Feeds

Brazil 'tops cybercrime league'

Cybergeddon or cyberFUD?

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

Brazil is the world capital of cybercrime, at least according to the Brazilian Federal Police. Eight in ten computer hackers are Brazilian while two in three paedophile pages are hosted in the South American country, the BBC reports. Local police say that losses from online financial fraud exceed that lost through bank robberies.

The figures - released in Brasilia, at an international conference on combating electronic crime - should be treated with caution. UK computer security experts say the figures do not gel with their experience, nor do they match our own observations of the computer underground.

The claim that 80 per cent of world's computer underworld is living it large with the sons and daughters of Samba will no doubt surprise US ID thieves, Russian DDoS gangs and German virus writers. Aside from some examples of Brazillian defacement gangs there have been few reports of cybercrime activity in the country.

Neil Barrett, technical director of security consultancy IRM, and a veteran expert witness in numerous computer crime cases, said that Eastern Europe and Indonesia are more often the source of hacking attacks than Brazil. The Indian sub-continent is the fastest growing area in the world for cybercrime, he added.

The United States - rather than Latin America as a whole, never mind just Brazil - is more commonly the locus of net paedophilia operations, according to Barrett. A global league on cybercrime incidents doesn't exist, as far as we're aware, so where do the Brazilian Feds get their figures from? They blame the country's weak computer security laws for turning the country into a playground for crackers, conmen and perverts; but we're not so sure.

This looks more like talking up a problem in the hopes of getting more government funding, than an SOS from a country on the brink of cyber-apocalypse. ®

Related stories

World's largest ID theft felon faces 14 years' jail
150+ cuffed in US-led cybercrime crackdown
UK police issue 'vicious' Trojan alert
Six charged in $10m Ingram computer fraud
102 UK kids saved from paedos
US tops junk mail Dirty Dozen - again
Brazilian script kiddie arrested in Japan
Hacker groups declare war on US.gov
Argentine judges want law update after crackers walk free

The smart choice: opportunity from uncertainty

More from The Register

next story
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.