In the first documented attack of its kind, the Internet of Things has been used as part of an attack that sent out over 750,000 spam emails.
International Law and Cyber Attacks: Sony North Korea
It could only happen in the movies. A major Hollywood company produces a film starring well-known comedic actors which involves the tongue-in-cheek assassination of the leader of a remote and rather bizarre dictatorship. The “supreme leader” apparently orders a secret group of cyber warriors calling themselves “The Guardians of Peace” (in actuality, the State-run “Bureau 121”) to retaliate by attacking the company’s IT system.
A Breakdown and Analysis of the December, 2014 Sony Hack
Note: This article is being updated almost daily with new developments regarding the leaks from the Sony Pictures breach.
How Did The FBI Break Tor?
Global law enforcement conducted a massive raid of the Dark Web this week. It started with the FBI takedown of Silk Road 2.0 and the arrest of its alleged operator Blake Benthall in San Francisco on Wednesday.
Global action against dark markets on Tor network
“Today we have demonstrated that, together, we are able to efficiently remove vital criminal infrastructures that are supporting serious organised crime. And we are not 'just' removing these services from the open Internet; this time we have also hit services on the Darknet using Tor where, for a long time, criminals have considered themselves beyond reach. We can now show that they are neither invisible nor untouchable. The criminals can run but they can’t hide. And our work continues....”, says Troels Oerting, Head of EC3.