The Latest in IT Security

Posts Tagged ‘nickname’

What is it that cybercriminals needs once they have obtained access to stolen financial data? Next to money mules, that’s empty plastic cards in which they will later on embed the stolen financial data. Let’s profile a vendor of empty Visa/Mastercard plastic cards and holograms in order to gain a better picture at just how […]

Read more ...

Almost from the beginning of the DigiNotar CA Disaster (report here), we had a reason to believe the case was connected to “ComodoGate” — the hacking of another Certificate Authority earlier this year, by an Iranian attacker. This connection has now been confirmed. After ComodoGate, the hacker — who called himself ComodoHacker — sent a […]

Read more ...

Since the British police arrested a teenager yesterday in connection with the hacktivist activities of LulzSec and Anonymous, I’ve been asked, time and time again, the same question: Have the cops got the right man? Have they arrested the “real” Topiary? It seems that the reason why they’re asking is that folks are supicious that […]

Read more ...


Categories

SATURDAY, FEBRUARY 22, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments