Feeds

Brazil 'tops cybercrime league'

Cybergeddon or cyberFUD?

  • alert
  • submit to reddit

Seven Steps to Software Security

Brazil is the world capital of cybercrime, at least according to the Brazilian Federal Police. Eight in ten computer hackers are Brazilian while two in three paedophile pages are hosted in the South American country, the BBC reports. Local police say that losses from online financial fraud exceed that lost through bank robberies.

The figures - released in Brasilia, at an international conference on combating electronic crime - should be treated with caution. UK computer security experts say the figures do not gel with their experience, nor do they match our own observations of the computer underground.

The claim that 80 per cent of world's computer underworld is living it large with the sons and daughters of Samba will no doubt surprise US ID thieves, Russian DDoS gangs and German virus writers. Aside from some examples of Brazillian defacement gangs there have been few reports of cybercrime activity in the country.

Neil Barrett, technical director of security consultancy IRM, and a veteran expert witness in numerous computer crime cases, said that Eastern Europe and Indonesia are more often the source of hacking attacks than Brazil. The Indian sub-continent is the fastest growing area in the world for cybercrime, he added.

The United States - rather than Latin America as a whole, never mind just Brazil - is more commonly the locus of net paedophilia operations, according to Barrett. A global league on cybercrime incidents doesn't exist, as far as we're aware, so where do the Brazilian Feds get their figures from? They blame the country's weak computer security laws for turning the country into a playground for crackers, conmen and perverts; but we're not so sure.

This looks more like talking up a problem in the hopes of getting more government funding, than an SOS from a country on the brink of cyber-apocalypse. ®

Related stories

World's largest ID theft felon faces 14 years' jail
150+ cuffed in US-led cybercrime crackdown
UK police issue 'vicious' Trojan alert
Six charged in $10m Ingram computer fraud
102 UK kids saved from paedos
US tops junk mail Dirty Dozen - again
Brazilian script kiddie arrested in Japan
Hacker groups declare war on US.gov
Argentine judges want law update after crackers walk free

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.