
Busted! Top prosecutions of June
The first summer month brought us news about the eternal confrontation of law enforcements and cybercriminals. Let’s see who was busted in June.
136 articles
The first summer month brought us news about the eternal confrontation of law enforcements and cybercriminals. Let’s see who was busted in June.
June was a busy month with hacks and data breaches, privacy, cryptography, and mobile security news, and an update on OpenSSL Heartbleed.
On the trail of Cabir’s “jubilee”, a new story about Nokia’s Symbian surfaced, involving stolen code, blackmail, charity donation, and a bag with several million euros. One day it could become a script for a criminal drama, but for now it is a story about sensitive data mishandling.
Two months have passed since the Heartbleed disclosure. Now it is time for a round-up: What damage did it inflict and what can we expect?
There was a lot of interesting news about hackers and other cybercriminals, so let’s see who has been busted in May.
The criminals continue their bad business, and law enforcement agencies successfully chase them down. It happens every month, so here are the most interesting cases from April.
The criminals continue to do their bad business and law enforcement agencies successfully chase them down. That happens every month, so here are the most interesting cases from March. A
As always, we continue to closely monitor the progress of law enforcement agencies as they chase down cybercriminals. Here are some cases from the last month. 3 years for DDoS-attack
This article is in reaction to the news that a new worm targeted specific models of Linksys routers. The Moon worm ([1], [2]) is exploiting a flaw of those routers’
CMS WordPress is in the spotlight again. Researchers detected another aggressive kind of malware that spreads from compromised sites running that popular CMS. At the moment, more than 200 infected
The year has just begun, but law enforcement agencies around the world have already caught a number of major cybercriminals. As in the past, we continue to closely monitor the
Non-stop cat and mouse We all need a vacation or at least a weekend to catch our breath a little and get going again. Only the criminal world works non-stop.
Internet Explorer vulnerabilities In the second half of September Microsoft announced the discovery of a more serious vulnerability (CVE-2013-3893 ) and a zero day exploit for it. The vulnerability is
Banking trojans are like rats, you kick a trashcan and six of them go scurrying off in every direction. Most of them you’ll read about once and never again. But
September has come to an end and it’s time to check up on the progress that has been made by police forces and security experts in finding hackers and cybercriminals
Black Tuesday August the 13th brought numerous challenges to (primarily) corporate users of Microsoft products. The company released patches for critical vulnerabilities in Windows, Exchange Server and Active Directories. As
Apple Developer Center down for a week It took Apple about a week to restore the functions of the Apple Developer Center following its crash on July 18. After about
What exactly makes a cybercriminal? Well, without getting into the nitty-gritty of what does and does not constitute a virtual crime, how about we just answer the question: “What makes
There are no borders for cybercriminals. To be more precise, they strategically use borders to steal in one country, cash out in another and spend stolen money in a third
Every fifth attack, every third bank Every fifth phishing attack over the past year focused on banking and financial institutions. These results come out of a study published by Kaspersky
Summer is a great time for vacation for everyone but criminals, for whom it’s among the busiest times of year. That’s because travelers make for easy marks, and their high