article thumbnail

A man faces up to 25 years in prison for his role in operating unlicensed crypto exchange BTC-e

Security Affairs

. “According to the indictment, between 2011 and July 2017, Aliaksandr Klimenka, 42, allegedly controlled BTC-e, a digital currency exchange, with Alexander Vinnik and others.” Klimenka also allegedly controlled a technology services company named Soft-FX, and the financial company FX Open. million withdrawn.

article thumbnail

Don't plug your phone into a free charging station, warns FBI

Malwarebytes

The term was first used by Brian Krebs in 2011 after a proof of concept was conducted at DEF CON by Wall of Sheep. There are many categories of malware that cybercriminals could install through juice jacking, including adware, cryptominers, ransomware, spyware, or Trojans. Consider any random technology left behind as suspect.

Mobile 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Another NFT explainer, with a bonus look at the data security implications

Webroot

“What Bitcoin was to 2011, NFTs are to 2021.”. Since cryptocurrencies were, are and will continue to be impactful technologies, surely NFTs are a topic worth exploring. NFTs use the same blockchain ledger technology to verify uniqueness that cryptocurrencies rely on to prove ownership.

article thumbnail

Security Affairs newsletter Round 178 – News of the week

Security Affairs

Stopping a big botnet targeting USA, Canada and Italy. · What Happens to Whistleblowers After They Blow the Whistle?

Spyware 42
article thumbnail

What is Employee Monitoring? Full Guide to Getting It Right

eSecurity Planet

Fitbit and similar technology can be used to track employees’ exercise routines, with some companies even offering rewards like extra days off for good behavior. This is a common selling point of the technology, but is there evidence backing up these claims? Does Employee Monitoring Increase Productivity?

article thumbnail

Mobile malware evolution 2020

SecureList

In 2020, Kaspersky mobile products and technologies detected: 5,683,694 malicious installation packages, 156,710 new mobile banking Trojans, 20,708 new mobile ransomware Trojans. The word “covid” in various combinations was typically used in the names of packages hiding spyware and banking Trojans, adware or Trojan droppers.

Mobile 133
article thumbnail

Phishers turning hard-working: CERT-GIB records upsurge of phishing resource blockages as duration of attacks grows

Security Affairs

H2 2019 has proved the tendency of past several years: mail remains the main method of delivering ransomware, spyware, backdoors and other malware, being used by cyber crooks in 94 percent of cases. They, in turn, let spyware and backdoors move ahead and become the second most popular malware with a 35-percent share.