Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Moscow slammed a Greek court's ruling that a Russian national accused of helping criminals launder billions of dollars using Bitcoin should be extradited to the United States. [Read More]
A teenager admitted in a British court on to trying to hack into the computers of top US officials, including former CIA chief John Brennan, from his home in the East Midlands region of England. [Read More]
A Greek court ruled that Russian national Alexander Vinnik, accused of helping criminals launder billions of dollars using Bitcoin, should be extradited to the United States. [Read More]
Cyber espionage groups hacking each other, a practice dubbed by researchers “fourth-party collection,” creates attribution hell [Read More]
Federal judge allows the FBI to keep secret the details of a hacking tool used to access the iPhone of the San Bernardino terrorist [Read More]
The US Securities and Exchange Commission (SEC) announced that it is setting up a special unit dedicated to identifying cyber-related misconduct, along with a Retail Strategy Task Force. [Read More]
Department of Homeland Security finally notifies U.S. states whose voting systems were targeted by Russian hackers last year [Read More]
New campaigns using the FinFisher spyware are using a previously unseen infection vector, strongly suggesting that Internet service providers (ISPs) might be involved in the distribution process [Read More]
Moscow has requested the extradition of Alexander Vinnik, a Russian national also wanted in the United States for laundering billions of dollars through a Bitcoin exchange he operated. [Read More]
Justin Liverman, member of Crackas With Attitude hacker group, sentenced to 5 years in prison for hacking accounts of U.S. officials [Read More]

FEATURES, INSIGHTS // Tracking & Law Enforcement

rss icon

Idan Aharoni's picture
There are many security companies, individual researchers and certain circles in academia that hold a wealth of information on cybercrime activities that could be the difference between a bust and a cybercrime investigation that leads to a dead end. It’s not just about collaboration with other law enforcement agencies, but also about collaboration with the security industry.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Idan Aharoni's picture
Cybercriminals are constantly going up against anti-fraud measures designed to stop their efforts and they need to bypass them in order to make a profit.
Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
Idan Aharoni's picture
When it comes to infrastructure, money mules are important - if not more important - than having a botnet or a phishing attack set up. After all, what use are online banking credentials if you can’t cash them out?
Mike Lennon's picture
“The Norton Cybercrime Report: The Human Impact,” showed that two-thirds (65 percent) of Internet users globally, and almost three-quarters (73 percent) of U.S. Web surfers have been a victim of cybercrime.
Tom Grubb's picture
Fighting web fraud is a game of cat and mouse between fraud analysts and cybercriminals where the odds are stacked against fraud analysts. Transaction data can provide a window into behaviors that can help identify cybercrime hot spots still in formation.
Markus Jakobsson's picture
We designed and performed an experiment that allows us to take the pulse on Nigerian scammers. Are the scammers really from Nigeria? What do they want, and how do they get it?