menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Crime News

Cyber Crime News

source image

Medium

11h

read

341

img
dot

Image Credit: Medium

Private Investigation Firms and Cybersecurity: Protecting Your Digital Life

  • Private investigation firms are now focusing on cybersecurity solutions to protect their clients' digital lives.
  • They combine investigative techniques with advanced technical solutions to detect, prevent, and respond to cyber threats.
  • Private investigators take a holistic approach, blending physical and digital security components for comprehensive protection.
  • They ensure compliance with data protection laws and regulations and offer expertise in handling cyber threats.

Read Full Article

like

20 Likes

source image

Securityaffairs

16h

read

358

img
dot

Image Credit: Securityaffairs

U.S. President Donald Trump granted a “full and unconditional pardon” to Ross Ulbricht, Silk Road creator

  • U.S. President Donald Trump granted a “full and unconditional pardon” to Ross Ulbricht, the creator of the Silk Road, a dark web drug marketplace.
  • Ulbricht was convicted in 2015 for narcotics and money-laundering conspiracy and was serving a life sentence.
  • Trump's decision to pardon Ulbricht was based on claims of government overreach in the case.
  • Silk Road facilitated billions of dollars worth of transactions and generated millions in earnings for Ulbricht.

Read Full Article

like

21 Likes

source image

TechBullion

1d

read

175

img
dot

Image Credit: TechBullion

Cybercrime Unmasked: How It Became America’s Most Lucrative Criminal Enterprise

  • Cybercrime has become the most lucrative criminal enterprise in the United States, surpassing drug trafficking and human trafficking.
  • Cybercriminal groups are now targeting individuals instead of corporations, as it is easier and more profitable.
  • Data breaches have exposed sensitive information of millions of Americans, providing opportunities for further attacks.
  • Control+ is an advanced cybersecurity system that offers comprehensive protection for individuals, using AI and robotic processes.

Read Full Article

like

10 Likes

source image

Siliconangle

2d

read

322

img
dot

Image Credit: Siliconangle

HPE investigating potential breach after hacker claims to steal data

  • Hewlett Packard Enterprise (HPE) is investigating a potential breach after a hacker claimed to have stolen data from the company.
  • The hacker, known as IntelBroker, offered to sell stolen data, including personally identifiable information and source code related to HPE software products.
  • The affected products include Zerto, a data protection platform, and iLO, an administrative tool for HPE servers.
  • HPE has activated its cyber response protocols, disabled credentials, and launched an investigation, stating that there is no operational impact or evidence of customer information involvement.

Read Full Article

like

19 Likes

source image

Dataprivacyandsecurityinsider

2h

read

81

img
dot

Image Credit: Dataprivacyandsecurityinsider

Biden Issues Cyber Executive Order in Last Days of Term

  • Former President Joe Biden issued an Executive Order (EO) entitled “Strengthening and Promoting Innovation in the Nation’s Cybersecurity” on January 16, 2025.
  • The EO aims to remove barriers to threat information sharing between government and the private sector, modernize and implement stronger cybersecurity standards in the federal government, improve software supply chain security, establish a Cyber Safety Review Board, and create a standardized playbook for responding to cybersecurity vulnerabilities and incidents.
  • The National Institute of Standards and Technology (NIST) and the Cybersecurity and Infrastructure Security Agency (CISA) will be involved in operationalizing and implementing the EO.
  • NIST is tasked with securing federal communications, combating cybercrime and fraud, promoting security in artificial intelligence, and aligning policy to practice.

Read Full Article

like

4 Likes

source image

Arstechnica

9h

read

242

img
dot

Image Credit: Arstechnica

Data breach hitting PowerSchool looks very, very bad

  • A major data breach has occurred at PowerSchool, a cloud-based service provider for K-12 schools.
  • The breach resulted in unauthorized access to personal information stored in PowerSchool's Student Information System (SIS).
  • The stolen information includes names, contact details, dates of birth, medical alert information, Social Security Numbers, and other related data.
  • PowerSchool serves 16,000 schools worldwide, impacting 60 million students and an undisclosed number of teachers.

