FBI has published the lists of most wanted hackers, the rewards for their capture reach $4.2 million. They have stolen hundreds of millions of dollars. Cybercrime represents one of the most serious threat to Governments and private industries worldwide, law enforcement hunt down this emerging class of criminals who are able to influence the social […]
Law enforcement is investigating a series of mysterious attacks on the Fiber-optic cable lines in California. Who is behind these attacks? The FBI is investigating a series of mysterious physical attacks on internet cables in California. The investigators confirmed that at least eleven cases occurred in San Francisco’s Bay Area in the last year. The […]
A look to the “NIT Forensic and Reverse Engineering Report, Continued from January 2015”. NIT code was used by the FBI to deanonymize Tor users. On December 22nd, 2014 Mr. Joseph Gross retained the assistance of Dr. Ashley Podhradsky, Dr. Matt Miller, and Mr. Josh Stroschein to provide the testimony as the expert in the process […]
Between April 2014 and June 2015, the IC3 received 992 CryptoWall related complaints, with victims reporting losses totaling over $18 million. Cryptowall is one of the most nefarious ransomware in the wild, in twelve months the FBI has estimated that the overall losses were more than $18 million. Ransomware implements a classic extortion scheme typically demanding that victims pay ransom […]
A cyber attack against the ground computer systems of the Polish flagship carrier LOT grounded more than 1,400 passengers at Warsawâs Okecie airport. The Polish national airline, LOT, announced on Sunday that it has cancelled 10 flights due to a cyber attack against the airlineâs ground computer systems at Warsawâs Okecie airport. “Today afternoon LOT […]
NIST is seeking more advanced tattoo forensic analysis, matching the tattoos into a computer system could help law enforcement to catch more offenders. One in five American adults has at least one tattoo and this number is much higher among the criminal population. Law enforcement has used tattoos as a means of criminals and victim […]
Belgian law enforcement exploited end-to-end encryption gaps in WhatsApp to intercept messages exchanged between members of a Chechen jihadist group. According to a report published by Bloomberg, two men were arrested and warrants were issued for other three suspects that were allegedly preparing a terrorist attack in Belgium. The interesting part of the news is that law […]
The US Air Force bombed an ISIS HeadQuarter after tracking location through the analysis of the imaged posted on social media platforms. ISIS members make professional use of social media for propaganda and to recruit new sympathizers, but intelligence agencies are trying to exploit every little mistake to track down the terrorist cells. Air Force […]
The computer security researcher Chris Roberts reported the FBI that he obtained the control of at least one commercial flight causing it to âclimbâ. A new search warrant filed in a federal court in New York state published Friday by the Canadian website APTN revealed that the aviation computer security researcher Chris Roberts reported the FBI that […]
FBI and security researchers have uncovered fraudulent activity pertaining to relief efforts associated with the tragic Nepal earthquake. Cyber criminals have no scruples, they are always ready to exploit any tragedy to maximize their profits exploiting the interest of people in disastrous events. The last tragedy in order of time is the earthquake that hit […]