Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

US lawmakers this week will vote on an amendment to the surveillance bill known as the USA FREEDOM Reauthorization Act that would limit law enforcement access to people’s search and browsing histories. [Read More]
In a letter to the U.S. House of Representatives, several Internet organizations are urging for an amendment to a surveillance bill to prohibit warrantless collection of search and browsing history. [Read More]
Britain will reduce Chinese tech giant Huawei's controversial involvement in its 5G network in the wake of the coronavirus outbreak. [Read More]
Industry professionals comment on the findings in Verizon’s 2020 Data Breach Investigation Report (DBIR). [Read More]
Even though business is already subject to considerable government surveillance in many different forms, nevertheless business is led by individuals with individuals' attitudes towards privacy. [Read More]
Privacy advocates warn that the danger of creating new government surveillance powers for the pandemic, including through contact tracing apps, could lead to much bigger problems in the future. [Read More]
Germany's foreign intelligence service violated the constitution by spying on internet data from foreigners abroad, the nation's top court ruled Tuesday in a victory for overseas journalists who brought the case. [Read More]
The DoJ announced that it managed to gain access to the iPhones of the man responsible for the 2019 attack at a naval base in Pensacola, and it took the opportunity to once again ask for encryption backdoors. [Read More]
French prosecutors said on Friday that police had broken up an international network aimed at the so-called "jackpotting" of ATMs that makes the machines eject all the cash they have inside. [Read More]
The Senate came one vote short Wednesday of approving a proposal to prevent federal law enforcement from obtaining internet browsing information or search history without seeking a warrant. [Read More]

FEATURES, INSIGHTS // Tracking & Law Enforcement

rss icon

Idan Aharoni's picture
Crowd sourcing investigations could harness the power of the web and its population to track down cybercriminals. But such a community effort of a cyber investigation comes with big challenges....
Idan Aharoni's picture
There are many security companies, individual researchers and certain circles in academia that hold a wealth of information on cybercrime activities that could be the difference between a bust and a cybercrime investigation that leads to a dead end. It’s not just about collaboration with other law enforcement agencies, but also about collaboration with the security industry.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Idan Aharoni's picture
Cybercriminals are constantly going up against anti-fraud measures designed to stop their efforts and they need to bypass them in order to make a profit.
Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
Idan Aharoni's picture
When it comes to infrastructure, money mules are important - if not more important - than having a botnet or a phishing attack set up. After all, what use are online banking credentials if you can’t cash them out?
Mike Lennon's picture
“The Norton Cybercrime Report: The Human Impact,” showed that two-thirds (65 percent) of Internet users globally, and almost three-quarters (73 percent) of U.S. Web surfers have been a victim of cybercrime.
Tom Grubb's picture
Fighting web fraud is a game of cat and mouse between fraud analysts and cybercriminals where the odds are stacked against fraud analysts. Transaction data can provide a window into behaviors that can help identify cybercrime hot spots still in formation.
Markus Jakobsson's picture
We designed and performed an experiment that allows us to take the pulse on Nigerian scammers. Are the scammers really from Nigeria? What do they want, and how do they get it?