Read Full Article

like

14 Likes

source image

TechJuice

9h

read

146

img
dot

Image Credit: TechJuice

Opp Leader Omar Ayub takes Jab at Digital Nation Pakistan Bill

  • Leader of Opposition in the National Assembly, Omar Ayub, criticizes the Digital Nation Pakistan Bill for its potential impact on press freedom and civil liberties.
  • The bill proposes amendments to cybercrime laws and tighter penalties for disinformation, as well as the creation of a new regulatory authority with the power to block social media platforms.
  • Omar Ayub argues that the bill disproportionately affects marginalized groups with limited internet access or digital literacy.
  • He also highlights concerns over non-civilian appointments in the IT sector, which he believes violate privacy laws and compromise citizens' data security.

Read Full Article

like

8 Likes

source image

Alvinashcraft

10h

read

200

img
dot

Image Credit: Alvinashcraft

Dew Drop – January 23, 2025 (#4348)

  • Microsoft has shared tips for app developers to make their app great on Windows 11.
  • The company has suggested various guidelines including an attractive tile, integration with Windows Snap layouts, support for high contrast themes, and well-designed settings pages.
  • Another key guideline is ensuring a consistent and smooth user experience across different devices.
  • GitHub Copilot can help modernize legacy code according to a blog post by Ari LiVigni on the Github blog.
  • The article offers tips and examples to assist in the transition like moving to and from class members and creating new classes.
  • The post Angular 13 reduces the size of generated TypeScript code and enhances the debugging experience as well.
  • A guide to implementing ActivityPub in a Static Site is offered in an eight-part series on dev.to.
  • Users are directed through each stage of the process including authentication, federation, and implementing rich media.
  • SSMS Preview 3 features a new Measure Performance feature according to Erin Stellato on her blog.
  • The feature shows how much of the query cost is taken up by table scans and seeks and can be enabled by right-clicking a Query Plan and selecting 'measure performance' from the extended context menu.

Read Full Article

like

12 Likes

source image

TechJuice

16h

read

282

img
dot

Image Credit: TechJuice

New ‘Cybercrime Bill’ Put Forward for Pakistan: Social Media Oversight and Stricter Penalties

  • The National Assembly introduced a bill proposing amendments to the country’s cybercrime laws in Pakistan.
  • Key provisions include a proposed three-year prison term for spreading disinformation, dissolution of the FIA's Cybercrime Wing, establishment of a new investigation agency, and creation of a new regulatory authority.
  • The bill also introduces the National Cyber Crime Investigation Agency (NCCIA) and a Social Media Protection Tribunal.
  • Changes to the Criminal Procedure Code (CrPC) aim to streamline the legal process and encourage the use of modern devices as evidence.

Read Full Article

like

16 Likes

source image

Bitcoinist

22h

read

7

img
dot

Image Credit: Bitcoinist

Major Crypto Services Firm Admits to Wash Trading as Part of DOJ Settlement—Details

  • Cryptocurrency financial services firm, CLS Global FZC LLC, has admitted to wash trading and will plead guilty to charges of market manipulation and wire fraud as part of a settlement with the US Department of Justice (DoJ).
  • As part of the settlement, CLS Global will pay $428,059 in penalties and restitution and will be prohibited from participating in cryptocurrency markets accessible to US investors.
  • The DoJ's investigation involved creating a fictitious cryptocurrency company and documented discussions with a CLS Global employee who detailed how the company's algorithm generated fake trading volume.
  • The Securities and Exchange Commission (SEC) also filed a separate civil enforcement action against CLS Global for securities law violations.

