, whic...
-
Although Google Glass will take years not on sale until 2014 and it up the futuristic technology penetrates the device market to invest enou...
-
? Jumcar ? is the name we have given to a family of malicious code developed in Latin America ? particularly in Peru ? and which, according ...
-
Android OS offers an interesting service known as Google Cloud Messaging, or GCM. This service allows small (up to 4 KB) messages to be sent...
-
There is nothing striking Robin, but that is only until you hear. I met Robin 9 months back to Garcia Yatra . Robin fights to give a better ...
-
CVE-2012-0158 is a buffer overflow vulnerability in the ListView / TreeView ActiveX controls in the MSCOMCTL.OCX library. The malicious code...
-
“On Sept. 1, Margaret Mary Vojtko , an adjunct professor who had taught French at Duquesne University for 25 years, passed away at the age ...
No comments:
Post a Comment