Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The US House of Representatives passed a crucial surveillance law that reinforced the ability of the country's spy agencies to intercept and make use of Americans' private communications. [Read More]
Trackmageddon - researchers discovered that over 100 online GPS services have vulnerabilities that expose location and other data associated with millions of tracking devices [Read More]
The deployment of 10,000 cyber warriors to fight online dissent in Vietnam adds a grim "new dimension" to controls on free speech in the Communist country, a rights group has said. [Read More]
The UK Intelligence and Security Committee published its 2016-2017 annual report, which provides insight into the UK perspective on global cyber threats. [Read More]
Canada, Japan, Australia and New Zealand also accuse North Korea of launching the WannaCry ransomware attack [Read More]
US officials unveiled criminal charges against three individuals in the Mirai botnet attacks which shut down parts of the internet in several countries starting in mid-2016. [Read More]
Greece's Supreme Court ordered that a Russian accused of laundering $4 billion using bitcoin digital currency be extradited to the United States, a court source said. [Read More]
Citizen Lab found evidence linking the spyware to a command server in Ethiopia showing that 43 electronic devices had been successfully infected. [Read More]
The SEC's Cyber Unit filed charges against and froze the assets of Dominic Lacroix, a Canadian with a history of securities law violations, and his company PlexCorps in an initial coin offering fraud. [Read More]
Nghia Hoang Pho, a 10-year veteran of the NSA's Tailored Access Operations unit, which broke into computer systems, agreed to plead guilty to a single charge of removing and retaining top-secret documents from the agency. [Read More]

FEATURES, INSIGHTS // Tracking & Law Enforcement

rss icon

Idan Aharoni's picture
There are many security companies, individual researchers and certain circles in academia that hold a wealth of information on cybercrime activities that could be the difference between a bust and a cybercrime investigation that leads to a dead end. It’s not just about collaboration with other law enforcement agencies, but also about collaboration with the security industry.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Idan Aharoni's picture
Cybercriminals are constantly going up against anti-fraud measures designed to stop their efforts and they need to bypass them in order to make a profit.
Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
Idan Aharoni's picture
When it comes to infrastructure, money mules are important - if not more important - than having a botnet or a phishing attack set up. After all, what use are online banking credentials if you can’t cash them out?
Mike Lennon's picture
“The Norton Cybercrime Report: The Human Impact,” showed that two-thirds (65 percent) of Internet users globally, and almost three-quarters (73 percent) of U.S. Web surfers have been a victim of cybercrime.
Tom Grubb's picture
Fighting web fraud is a game of cat and mouse between fraud analysts and cybercriminals where the odds are stacked against fraud analysts. Transaction data can provide a window into behaviors that can help identify cybercrime hot spots still in formation.
Markus Jakobsson's picture
We designed and performed an experiment that allows us to take the pulse on Nigerian scammers. Are the scammers really from Nigeria? What do they want, and how do they get it?