Read Full Article

like

Like

source image

Hackernoon

23h

read

101

img
dot

Image Credit: Hackernoon

Goodbye Yellow Brick Road: The Release of Silk Road Admin and Its Ripple Effects

  • Silk Road promised freedom but became a symbol of digital lawlessness. It left a legacy that continues to influence cybersecurity and legal debates today. With the recent release of Silk Road administrator Ross Ulbricht, we are reminded of the balance between justice and innovation.
  • Ross Ulbricht, AKA “Dread Pirate Roberts,” envisioned the Silk Road as a libertarian experiment. It quickly became a hub for illegal activities, including drug trafficking, counterfeit goods, and hacking services. It was designed as a marketplace for the exchange of illegal goods and services.
  • Silk Road was a notorious online black market and operated as a hidden service on the Tor network, allowing users to browse anonymously and use cryptocurrency for transactions. It offered drugs, prescription drugs, fake documents and services, weapons, and other illegal items.
  • Silk Road functioned on a commission-based system, taking a cut (typically 10-15%) from every transaction. The total revenue over its lifetime was approximately $1.2 billion in transactions, with Ulbricht personally earning around $80 million in commissions before the site was shut down in 2013.
  • Ross Ulbricht was arrested on October 1, 2013, at a public library in San Francisco. The arrest marked the culmination of a complex and far-reaching investigation into the anonymous dark web marketplace he operated.
  • During the investigation, evidence emerged that Ulbricht had allegedly attempted to arrange six murder-for-hire plots to protect the Silk Road and its anonymity. In 2015, Ulbricht was convicted on all counts and sentenced to life in prison without the possibility of parole.
  • The decision to release a former Silk Road administrator has raised concerns among the cybersecurity community and lawmakers alike. The release of the administrator has sparked questions about accountability and whether the justice system is prepared for the potential aftershocks.
  • For the cybersecurity community, it’s a reminder that the battle against cybercrime is far from over. For lawmakers, it’s a prompt to reflect on the decisions that created a martyr out of Ross Ulbricht and a cautionary tale about the limits of justice in a digital world.
  • The Yellow Brick Road may have led to Oz, but this story reminds us that the real wizard — the promise of freedom through technology — was always an illusion, and the choices made along the way shape the world we must now navigate.

Read Full Article

like

6 Likes

source image

TechCrunch

1d

read

243

img
dot

Image Credit: TechCrunch

What PowerSchool isn’t saying about its ‘massive’ student data breach

  • PowerSchool SIS, which provides K-12 software to more than 18,000 schools to support some 60 million students in the United States, confirmed the breach in early January.
  • Hackers used compromised credentials to breach its customer support portal, allowing further access to the company’s school information system.
  • PowerSchool has declined to answer open questions about the incident, which could potentially be one of the biggest breaches of the year.
  • PowerSchool customers affected by the breach have many unanswered questions, with many impacted schools collaborating to investigate the hack.
  • The scale of the hack is unclear; PowerSchool has not revealed the number of schools or students affected.
  • Sensitive personal information on students and teachers, including some students’ Social Security numbers, grades, demographics, and medical information, was stolen.
  • PowerSchool worked with a cyber-extortion incident response company to negotiate with the threat actors responsible for the breach, indicating that it might have paid the ransom to them.
  • The company has refused to say how much it paid or how much the hackers demanded.
  • Uncertainty remains over whether the hackers are still in possession of the stolen data, despite early reports suggesting that PowerSchool received video proof of deletion.
  • The identity of the attackers remains unknown, with PowerSchool remaining tight-lipped.

Read Full Article

like

14 Likes

source image

Neuways

1d

read

251

img
dot

‘Sneaky Log’ Phishing Scheme Targets Microsoft 365 Two-Factor Security

  • A new phishing-as-a-service (PhaaS) scheme called Sneaky Log targets Microsoft 365 and bypasses two-factor authentication (2FA).
  • The scheme involves fake authentication pages, Cloudflare turnstile verification, credential harvesting, account access, and redirection to legitimate Microsoft pages.
  • Businesses are advised to strengthen MFA, implement advanced threat protection (ATP), and educate their workforce to mitigate the threat.
  • Microsoft 365 is frequently targeted due to its wide usage, highlighting the need for organizations to stay proactive in cybersecurity strategies.

Read Full Article

like

15 Likes

source image

Securityaffairs

1d

read

306

img
dot

Image Credit: Securityaffairs

Cloudflare blocked a record-breaking 5.6 Tbps DDoS attack

  • Cloudflare announced blocking a record-breaking 5.6 Tbps DDoS attack.
  • The attack occurred on October 29 and lasted for 80 seconds.
  • The botnet behind the attack consisted of 13,000 IoT devices.
  • Cloudflare's detection and mitigation were fully automated.

Read Full Article

like

18 Likes

source image

Securityaffairs

1d

read

275

img
dot

Image Credit: Securityaffairs

Former CIA analyst pleaded guilty to leaking top-secret documents

  • Former CIA analyst, Asif William Rahman, pleaded guilty to leaking top-secret National Defense Information on social media in 2024.
  • Rahman stole and leaked Top-Secret documents on a U.S. ally's plans, which appeared on social media the next day.
  • He altered and shared Top-Secret information with unauthorized individuals from spring to November 2024.
  • Rahman pleaded guilty to two counts of willful retention and transmission of classified information and could face up to 10 years in prison.

Read Full Article

like

16 Likes

For uninterrupted reading, download the app