NIST is seeking more advanced tattoo forensic analysis, matching the tattoos into a computer system could help law enforcement to catch more offenders. One in five American adults has at least one tattoo and this number is much higher among the criminal population. Law enforcement has used tattoos as a means of criminals and victim […]
Security experts developed their PunkSPIDER, a Tor crawler, that already scanned more than 7000 domains and discovered numerous vulnerabilities. We have discussed several times about the Tor anonymizer network and the way it is exploited  by criminal crews to sell any kind of illegal product and service. Last week, an automated scanner dubbed PunkSPIDER was launched in the […]
Police worldwide are warning of a social media game dubbed game of 72 that is challenging teenagers to disappear for three long days. Any abuse of technology against children and youngster can have devastating effects social media them, their lives and their harmony of their families. Social media are among the paradigms that can be transformed […]
Criminals, activists, and whistleblowers have a new weapon dubbed USBKill in their arsenal to shut down laptops before they police start examining them. The best way to protect data from prying eyes is to destroy them, this is the thought of criminals when law enforcement is investigating on them. The best option for crooks it […]
British law enforcement is in difficulty facing the cybercrime, just one computer hacker a month convicted of cyber crime out of 100,000 incidents a year. Cybercrime is becoming very attractive for ordinary crime, high earnings, limited risks than other criminal activities and poor perception of crime are among the elements that are facilitating the rapid spread of […]
Obama Administration proposes giving courts more power to issue botnet injunctions, a measure necessary to fight the diffusion of malicious infrastructures. The US Government has proposed an amendment that would enable the Department of Justice to seek an injunction to prevent the diffusion of botnets. The Obama’s Administration would add activities like the operation of a […]
Law enforcement investigating on terrorism and speculate that terrorists including ISIS members already use Bitcoin and other virtual currencies. The ISIS continues to threaten the world, the group is growing in popularity and its operations are increasingly bloody. ISIS has an efficient organizational capability, its strategy of terror is allowing to broaden its reach, and news of the last […]
CYBERPOL Organization urges a joint effort between private firms and law enforcement to remove illegal and harmful content from the Internet. CYBERPOL, the International Cyber Security Organization ICSO, said that illegal and harmful content capable of affecting the physical, emotional and psychological well-being of all Internet users are increasing at alarming and disturbing rates. It […]
The European Union Agency for Network and Information Security has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” The European Union Agency for Network and Information Security (ENISA) has published the annual report on the cyber threat landscape “ENISA Threat Landscape 2014.” This ENISA Threat Landscape 2014 report (ETL 2014) was prepared […]
At least 50 US law enforcement agencies quietly deployed Range-R radars that let them effectively see inside homes seeing through walls. Edward Snowden has confirmed our suspicions about the massive surveillance programs of the US government, but the news that we are going to comment together is very disturbing. At least 50 U.S. law enforcement […]