This week I was invited to speak at the Fifth Congress on Cybercrime, an event promoted by the S?o Paulo State Federation of Commerce (FECOMERCIO). There were more than 1500 participants, including journalists, politicians, lawyers, security professionals, police and businessman, all of them discussing the effects of cybercrime in the country and how society is trying to tackle it.
Some very thorough research was unveiled during the Congress, which showed how Brazilians are affected by cybercrime, data leakage, privacy concerns and mobile usage. To see the complete research, download a summary here or the complete data here (Portuguese). According to this study, the most common cybercrimes reported by the respondents were:
1) Credit card cloning
2) Malicious use of personal data
3) Theft of money from Internet banking services
4) Making purchases on fake e-commerce sites
The Congress discussed the latest cybercrime legislation, the recently approved "Carolina Dieckmann law", and its effect on society. Lawyers and experts alike concluded that the law does not go far enough ? the sentences are too lenient to deter the criminals.
Two more projects are awaiting approval. Brazil?s Government is considering two high-priority pieces of legislation which may change the cybercrime situation in the country: one is a law on personal data protection which aims to regulate how companies manage the data of Brazilian citizens; a second is the "Internet Constitution", which would regulate the neutrality of the Internet and oblige IT companies to host their servers and user data locally.
I presented an overview of Brazilian malware and botnets, detailing recent attacks such as the DSL modem vulnerabilities, the latest techniques used by the crooks and the current trends among Brazilian Trojan bankers.
At the end of the event the audience had reached a consensus: any successful battle against cybercrime will require a joint effort from government, industries, commerce, and security companies.
Subscribe to:
Post Comments (Atom)
Popular Posts
-
? Jumcar ? is the name we have given to a family of malicious code developed in Latin America ? particularly in Peru ? and which, according ...
-
A declassified NSA document reveals that the Agency spied on communications of Muhammad Ali, Art Buchwald and MLK. During the middle of the...
-
Here you can do to protect your wireless network router and a few things: 1. To change the default password on your router The first ti...
-
Customer value proposition and economic viability are the three words that are the most important for entrepreneurs, says Andrea Rossi, PhD,...
-
Today, Microsoft released a set of eight security Bulletins (MS13-059 through MS13-066) for a broad variety of vulnerable technologies and ...
-
NetTraveler, which we described in depth in a previous post, is an APT that infected hundreds of high profile victims in more than 40 count...
-
For 24 hours, Rs 4 lakh may seem a lot of money. But this was the prize money awarded to the winning team for the Bangalore Hackday, organiz...
-
CVE-2012-0158 is a buffer overflow vulnerability in the ListView / TreeView ActiveX controls in the MSCOMCTL.OCX library. The malicious code...
-
The third edition of the hackday Flipkart concluded last Friday, in their Office in Bangalore. We were told that almost all from their 400 e...
-
The report which follows was taken from a source of independent information, the original report is available @ National report . We at Hack...
No comments:
Post a Comment