The sale of online gaming currencies, while not illegal, has been found to have cybercriminal ties. This research paper covers how cybercriminals use the profits from the trade of these virtual currencies to fund other attacks.
With a little SDR knowledge and a $20 USB dongle, attackers can read unencrypted pager messages from tens of kilometers away. Who still uses pagers in this day and age? Healthcare facilities. Goodbye, PHI. Read more
This research paper highlights the flaws of the WPAD protocol, describes how it works, and why it is a serious security concern, especially under the altered conditions in today’s connected world. Read more
Details of the different regional underground scenes we visited in 2015. Find out why we say the cybercriminal underground is not a huge global conglomerate, but rather a wide-ranging cluster of specialized “branches” that cater to specific needs. Read more
Trend Micro's latest visit to the Brazilian cybercriminal underground reveals its latest trends and available services, from online banking malware to tutorial classes for new cybercriminals. Read more
While considered new and relatively smaller than its foreign counterparts, the German underground is a fully developed, well-managed haven that gives cybercriminals just about everything they need to start their own cybercrime business Read more