Apple and Microsoft are both taking steps to better explain how they handle customers' personal information

Apple hasn't changed its privacy policy in over a year -- but on Tuesday morning the company updated its website with a fresh explanation of what that policy means, product by product, service by service.

The update comes just a day after Microsoft chose to reexplain its privacy policy and how it relates to Windows 10.

A Latvian cybercriminal who helped in the creation of malware that infected over one million machines globally and resulted in tens of millions of dollars in losses, has pleaded guilty to conspiring to commit computer intrusion.

Six individuals have been arrested by British law enforcement as part of an operation targeting those who have used the Lizard Squad's LizardStresser distributed denial-of-service (DDoS) tool.

According to the U.K. National Crime Agency (NCA), six males aged between 15 and 18 are suspected of using LizardStresser to launch attacks on a national newspaper, a school, gaming companies, and several online retailers. The teens are said to have used Bitcoin and other alternative payment methods to rent the service without exposing their true identity.

The six suspects targeted in the law enforcement initiative dubbed "Operation Vivarium" are based in Manchester, Stockport, Northampton, Milton Keynes, and Huddersfield. Investigators seized computer equipment from one of the alleged LizardStresser users. The suspects have been released on bail.

The NCA noted that two other suspects from Cardiff and Northolt were arrested earlier this year. The agency says officers are visiting roughly 50 addresses linked to individuals believed to have registered on the LizardStresser website, but without actually carrying out any attacks.

"By paying a comparatively small fee, tools like Lizard Stresser can cripple businesses financially and deprive people of access to important information and public services," said Tony Adams, Head of Investigations at the NCA's National Cyber Crime Unit. "This multi-agency operation illustrates the commitment of the NCA and its partners to pursuing people who think they can criminally disrupt important public services or legitimate businesses."

"One of our key priorities is to engage with those on the fringes of cyber criminality, to help them understand the consequences of cyber crime and how they can channel their abilities into productive and lucrative legitimate careers," Adams added.

The notorious Lizard Squad collective started advertising LizardStresser in late 2014, when the service was used to disrupt Microsoft's Xbox Live and Sony's PlayStation Network.

It's not surprising that people who used the service -- and even those who simply registered on the LizardStresser website -- are targeted by police. The service was hacked in January and the details of more than 14,000 users were leaked.

Last month, a 17-year-old Finnish teenager named Julius Kivimäki, suspected of being a member of the Lizard Squad, got a two-year suspended prison sentence. However, Kivimaki was convicted for computer crimes carried out in 2012 and 2013, not activities involving Lizard Squad.

LizardStresser currently appears to be offline, and all tweets except one have been deleted from the Lizard Squad's main Twitter account.

Yesterday the FBI warned the world that Business Email Scams (BEC) victims are growing, making companies losing money. The law enforcement highlights that frauds use to start with crooks spoofing communications from high management and executives and deceive them to authorize international wire transfers. The numbers provided by the FBI are alarming, from October 2013 to August 2015, $750 million were lost by companies due to Business Email Scams, nearly 7,000 companies just in the USA felt victim of the scams. Back in January of this year, the FBI had released some statistics about Business Email Scams, the law enforcement reported that between Oct. 1, 2013 and Dec. 1, 2014, 1198 companies had lost $179 million with the “CEO fraud”, aka business e-mail compromise (BEC). This is worrying because from January until now the number increase around 270 percent, the overall losses jumped from $179 million in January up to the current $750 million. “The scam has been reported in all 50 states and in 79 countries,” “Fraudulent transfers have been reported going to 72 countries; however, the majority of the transfers are going to Asian banks located within China and Hong Kong.” States the alert issued by the FBI, How the Business Email Scams works Normally all starts with a phishing email specifically crafted to a company executive, or employees of the targeted company. The emails look like as a legitimate message sent from a look-alike domain, let’s say that an original company is called, the crook will send an email to the victim from Since it is a crafted email, the crooks pay attention to the details so this type of emails will not set off spam traps, because it’s a targeted email. Crooks compose the emails by using the information on the target company available on open sources on the Internet (i.e. social media, press releases, and news). The FBI highlights that the Business Email Scams is very effective and a profitable practice for cyber criminals. “On the surface, business email compromise scams may seem unsophisticated relative to moneymaking schemes that involve complex malicious software, such as Dyre and ZeuS. But in many ways, the BEC attack is more versatile and adept at sidestepping basic security strategies used by banks and their customers to minimize risks associated with account takeovers. In traditional phishing scams, the attackers interact with the victim’s bank directly, but in the BEC scam the crooks trick the victim into doing that for them.” wrote the popular investigator Brian Krebs on the Business Email Scams attacks. The following image shows differences between a normal malware-based attack (i.e. like Zeus) and the BEC scheme: Business Email Scams vs malware Using again the example of as the original company and as the fake company, the crook, will forge the sender’s email address displayed to the recipient, for the victim to see that the email was sent from, but when the victim replies, the reply is going to Some known victims Already in August a tech company called Ubiquiti Networks disclosed in their financial report that they lost $46.7 million because of Business Email Scams. In February, The Scoular Co lost $17.2 million, just because an employee received an e-mail with the order to transfer money to a bank in China The list of successfully Business Email Scams is very long. Advises to prevent Business Email Scams Implement two-step authentication to emails When possible call to the person who sent the email, to verify what is asking Inform employees not to publish/share job-related activities on social media and forums Educate your employee, have a security awareness program

We use cookies to maintain login sessions, analytics and to improve your experience on our website. By continuing to use our site, you accept our use of cookies, Terms of Use.