Written by Justin, October 5th, 2015
October 10, 2015
Posted on October 8, 2015 by Jan-Jaap Oerlemans in Criminal Law and Criminology, Interdisciplinary Study of the Law
A digital revolution has taken place for law enforcement authorities. A treasure trove of information is currently publicly available on the Internet. In addition, large amounts of information can be gathered from third parties, such as telecommunication providers, financial institutions and online service providers. Furthermore, law enforcement authorities can analyse every piece of information on seized computers with specialised software. All that information can be combined and processed and thereby provides great investigative potential for law enforcement authorities.
The Dutch legislator is currently seeking to amend (in Dutch) the Dutch Criminal Code of Criminal Procedure (DCCP) and aims to take into account the influence of Information and Communication Technology on police work.
I've been pretty busy lately with updating Tango to version 2.0 and working on threat_note, but, another project I started on recently was something @__eth0 and I are calling Gavel. Gavel is a set of Maltego transforms that query traffic records in each state. This project started out really ambitiously and we wanted to cover all 50 states, however, we ran into several problems. Our goal was to provide a way to look up certain data that are available in the traffic records, to include:
- License Plate Number
- Car Make/Model
October 06, 2015
Monday, October 05, 2015 Khyati Jain
While accessing your Bank account online, Have you ever thought…
...there could be a Hacker, somewhere in the World, who is after your Money?
Maybe NO. Because, you believe that your bank offers Secure banking solution, Right?
At The Hacker News, we have reported many incidents of cyber attacks, which proves that Banks are more often being targeted by Hackers, despite robust Banking Security mechanisms.
Today we are going to talk about security of one of the Denmark's Largest Bank, reviewed by Sijmen Ruwhof, an Ethical Hacker, and IT Security Consultant.
Ruwhof recently published a blog post, “How I could Hack Internet Bank accounts of Danish Largest Bank in a few minutes”.
July 24, 2015
7/23/2015 @ 9:25AM
Do you cheat on our spouse? Then chances are, you’re sweating bullets over the recent Ashley Madison hack. However, if you’re in enterprise IT, you should be as distressed as any cheater, regardless of how faithful to your other half you actually happen to be.
Here are the facts: earlier this week, an anonymous group of hackers going by the name The Impact Team hacked the adultery website Ashley Madison. The hackers stole large caches of data, including information about users who paid Ashley Madison to delete their data.
Before you turn up your nose with schadenfreude or rush out to buy flowers for your mate in a desperate but futile damage control gesture, consider the important lessons for all enterprise cybersecurity – regardless of business model.