Comments
Nigerian Cybercrime Matures, Morphs
Newest First  |  Oldest First  |  Threaded View
jmmyTor
50%
50%
jmmyTor,
User Rank: Strategist
3/21/2017 | 3:34:20 PM
Re: Nigerian Cybercrime Matures..
After reading your write up about the emergence of Nigerian Cybercrime. I keep wondering if you have not really miss some important key elements in your article. For full disclosure. I am a Nigerian American. Degree in law and MBA. I am also into Cyber Security, the issues above has a lot to do with more than 10 millions graduates from various university from the region. The unemployed youths are much more sophiscated more than what is being reported. They are left with no option than to look into the web to come up with an idea of defrauding the society that they find themselves. This is by no means of justification for them. But, just letting you know that without no jobs they will look for any means to survive. To them, the rationalisation is that they need to survive. I grew up in africa. I know first hand the struggle over there. with access to the internet, the world has become a global village whereby anyone can access any information at anytime at anywhere. The government of these countries need to provide for an enabling environments for these youths by creating jobs for them in order to deter them from illegal activities.


'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
8 Security Tips for a Hassle-Free Summer Vacation
Steve Zurier, Freelance Writer,  6/23/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11446
PUBLISHED: 2018-06-25
The buy function of a smart contract implementation for Gold Reward (GRX), an Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the buyer because of overflow of the multiplication of its argument amount and a manipulable variable buyPrice, aka the "tr...
CVE-2018-12062
PUBLISHED: 2018-06-25
The sell function of a smart contract implementation for SwftCoin (SWFTC), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manipulable variable sellPrice, aka t...
CVE-2018-12063
PUBLISHED: 2018-06-25
The sell function of a smart contract implementation for Internet Node Token (INT), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manipulable variable sellPri...
CVE-2018-12067
PUBLISHED: 2018-06-25
The sell function of a smart contract implementation for Substratum (SUB), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manipulable variable sellPrice, aka t...
CVE-2018-12068
PUBLISHED: 2018-06-25
The sell function of a smart contract implementation for Target Coin (TGT), a tradable Ethereum ERC20 token, allows a potential trap that could be used to cause financial damage to the seller, because of overflow of the multiplication of its argument amount and a manipulable variable sellPrice, aka ...