Top Cybercriminal Prosecutions of April
The criminals continue their bad business, and law enforcement agencies successfully chase them down. It happens every month, so here are the most interesting cases from April.
102 articles
The criminals continue their bad business, and law enforcement agencies successfully chase them down. It happens every month, so here are the most interesting cases from April.
The criminals continue to undertake their nefarious business and law enforcement agencies successfully chase them down. That happens every month, so here are the most interesting cases from March. A
As always, we continue to closely monitor the progress of law enforcement agencies as they chase down cybercriminals. Here are some cases from the last month. 3 years for DDoS-attack
The year has just begun, but law enforcement agencies around the world have already caught a number of major cybercriminals. As always, we continue to closely monitor the progress of
Non-stop cat and mouse We all need a holiday or at least a weekend to catch our breath a little and get going again. Only the criminal world works non-stop.
Banking trojans are like rats, you kick a rubbish bin and six of them go scurrying off in every direction. Most of them you’ll read about once and never again.
September has come to an end and it’s time to check up on the progress that has been made by police forces and security experts in finding hackers and cybercriminals
What exactly makes a cybercriminal? Well, without getting into the nitty-gritty of what does and does not constitute a virtual crime, how about we just answer the question: “What makes
We’re continuing to watch how law enforcement agencies around the world are progressing in the fight against cybercrime. They’ve been able to keep jailing hackers, both for minor cybercrimes like
We are continuously watching how law enforcement agencies around the world fight cybercrime. With help from the IT industry and experience gained over the years, these agencies have been able
Computers, initially created for military cipher breaking, give everyone an almost perfect way to keep our secrets totally private – through encryption. For a long time strong encryption was only
Botnet is the generic name given to any collection of compromised PCs controlled by an attacker remotely — think “virtual robot army.” The individual PCs that are part of a
This April saw an increase in the arrests of cybercriminals. Most cases were related directly to stealing money; interestingly, criminals prefer to steal smaller sums from hundreds of credit card
Attackers trying to infect your computer with malware capable of remote access don’t necessarily seek money; some cybercriminals are just having fun. The most valuable items to these invaders are
Whenever you read a news headline about the arrest or conviction of a cybercriminal, you can guarantee that the bulk of the investigative work was done by the work of
Apple popularized the app-store concept and the iPhone and its companion store have gained a reputation for security over the years. While iOS on its own is quite secure, there
Look at any one of the dozens of reports about cybercrime levels, and you’ll inevitably come away with the conclusion that online crime is getting worse by the day. And
Eugene Kaspersky has had an interesting, varied life, with more than his share of adventures, successes and challenges. He’s seen and done a lot, but when he learned that he