Skip to content

FBI warns about scams that lure you in as a mobile beta-tester – Naked Security

The US Federal Bureau of Investigation (FBI) has issued a public service announcement warning about cybercriminals targeting victims through mobile beta-testing applications. While the FBI did not specifically name any vendors or services, the main objective of these criminals is to trick iPhone users into installing software that did not come from the App Store.… 

“Grab hold and give it a wiggle” – ATM card skimming is still a thing – Naked Security

Card skimmers have taken a backseat in recent years as cybercrime stories focus on ransomware, the darkweb, and supply-chain attacks. Ransomware attacks allow criminals to extract payoffs online, using technologies like the darkweb and cryptocoins. Supply-chain attacks target third parties that regularly handle precious data, allowing criminals to bypass their victims’ networks. In contrast, card… 

Crimeware server used by NetWalker ransomware seized and shut down – Naked Security

The US Department of Justice (DOJ) has seized the web domain LolekHosted.net, which was allegedly involved in various illegal activities. The DOJ also charged a Polish man named Artur Karol Grabowski in connection with running the service, but his current whereabouts are unknown. The website now displays a warning notice to visitors. LolekHosted.net is considered… 

What if you type in your password during a meeting? – Naked Security

Rewrite: In this episode of the Naked Security podcast, hosts Doug Aamoth and Paul Ducklin cover a range of topics, including crocodilian cryptocrime, the BWAIN streak, and the importance of touch-typing. They kick off the episode with a discussion on Tech History, highlighting IBM’s presentation of the Automatic Sequence Controlled Calculator (Mark I) to Harvard… 

“Crocodile of Wall Street” and her husband plead guilty to giant-sized cryptocrimes – Naked Security

Title: The Crocodile of Wall Street: A Tale of Bitcoin Theft and Money Laundering Introduction: In August 2016, Heather Morgan and her husband Ilya Lichtenstein, known as the Crocodile of Wall Street, illegally obtained 120,000 bitcoins worth $72 million. Despite the potential for a life of luxury, the couple faced challenges in cashing out their… 

Tell us about that breach! (If you want to.) – Naked Security

DOUG.  Firefox updates, another Bug With An Impressive Name, and the SEC demands disclosure. All that, and more, on the Naked Security podcast. [MUSICAL MODEM] Welcome to the podcast, everybody. I am Doug Aamoth; he is Paul Ducklin. Paul, I hope you will be proud of me… I know you are a cycling enthusiast. I rode… 

What was Steve Jobs’s first job? – Naked Security

DOUG.  …it also involved a multitude of other cybercrimes. This individual, a 22-year-old from the UK, was involved in SIM swapping attacks, where he would manipulate mobile phone carriers to transfer victims’ phone numbers to his control. With access to their phone numbers, he would then take over their online accounts, including social media, email, and… 

Interested in $10,000,000? Ready to turn in the Clop ransomware crew? – Naked Security

The latest cybercrime exploits attributed to the Clop ransomware crew have taken a new approach that deviates from traditional ransomware attacks. While conventional attacks involve scrambling files and demanding a large sum of money for a decryption key, the Clop gang has evolved to take copies of vital files and use them as leverage. Scrambling… 

UK hacker busted in Spain gets 5 years over Twitter hack and more – Naked Security

is a technical term that has become notorious due to the many internet hacks associated with it, such as the Great Worm of November 1988 and the Twitter hack of July 2020. Joseph O’Connor, one of the suspects in the Twitter hack, was recently sentenced to five years in prison for multiple offenses, including using… 

So you think you know ransomware? – Naked Security

The Naked Security podcast, hosted by Doug Aamoth and Paul Ducklin, covers a range of topics related to cybersecurity and technology news. In a recent episode, the hosts discussed router vulnerabilities, Megaupload’s legal troubles, and Sophos’ new documentary series on ransomware. Router vulnerabilities can allow hackers to break into networks if not patched in time,…