ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research

ANOM FBI Global Crime Sting, Colonial Pipeline Updates, Password Leak Research

Details about the “ANOM” global crime sting where the FBI created a fake encrypted mobile phone for criminals that promised secure communications, new details about how the Colonial Pipeline ransomware attack started, ...

Identifying the Person Behind Bitcoin Fog

The person behind the Bitcoin Fog was identified and arrested. Bitcoin Fog was an anonymization service: for a fee, it mixed a bunch of people’s bitcoins up so that it was hard ...

EncroChat Hacked by Police

French police hacked EncroChat secure phones, which are widely used by criminals: Encrochat's phones are essentially modified Android devices, with some models using the "BQ Aquaris X2," an Android handset released in ...

Criminals and the Normalization of Masks

I was wondering about this: Masks that have made criminals stand apart long before bandanna-wearing robbers knocked over stagecoaches in the Old West and ski-masked bandits held up banks now allow them ...

Clarifying the Computer Fraud and Abuse Act

| | courts, crime, Fraud, Hacking
A federal court has ruled that violating a website's terms of service is not "hacking" under the Computer Fraud and Abuse Act. The plaintiffs wanted to investigate possible racial discrimination in online ...
Villainy Of The Most Atrocious Sort

Villainy Of The Most Atrocious Sort

via Raphael Satter, Jack Stubbs and Christopher Bing, writing at Reuters comes this well-crafted reportage, detailing a new malicous attack on the World Health Organization and mounted by currently-surveilled foul-villains-of-the-cyber-kind. Most Assuredly ...
First Amendment

First Amendment Fight: Twitter Threat Ends in Conviction

First amendment rights in the United States only go so far. Shout “fire” in a crowded room for thrills or threaten to kill someone and you will find yourself on the wrong ...
Security Boulevard

Attacker Causes Epileptic Seizure over the Internet

This isn't a first, but I think it will be the first conviction: The GIF set off a highly unusual court battle that is expected to equip those in similar circumstances with ...

Scaring People into Supporting Backdoors

Back in 1998, Tim May warned us of the "Four Horsemen of the Infocalypse": "terrorists, pedophiles, drug dealers, and money launderers." I tended to cast it slightly differently. This is me from ...

Using Machine Learning to Detect IP Hijacking

This is interesting research: In a BGP hijack, a malicious actor convinces nearby networks that the best path to reach a specific IP address is through their network. That's unfortunately not very ...