Top Russian Cybercrimes Agent Arrested on Charges of Treason ...
A senior official in the Russian cyberintelligence department that American officials say oversaw last year's election hacking has been arrested in Moscow on charges of treason, a Russian newspaper re...
How To Not Get Hacked, According To Expert Hackers
Recently, Kevin Roose got hacked. The hack was so bad that several security experts have told him it’s the worst one they’ve ever seen. This is what he learned.
Russian Hackers of Dow Jones Said to Have Sought Trading Tips
A group of Russian hackers infiltrated the servers of Dow Jones & Co., owner of the Wall Street Journal and several other news publications, and stole information to trade on before it became public, ...
If You’re Not Paranoid, You’re Crazy- How to Protect Your Personal Data—and Humanity—From the Government
As government agencies and tech companies develop more and more intrusive means of watching and influencing people, how can we live free lives? I knew we’d bought walnuts at the store that week, and I...
Android flaw 'Certifi-gate' lets hackers listen in on conversations and steal data
The flaw could allow hackers to 'steal personal data, track device locations, turn on microphones to record conversations', the firm that discovered it says.
'Dancing Man' Fat-Shamed By Cyberbullies Gets Own Back At Hollywood Party
A man “fat-shamed” on social media after a video of him dancing was posted online has got his own back by partying with celebrities in Los Angeles. Sean O’Brien was ridiculed by trolls after the video...
Someone stole naked pictures of me. This is what I did about it – video
The issues of revenge porn and hacked photos are part of a larger problem with our relationship to consent, argues Emma Holten
Ransom is the new black – the increasing trend of online extortion
Brian Krebs reported on this a few months ago and it’s about as brazen as you’d expect online criminals to get; give us money or we’ll mess up your stuff. It’s the mob protection racket of the digital...
The scourge of Scamville: Romanian town is the cyber-crime capital of the world - where hundreds of fraudsters rake in millions from gullible online shoppers
The Dom liked to live large. Big cars, big bling rings, a Rolex Oyster watch on one arm, a Jimmy Choo-shoed girl leaning on the other. His suits were so sharp friends joked he shaved with them. He ear...
Cybercrime
Computer crime, or cybercrime, is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime is criminal exploita...
Digital forensics
Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to c...
Digital forensics - Wikipedia
Forensic data analysis
Forensic Data Analysis (FDA) is a branch of Digital forensics. It examines structured data with regard to incidents of financial crime. The aim is to discover and analyse patterns of fraudulent activi...
Forensic data analysis - Wikipedia
International cybercrime
There is no commonly agreed single definition of “cybercrime”. Broadly speaking, it refers to illegal internet-mediated activities that often take place in global electronic networks. Cybercrime is "i...
Doppelganger domain
A doppelganger domain is a domain spelled identical to a legitimate fully qualified domain name (FQDN) but missing the dot between host/subdomain and domain, to be used for malicious purposes.
Typ...
If You’re Not Paranoid, You’re Crazy- How to Protect Your Personal Data—and Humanity—From the Government
As government agencies and tech companies develop more and more intrusive means of watching and influencing people, how can we live free lives? I knew we’d bought walnuts at the store that week, and I...
Android flaw 'Certifi-gate' lets hackers listen in on conversations and steal data
The flaw could allow hackers to 'steal personal data, track device locations, turn on microphones to record conversations', the firm that discovered it says.
'Dancing Man' Fat-Shamed By Cyberbullies Gets Own Back At Hollywood Party
A man “fat-shamed” on social media after a video of him dancing was posted online has got his own back by partying with celebrities in Los Angeles. Sean O’Brien was ridiculed by trolls after the video...
Warzapping
Warzapping is the act of searching for remote disable features in electronics or computing devices, generally while in motion, using a portable computer or PDA.
Warzapping was named after the term...
Zero-day attack
A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a previously unknown vulnerability in a computer application or operating system, one that developers have not had tim...
Robert Tappan Morris
Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Inter...
Robert Tappan Morris - Wikipedia
Phishing
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electro...
Phishing - Wikipedia