article thumbnail

Alexander Vinnik, the operator of BTC-e exchange, pleaded guilty to money laundering

Security Affairs

Alexander Vinnik , a Russian national, pleaded guilty to conspiracy to commit money laundering for his involvement in operating the cryptocurrency exchange BTC-e from 2011 to 2017. Alexander Vinnik, a Russian operator of virtual currency exchange BTC-e pleaded guilty to participating in a money laundering scheme.

article thumbnail

Mitsubishi Electric discloses data breach, media blame China-linked APT

Security Affairs

” “Mitsubishi Electric, a major general electronics maker , has been hit by a large-scale cyber attack , and it has been found that information about public and private business partners such as highly confidential defense-related and important social infrastructure such as electric power and railroad may leak out.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. Ten years ago, then 19-year-old hacker Ngo was a regular on the Vietnamese-language computer hacking forums. Secret Service. Hieu Minh Ngo, in his teens. BEGINNINGS.

article thumbnail

Teach a Man to Phish and He’s Set for Life

Krebs on Security

RLO is a special character within unicode — an encoding system that allows computers to exchange information regardless of the language used — that supports languages written from right to left, such as Arabic and Hebrew. ’ One would think Microsoft would have had plenty of time by now to address this.”

Phishing 239
article thumbnail

Breach Exposes Users of Microleaves Proxy Service

Krebs on Security

Microleaves , a ten-year-old proxy service that lets customers route their web traffic through millions of Microsoft Windows computers, recently fixed a vulnerability in their website that exposed their entire user database. The same account continues to sell subscriptions to Shifter.io. Oh, and all your security woes will disappear, too.

article thumbnail

NIST Issues Guidelines on Security and Privacy in Public Cloud Computing

Hunton Privacy

The National Institute of Standards and Technology (“NIST”) has issued draft Guidelines on Security and Privacy in Public Cloud Computing (SP 800-144) (the “Guidelines”) for public comment. Ensure that the client-side computing environment meets organizational security and privacy requirements for cloud computing. Precaution.

Cloud 40
article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Autopsy is its GUI and a digital forensics platform used widely in public and private computer system investigations to boost TSK’s abilities. The Computer-Aided Investigative Environment (CAINE) is an open-source Ubuntu- and Linux-based distribution created by Italian developers for digital forensic purposes. Magnet Forensics.