- The third part of the “Leaking Beeps” series discusses the different types of IT systems connected with unencrypted pages that can be used by attackers for reconnaissance or intelligence gathering.With a little SDR knowledge and a $20 USB dongle, attackers can read unencrypted pager messages from far away. This time, we look at what that means for nuclear plants, HVAC, manufacturers and other industries still using pagers.The sale of online gaming currencies, while not illegal, has been found to have cybercriminal ties. This research paper covers how cybercriminals use the profits from the trade of these virtual currencies to fund other attacks.With a little SDR knowledge and a $20 USB dongle, attackers can read unencrypted pager messages from tens of kilometers away. Who still uses pagers in this day and age? Healthcare facilities. Goodbye, PHI.This research into the French underground offers a look into a small market that, unlike the North American underground, is well-hidden in the Dark Web.This research paper highlights the flaws of the WPAD protocol, describes how it works, and why it is a serious security concern, especially under the altered conditions in today’s connected world.Pwn2Own is all about owning systems/devices—a test of technical skill to see who the best hacker is. It also demonstrated how browsers and plug-ins can be used as effective attack vectors.This research paper looks at the mining industry as a target for a broad set of threat actors, its role in regional and global supply chains, and its vulnerabilities.Research on the common technologies used by cybercriminals and terrorists to benefit their cause, from the services they abuse to the tools they’ve homebrewed to streamline activities.