Fake SpaceX Youtube Channels Defraud 150,000 in Bitcoin
Journalists at Bleeping Computer warned that the scammers recently seized three YouTube channels, gave them new names associated with SpaceX, and then launched fake “broadcasts” with Elon Mask, during which they...
Largest Ad fraud targeting smart TVs
White Ops specialists found , they said, the world's largest fraudulent advertising operation using smart TVs.
During the operation, called ICEBUCKET, using software bots, cybercriminals make advertisers think that real people are...
Google Analytics Used By Cybercriminals to Steal Credit Card Data
Attackers inject malicious code that collects payment data onto a hacked site.
Cybercriminals use Google Analytics to steal credit card information from compromised e-commerce sites. According to experts from Kaspersky Lab,...
IoT Security, Attacks And The Industrial Systems at Risk
Hackers could target smart manufacturing and other industrial environments with new and unconventional cyber attacks designed to exploit vulnerabilities in ecosystems which are supporting the Industrial Internet of Things (IIoT) according...
New P2P Botnet Targeting IoT Devices
By: Ravie Lakshmanan
Cybersecurity researchers have taken the wraps off a new botnet hijacking Internet-connected smart devices in the wild to perform nefarious tasks, mostly DDoS attacks, and illicit cryptocurrency...
MobiFriends Dating App Breached – 3.5 Million Credentials Leaked
The messages, hashed passwords and usernames of 3.5 million clients of the dating application MobiFriends were posted and available to be purchased on an underground discussion.
The accreditations of 3.5...
Vulnerabilities in old GTP protocol could affect 4G and 5G networks
Experts cautioned that problems in the GPRS Tunneling Protocol (GTP) could affect the operation of 4G and 5G networks. In reports published last week and in December 2019, Positive Technologies and A10 Networks described...
WhatsApp can be forced to decrypt WhatsApp Google Drive backups by state surveillance
The AES-GCM-256 key is stored and generated by WhatsApp server and is sent to the client. When a user signs in to new device, it retrieves the key from the server...
Alleged $366M Bitcoin mixer busted after analysis of 10 years of blockchain data
U.S. authorities have arrested the alleged mastermind behind a multi-million darknet-based BTC mixing service, Bitcoin Fog, after analyzing 10 years of blockchain data.Authorities have issued a chilling warning to...
Digital intelligence must overcome challenges to solving crypto crimes
While the value of cryptocurrencies has varied wildly in the last year, this has not diminished crypto’s attractiveness to criminals. Many of them are moving their illegal activities underground...