The U.S. government’s online crime report states that, during the year 2018, the FBI Internet Crime Complaints Center (IC3) received about 352k...
Google, by using the location data in devices, helps identify suspects of crimes in many instances of criminal investigation. Google keeps tracking...
A hacker dedicated to blackmailing visitors of pornographic content websites has been arrested by the British authorities. According to the vulnerability testing...
There is no better time for committing Cybercrime on Facebook than right now. At least that’s the intent the platform is displaying with its...
Over the last few years, several gaming platform-based cyber attacks have come to light. Given the rise in microtransactions and in-game currency...
Ransomware attacks are by nature loud, they immediately inform the user of the device that their files are encrypted, and they need...
Reports of an ethical hacker from the International Institute of Cyber Security mention that Norsk Hydro, one of the world’s leading aluminum-producing...
As WordPress gained popularity over its CMS competitors like Joomla and Drupal, it grew to a level where plugin developers jumped into...
Some consider that the real goal behind the operators of this viral challenge is to collect sensitive details According to experts in...
The Australian authorities maintain that Ward operated a sophisticated drug distribution network on dark web Australian authorities have seized a house on...
All the services of the Bank of Valletta have been interrupted The Bank of Valletta, Malta, shut down all of its operations...
Organizations face a new inside threat Cybercriminals have rendered the darknet into their workplace. According to security monitoring and ethical hacking experts...
Power utilities are not safe against cybercriminals, this is the fact that has been proven by Eskom (Elektrisiteitsvoorsieningskommissie), a power utility in...
British police seized over 50 devices probably used to perform cyberattacks during several raids British authorities have carried out multiple raids against...
Business interruption once again becomes the top business risk in Singapore, according to a recent report. It is the eighth annual Allianz...
CISOs (Chief Information Security Officers) have a critical role to play, as regards the overall security of any enterprise today. And it’s...
Criminal gangs seek to recruit people with advanced computer skills According to network security specialists from the International Institute of Cyber Security,...
Malicious actors have shown particular attention to the drug development industry Information security and digital forensics specialists from the International Institute of...
The growth of Bitcoin and its derivative cryptocurrencies have expanded people’s point-of-view on what it really is, a new representation of real-world...
Apparently, the notorious cybercrime community named TA505 is very active again, this time they are heavily testing in the wild the effectiveness...
Forensic investigations became the “new normal”, as cybercriminals increased their activities at the expense of users and businesses alike. It is sad...