Paris terrorists used burner phones and US lawmakers have proposed a bill that would force retailers to record the identity of the buyers of these devices. Law enforcement and intelligence agencies worldwide are fighting against terrorist organizations operating in their territories, but investigations are hampered by the use of encrypted communications. After the Paris attacks, intelligence agencies […]
A criminal named Hacker Buba after asking UAE bank for $3 million ransom started leaking customer data online. Last week a hacker, who named itself as ‘Hacker Buba,’ breached a United Arab Emirates Bank, then he start tweeting customersâ information announcing the disclosure of tens of thousands of customer files online if a $3 million […]
Contract killers on darkweb have come up with updated âservice-catalogueâ with updated prices. Which are major changes and trends for prices? Contract killers on darkweb have come up with updated âservice-catalogueâ with updated prices. While comparing the recent screenshot of their âservice-catalogueâ captured from a Câthulhu Darksite with the published earlier, the following updates have […]
Central Shop is a web portal dedicated to the sale of stolen credit card data that captures the attention of the experts due to its amazing interface. The sale of stolen credit card data is one of the most prolific activities in the criminal ecosystem, in many black markets it is quite easy to acquire the precious commodities. Today […]
This post is an excerpt from the article titled “Evolution of 3D Printing Technology Raises Security Concerns” available on the Infosec Institute. Also known as the term additive manufacturing (AM), 3D printing is a process for making a three-dimensional object of almost any shape starting from a 3D model or other electronic data source. Through […]
At least 50 US law enforcement agencies quietly deployed Range-R radars that let them effectively see inside homes seeing through walls. Edward Snowden has confirmed our suspicions about the massive surveillance programs of the US government, but the news that we are going to comment together is very disturbing. At least 50 U.S. law enforcement […]
The POODLE against SSL 3.0. A new attack on SSL is threatening the Internet again, it allows bad actors to decrypt traffic over secure channels. Another critical flaw affects one of the protocols most used to secure Internet traffic, Secure Sockets Layer (SSL) and attacker could exploit the attack dubbed POODLE (Padding Oracle On Downgraded Legacy Encryption) to run a […]
In this article I desire to discuss about the data provided in the 2011 IC3 Internet Crime Report that provide evidence of the Internet Crime Complaint Center (IC3) against cybercrime in US and of the obtained results. On May 8, 2000 from a partnership between NW3C, BJA and the FBI was born The Internet Fraud Complaint […]
Every day we exchange personal information with colleagues, friends and unknown people with no idea how they are treated and for what use they will be managed. Telephone number, email address or driverâs license number are example of the data we provide ordinary using new media channels like internet and the social networks. The use […]