Top Cybercriminal Prosecutions Of The Month: February 2014
As always, we continue to closely monitor the progress of law enforcement agencies as they chase down cybercriminals. Here are some cases from the last month. 3 years for DDoS-attack
129 articles
As always, we continue to closely monitor the progress of law enforcement agencies as they chase down cybercriminals. Here are some cases from the last month. 3 years for DDoS-attack
This article is in reaction to the news that a new worm targeted specific models of Linksys routers. The Moon worm ([1], [2]) is exploiting a flaw of those routers’
CMS WordPress is in the spotlight again. Researchers detected another aggressive kind of malware that spreads from compromised sites running that popular CMS. At the moment, more than 200 infected
The year has just begun, but law enforcement agencies around the world have already caught a number of major cybercriminals. As in the past, we continue to closely monitor the
Non-stop cat and mouse We all need a vacation or at least a weekend to catch our breath a little and get going again. Only the criminal world works non-stop.
Internet Explorer vulnerabilities In the second half of September Microsoft announced the discovery of a more serious vulnerability (CVE-2013-3893 ) and a zero day exploit for it. The vulnerability is
Banking trojans are like rats, you kick a trashcan and six of them go scurrying off in every direction. Most of them you’ll read about once and never again. But
September has come to an end and it’s time to check up on the progress that has been made by police forces and security experts in finding hackers and cybercriminals
Black Tuesday August the 13th brought numerous challenges to (primarily) corporate users of Microsoft products. The company released patches for critical vulnerabilities in Windows, Exchange Server and Active Directories. As
Apple Developer Center down for a week It took Apple about a week to restore the functions of the Apple Developer Center following its crash on July 18. After about
What exactly makes a cybercriminal? Well, without getting into the nitty-gritty of what does and does not constitute a virtual crime, how about we just answer the question: “What makes
There are no borders for cybercriminals. To be more precise, they strategically use borders to steal in one country, cash out in another and spend stolen money in a third
Every fifth attack, every third bank Every fifth phishing attack over the past year focused on banking and financial institutions. These results come out of a study published by Kaspersky
Summer is a great time for vacation for everyone but criminals, for whom it’s among the busiest times of year. That’s because travelers make for easy marks, and their high
We’re continuing to watch how law enforcement agencies around the world are progressing in the fight against cybercrime. They’ve been able to keep jailing hackers, both for minor cybercrimes like
We are continuously watching how law enforcement agencies around the world fight cybercrime. With help from the IT industry and experience gained over the years, these agencies have been able
Computers, initially created for military cipher breaking, give everyone an almost perfect way to keep our secrets totally private – through encryption. For a long time strong encryption was only
Botnet is the generic name given to any collection of compromised PCs controlled by an attacker remotely — think “virtual robot army.” The individual PCs that are part of a
This April saw an increase in the arrests of cybercriminals. Most cases were related directly to stealing money; interestingly, criminals prefer to steal smaller sums from hundreds of credit card
Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are
Whenever you read a news headline about the arrest or conviction of a cybercriminal, you can guarantee that the bulk of the investigative work was done by the work of