FutureFive New Zealand - Consumer technology news & reviews from the future

Cybercrime stories - Page 14

Any use of network connected electronic devices such as computers or smartphones for criminal activity is classified as cybercrime. With a long history starting with the misuse of telephone systems (such as ‘phreaking’), cybercrime today includes the creation and distribution of viruses, ransomware, keyloggers and other malware, the download and use of malware produced by others, social engineering tactics such as phishing or (physical) impersonation, the theft and use of credentials for accessing computer systems or networks, and the theft of privileged data. Cybercrime is a broad and dynamic field, with cybercriminals constantly adapting their methods in pursuit of usually financial goals, but also occasionally seeking to disrupt, embarrass or shame their targets.
Shadowy figure controlling computer screens digital ads cybercrime

VexTrio exposed as global ad-fraud empire with billions in play

Mon, 18th Aug 2025
#
martech
#
cybersecurity
#
online safety
VexTrio, unmasked as a multinational ad-fraud empire with nearly 100 companies, runs scams worth billions across adtech and beyond.
Secure digital vault encrypted data streams shattered locks keys protection

Certes launch quantum-safe technology to nullify stolen data

Fri, 15th Aug 2025
#
data protection
#
encryption
#
advanced persistent threat protection
Certes launches quantum-safe technology that renders stolen data useless, protecting organisations against evolving cyber threats amid rising quantum computing risks.
Digital illustration secure email envelope padlock new zealand map outline

Most NZ government bodies not ready for strict email security law

Fri, 15th Aug 2025
#
data protection
#
advanced persistent threat protection
#
email security
Three-quarters of New Zealand government bodies lack the highest email security standard required by upcoming October 2025 regulations, research finds.
Hooded figure dark room laptop digital network lines glowing padlock cyber threats

Most cyber attack brokers sell admin access from USD $500

Wed, 13th Aug 2025
#
firewalls
#
vpns
#
ransomware
Cyber attackers can buy admin-level access to corporate networks from USD $500, with 71% of dark web listings offering privileged credentials, new research shows.
Automated industrial control systems digital network lines with red cyber warnings

How emerging technologies in critical infrastructure are expanding cyber risks

Fri, 8th Aug 2025
#
uc
#
firewalls
#
ransomware
Emerging tech in critical infrastructure boosts automation but widens cyber risks, with attacks targeting unified platforms and unencrypted OT protocols.
Cricket stadium australia cybersecurity shields network illustration

Cricket-themed cybersecurity seminars tour five Australian cities

Thu, 7th Aug 2025
#
siem
#
advanced persistent threat protection
#
iam
ManageEngine's Shield NXG2025 cybersecurity seminars tour five Australian cricket stadiums this August, blending cricket themes with IAM and SIEM insights.
Detailed illustration suspicious unlicensed pharmacy fake medicine exchange counterfeit pills scam websites

Avast uncovers global fake pharmacy scam with 5,000+ domains

Thu, 7th Aug 2025
#
martech
#
cybersecurity
#
avast
Avast exposed a global scam with 5,000+ fake pharmacy websites selling counterfeit meds, risking health and money worldwide.
Worried australian new zealander laptop phishing warnings credit cards digital locks dollar symbols

Online scams trap one third of victims in Australia, New Zealand

Wed, 6th Aug 2025
#
vpns
#
mdm
#
data privacy
Research shows one third of online users in Australia and New Zealand fall victim to scams, often only realising after financial losses occur.
Dark silhouette computer binary code lock icons new zealand background

Over 150 million NZ records for sale as cyber threats grow

Wed, 6th Aug 2025
#
mfa
#
advanced persistent threat protection
#
breach prevention
Over 150 million New Zealand-linked records, including government and banking credentials, are exposed on the dark web, raising growing cyber threat concerns.
Digital data networks protected by shields cyber threats stopped cloud devices

