criminals

  1. Tomcat

    How officials in Moldova helped dangerous criminals hide from Interpol

    What awaits those who dare to sabotage the Red Notice system? As a result of an investigation by international law enforcement agencies, a criminal organization operating in Moldova was uncovered and suspected of trying to sabotage the Interpol system that helps participating countries locate...
  2. Tomcat

    Criminals sell extortion benefits online

    Snapchat, Instagram, and TikTok must urgently take action to combat sexual extortion. Researchers have found that criminals openly sell online sexual extortion manuals on social media. This illegal practice is now called "sextortion". Tutorials and videos detail how to impersonate young girls...
  3. Father

    How to catch criminals in the Deep Web

    Cryptographic technologies of network anonymity and online payments allowed criminals to create a black market where they sell and buy drugs, stolen and counterfeit goods, and not only that. In response, the police and other law enforcement agencies are improving their technology, moving their...
  4. Father

    Saving Money for Espionage: NYPD will use Chinese drones against criminals

    Why do the police justify buying unsafe drones from China? The U.S. Congress has expressed concern over plans by the NYPD to use Chinese drones in five high-crime areas. The government's concerns were voiced by NYPD Deputy Operations Commissioner Kaz Daughtry at a House of Representatives...
  5. Father

    Geolocation by phone number: how criminals track subscribers and attack companies

    Finding out a person's location today is easy. Just look at his social networks. Usually, people themselves are willing to share such information in posts or stories. But sometimes even the most secretive Internet users are under threat – attackers determine their location by phone number. Why...
  6. Father

    Dangerous Connections: How criminals hack IT products via GitHub

    In this new article, read expert advice on protecting against cyber attacks through third-party code repositories. At the end of 2023, an article titled "One Attack on the Supply Chain to rule everyone" appeared on the Internet, which described a way to gain access to the GitHub repository...
  7. Father

    Google vs crypto fraud: Legal Action should Cool the ardor of Chinese criminals

    It took 87 malicious apps and 100,000 victims for the company to pay attention to the situation. Earlier last week, Google filed a lawsuit against two Chinese app developers, accusing them of creating fraudulent apps for investing in cryptocurrencies and publishing them on the Google Play...
  8. Tomcat

    Criminals Hack VPN Servers to Install Backdoors

    Supposedly Iranian government-sponsored cybercriminal groups exploit VPN server vulnerabilities in their malicious campaigns to create backdoors in companies around the world. According to a report by specialists from the Israeli company ClearSky, Iranian cybercriminals are attacking...
Top