Security Alerts & News
by Tymoteusz A. Góral

History
#700 An analysis of overlapping technologies used by cybercriminals and terrorist organizations
Cybercriminal activities have always involved the abuse of legitimate online tools and services. Examples of these activities come in many forms and can be found everywhere—from using vulnerabilities in software, websites, and web applications as attack vectors, hosting malicious components in cloud services, to leveraging clickbait posts and links on social networking sites to lure hapless users into falling for their schemes. No matter what technology or service rolls out in the future, there will always be room for abuse.

During the course of our research on cybercrime, we found that one particular group appears to share the same level of proficiency as cybercriminals in abusing legitimate services: terrorist groups who can be considered as cybercriminals in their own right, as their online activities also run afoul of the law. The two groups have different motives though, as cybercriminals are motivated by financial gain, while terrorists aim to spread propaganda instead of malware.

This research is about how cybercriminals and terrorists overlap in their abuse of technology and online platforms to benefit their cause. We will focus on their methodologies, the services they abuse, and the tools they’ve homebrewed to streamline said abuse so that their followers can facilitate their activities much more easily.
Read more
#701 How the Pwnedlist got pwned
#700 An analysis of overlapping technologies used by cybercriminals and terrorist organizations
#699 Huge number of sites imperiled by critical image-processing vulnerability
#698 Google expands default HTTPS to Blogspot
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12