Infoblox upgrades DNS defence to counter AI-driven cyberattacks

Tue, 5th Aug 2025
#
siem
#
cloud security
#
iot
Infoblox upgrades its Protective DNS solution to pre-empt AI-driven cyberattacks, blocking threats 68 days earlier and enhancing security for networks and cloud.
Hooded figure at computer surrounded by digital code abstract clouds and ai elements cyberattack theme

CrowdStrike report warns of GenAI driving surge in cyberattacks

Tue, 5th Aug 2025
#
malware
#
ransomware
#
mfa
CrowdStrike warns that generative AI is fuelling a surge in cyberattacks, targeting cloud systems, AI agents, and escalating sophisticated social engineering globally.
John headshot

Exclusive: Google's John Hultquist warns cyber attackers are getting younger & faster

Fri, 1st Aug 2025
#
malware
#
ransomware
#
cloud security
Google's Threat Intelligence Group uses AI and vast global data to outpace cybercriminals in an evolving digital arms race, says Chief Analyst John Hultquist.
Photorealistic shadowy figure computer digital lines houses residential proxies cybercrime

hCaptcha report finds most residential proxy use fuels cybercrime

Fri, 1st Aug 2025
#
malware
#
firewalls
#
network security
hCaptcha reveals up to 95% of traffic on residential proxy networks fuels cybercrime, exposing flaws in current online security measures.
Computer monitor warning symbol shadowy hands global cyber threats online security risks

Rising cyber threats fuel surge in malicious domain activity in Q2

Thu, 31st Jul 2025
#
malware
#
phishing
#
advanced persistent threat protection
DNSFilter's Q2 report reveals a surge in malicious domain activity, with island nation domains and new registrations increasingly exploited by cybercriminals.
Hooded figure computer puzzle pieces lock icons cyber threats dark shadows

LevelBlue warns cyber incidents jump as social engineering rises

Thu, 31st Jul 2025
#
firewalls
#
network security
#
mfa
LevelBlue reports cyber incidents tripled to 17% in early 2025, driven by a 1,450% rise in social engineering attacks like fake CAPTCHA schemes.
Shield protecting computer advanced cyber security digital threats defense

Netacea unveils Talos to combat rising intelligent web threats

Wed, 30th Jul 2025
#
application security
#
advanced persistent threat protection
#
ai
Netacea launches Talos, a cutting-edge detection engine using machine learning to tackle complex automated web threats across APIs, sites and apps.
Masked hacker at computer digital locks encrypted files stormy clouds asia pacific map

Quadruple extortion ransomware rises in Asia Pacific region

Wed, 30th Jul 2025
#
data protection
#
ransomware
#
advanced persistent threat protection
Quadruple extortion ransomware, including DDoS attacks and partner pressures, is rising in Asia Pacific, intensifying cybercrime risks across critical sectors.
Hooded figure at computer dark room cyber threat locks warnings

Ransomware threats rise, attackers adopt quadruple extortion

Tue, 29th Jul 2025
#
ransomware
#
encryption
#
advanced persistent threat protection
Ransomware attacks are escalating with quadruple extortion tactics that combine data encryption, DDoS, public harassment and regulatory threats in 2025.
Realistic scattered paper documents digital files overflowing from folders devices cybercrime threats

Lab 1 report reveals unstructured data heightens breach risks

Sat, 26th Jul 2025
#
data protection
#
ransomware
#
physical security
Lab 1's report on 141 million breached files shows unstructured data, like financial and HR documents, greatly increase risks of fraud and cybercrime.
Hooded figure computer dark room digital locks chains cyber threats ransomware

Global ransomware attacks drop 43% but threats evolve quickly

Sat, 26th Jul 2025
#
ransomware
#
advanced persistent threat protection
#
cybersecurity
Global ransomware attacks fell 43% in Q2 to 371 cases in June, but evolving tactics signal persistent threats amid rising cyber warfare and political motives.