• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Italy, France and Singapore Warn of a Spike in ESXI Ransomware
  • Royal Ransomware adds support for encrypting Linux, VMware ESXi systems
  • Italian National Cybersecurity Agency (ACN) warns of massive ransomware campaign targeting VMware ESXi servers
  • Microsoft attributes Charlie Hebdo data leak to Iran-linked NEPTUNIUM APT
  • Security Affairs newsletter Round 405 by Pierluigi Paganini
  • CISA adds Oracle, SugarCRM bugs to its Known Exploited Vulnerabilities Catalog
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Laws and regulations (Page 31)

Laws and regulations

Operation Onymous, the joint attack against dark markets in Tor

Operation Onymous - Law enforcement and judicial agencies around the globe conducted a joint action against dark markets on Tor networks. This morning I have reported the news of the seizure for the underground black market Silk Road 2.0 and the arrest...

November 7, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Laws and regulations 

Telstra Fined $18K for violating the privacy Act

Telstra to pay a whopping $18,000 fine for listing the contact information of a Sydney Judge without his consent. The Australian Telco contravened the Privacy Act and risked the safety of the Judge who has since applied for an interstate transfer due to security...

November 6, 2014  By Pierluigi Paganini   Posted In  Laws and regulations  Security 

Europol warning on the risks related to the Internet of Everything (IoE)

The European Police Office (Europol) confirmed that difficulties to face the menaces of cybercrimes to the Internet of Everything (IoE). The EU’s chief criminal intelligence agency made a disconcerting revelation, the threat of “online murder”...

October 6, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Laws and regulations 

FBI opens its Malware Investigator portal to the private industry

The FBI Operational Technology Division which is responsible for malware analysis opens its Malware Investigator portal to the private industry. The FBI has opened its Malware Investigator portal to industry in order to information sharing on this type...

October 1, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Laws and regulations  Malware 

The Fappening 3, other nude celebrity photos leaked

A new collection of photos belonging to the Fappening archives have been leaked online, it includes nudes of Jennifer Lawrence and other celebrities. The Fappening is now in its third episode and the celebrities are naked again. The Fappening seems...

September 27, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Laws and regulations  Security 

DoJ proposal wants legitimate FBI hacking ops against anonymity

DoJ proposal is trying to legitimate FBI hacking operations against Internet users that make use of any kind of anonymizing technology. The FBI wants greater authority to hack overseas computers, according to a law professor. The Department of Justice...

September 21, 2014  By Pierluigi Paganini   Posted In  Intelligence  Laws and regulations  Security 

New powers for the Russian surveillance system SORM-2

The Russian Prime Minister Dmitry Medvedev has signed a decree that will extend the use of SORM-2 to social network surveillance. It’s known that the Russian Government is applying a strict surveillance on the Internet within the country, the Kremlin...

August 18, 2014  By Pierluigi Paganini   Posted In  Digital ID  Intelligence  Laws and regulations 

FBI infected PCs on a large scale to persecute alleged criminals

A report disclosed by Wired suggests that the FBI is using a malware to identify Tor users by infecting machines on a large scale. It's not a mystery that usage of the Tor network represents a problem for investigators of law enforcement agencies...

August 7, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Intelligence  Laws and regulations 

Why the agreement between ENISA and EUROPOL is strategic?

ENISA and Europol have signed an agreement with the intent to facilitate the cooperation in the fight to the cyber criminal activities. The fight to the cybercrime needs a joint effort of governments, law enforcement agencies and private entities....

June 29, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Laws and regulations  Security 

FBI and NYPD joint effort in a new cybercrime task force

The FBI has formed a new cybercrime task force with the NYPD and the Metropolitan Transit Authority to investigate on cyber crimes. Cybercrime is considered by governments an emergency to mitigate urgently, criminal activities are causing large losses...

June 21, 2014  By Pierluigi Paganini   Posted In  Cyber Crime  Laws and regulations  Security 


« First‹ Previous272829303132333435Next ›Last »
Page 31 of 35



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Go to mobile version