Latest Developments
- Páginas:
- 1
- 2
- Bulletproof hosting (BPH) services have long been crucial parts of the cybercriminal infrastructure. How do they protect malicious activities, and how do cybercriminals use them to stay in business?Understanding current and future threats to the internet of things (IoT) can help shape how we secure this technology that is increasingly becoming integral to today's world. What insights can be reaped from the cybercrime underground?Criminal sellers are peddling ready-to-use ATM malware in underground markets for hacking into banks. In this report, we discuss how criminals advertise and even provide instructions on how to pull off a digital heist.Over 689,000 medical records and 9.3 million health insurance records were recently found being sold in the deep web. What happens to the stolen data, and how much is personal information worth in the online black market?Tor developers are pushing the next iteration of the Tor network by creating a real-world distributed number generator to strengthen encryption.The global cybercrime underground mirrors the globe: it's made up of a patchwork of different countries and unique cultures. See how the cybercrime underground markets truly differ.There's currently a high demand for Netflix and Uber credentials in the Deep Web and underground markets—perhaps even more than stolen credit card details. It's likely caused by its low cost and potential for more profit.In Operation Onymous, 17 people were arrested and 414 different .onion domains were seized by various law enforcement agencies around the world. Soon after, new marketplaces using I2P and new currencies sprung up. Read more on Deep Web shutdowns.Why would something as ordinary as a new kind of top-level domain (TLD) name interest anybody today? Is the level of attention it may receive, especially from security industry observers, even warranted? In the case of .bit, we believe it is.
- Páginas:
- 1
- 2