• Thumbnail for List of cybercriminals
    {{cite web}}: CS1 maint: bot: original URL status unknown (link) "CUSSE List of Convicted Hackers". Archived from the original on 30 May 2013. Retrieved...
    43 KB (2,145 words) - 21:38, 7 March 2024
  • Thumbnail for Cybercrime
    computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized...
    76 KB (8,413 words) - 02:15, 15 June 2024
  • Thumbnail for Kevin Mitnick
    Kevin Mitnick (category American cybercriminals)
    (2017) The Art of Invisibility (1996) The Fugitive Game: Online with Kevin Mitnick, Jonathan Littman Kevin Poulsen List of cybercriminals "My kung fu is...
    37 KB (3,118 words) - 05:00, 28 June 2024
  • (1st ed.). Que Publishing, Pearson Education. ISBN 978-0789738288. "Cybercriminal Darkode Forum Taken Down Through Global Action". Europol. 15 July 2015...
    16 KB (976 words) - 15:45, 28 May 2024
  • Thumbnail for OGUsers
    OGUsers (category CS1 maint: multiple names: authors list)
    American journalist and investigative reporter known for the coverage of cybercriminals, has described the forum as a place "overrun with shady characters...
    13 KB (948 words) - 06:17, 19 June 2024
  • on the lives and duties of staff members at Chastain Park Memorial Hospital, while delving into the bureaucratic practices of the hospital industry. On...
    264 KB (7,217 words) - 04:34, 30 June 2024
  • Thumbnail for Graham Ivan Clark
    Graham Ivan Clark (category American cybercriminals)
    Graham Ivan Clark (born January 9, 2003) is an American computer hacker, cybercriminal and a convicted felon regarded as the mastermind behind the 2020 Twitter...
    9 KB (930 words) - 19:45, 13 June 2024
  • Jabber Zeus (category People convicted of money laundering)
    example of the opportunities to arrest cybercriminals opened up by the Russian invasion of Ukraine as they flee the country for their own safety. List of computer...
    26 KB (2,842 words) - 06:56, 8 December 2023
  • Thumbnail for Money laundering
    in money laundering and fraud tied to cryptocurrency. In 2021 alone, cybercriminals managed to secure US$14 billion in cryptocurrency through various illicit...
    76 KB (7,188 words) - 21:47, 18 June 2024
  • Thumbnail for Hostinger
    Scores". "Ranking of Hosting Networks (ASNs) by Phishing Attack Score". "Hostinger hosts over 90% of all Steam phishing sites". "Cybercriminals Exploit Hostinger's...
    13 KB (1,176 words) - 17:54, 1 July 2024
  • investigative reporter. He is best known for his coverage of profit-seeking cybercriminals. Krebs is the author of a daily blog, KrebsOnSecurity.com, covering computer...
    18 KB (1,646 words) - 01:51, 10 May 2024
  • Thumbnail for Advance-fee scam
    "Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals". International Journal of Law, Crime and Justice. 47: 44–57...
    90 KB (10,656 words) - 07:29, 3 July 2024
  • following is a list of the 33 episode run for the British drama Lewis, that aired on ITV for seven series (2006–2015). This series consists of three stories...
    52 KB (697 words) - 20:33, 28 June 2024
  • حمزة بن دلاج, romanized: Ḥamza ben Delāj; born 1988) is an Algerian cybercriminal and carder who goes by the code name BX1 and has been nicknamed as the...
    13 KB (1,056 words) - 16:56, 6 July 2024
  • Leyden, J. (16 November 2021). "Exploit-as-a-service: Cybercriminals exploring potential of leasing out zero-day vulnerabilities". PortSwigger Ltd....
    9 KB (1,055 words) - 03:06, 20 June 2024
  • on the Belarusian government and governmental agencies. DarkSide, a cybercriminal hacking group, believed to be based in Eastern Europe, that targets...
    15 KB (1,722 words) - 10:04, 26 June 2024
  • once again teamup, this time to become involved in a conspiracy of spies, cybercriminals, and corrupt government officials, and discover the deception runs...
    24 KB (1,845 words) - 18:15, 27 May 2024
  • cybercriminals". Ars Technica. Retrieved November 30, 2014. Goodin, Dan (December 4, 2013). "Credit card fraud comes of age with advances in point-of-sale...
    34 KB (3,378 words) - 07:29, 8 July 2024
  • use". Retrieved 2022-04-18. Lemos, Robert (2013-03-06). "Cybercriminals Likely To Expand Use Of Browser Proxies". Retrieved 2016-04-20. "Microsoft KB 271361...
    13 KB (1,579 words) - 19:56, 27 June 2024
  • Thumbnail for Tornado Cash
    Tornado Cash (category Specially Designated Nationals and Blocked Persons List)
    Retrieved 24 August 2023. "Tornado Cash Co-Founders Accused of Helping Cybercriminals Launder Stolen Crypto". fbi.gov. 7 August 2023. Archived from...
    14 KB (1,074 words) - 12:28, 16 June 2024
  • Thumbnail for API
    annual "State of the Internet" report, showcasing the growing trend of cybercriminals targeting public API platforms at financial services worldwide. From...
    55 KB (5,649 words) - 19:57, 1 July 2024
  • they change often and often contain elements of more than one type. Throughout this list, the perpetrator of the confidence trick is called the "con artist"...
    106 KB (14,606 words) - 06:24, 9 June 2024
  • of the ACM. 60 (3): 21–22. doi:10.1145/3037386. S2CID 32696030. Richet, Jean-Loup (June 2013). "Laundering Money Online: a review of cybercriminals methods"...
    59 KB (5,340 words) - 17:42, 4 June 2024
  • Stash, a site used by cybercriminals for buying and selling card details. Group-IB, a Singapore-based company revealed that over 98% of the cards in the database...
    26 KB (2,546 words) - 10:38, 28 April 2024
  • general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power...
    19 KB (1,784 words) - 10:05, 3 June 2024
  • Thumbnail for Eugene Kaspersky
    parts of the Internet anonymous, while more secure areas require user identification. He argued that anonymity mostly benefited cybercriminals and hackers...
    43 KB (4,209 words) - 05:51, 22 June 2024
  • Hushpuppi (category CS1 maint: numeric names: authors list)
    comparison: using Twitter responses to understand similarities between cybercriminals (“Yahoo Boys”) and politicians (“Yahoo men”). Heliyon, 8(11), e11142...
    23 KB (2,491 words) - 22:48, 28 June 2024
  • the perpetrators can develop in the command and control (C&C) server. Cybercriminals use the BlackEnergy bot builder toolkit to generate customized bot client...
    7 KB (717 words) - 04:35, 5 November 2023
  • documentary television series produced by WGBH Boston for PBS. Many of the programs in this list were not originally produced for PBS, but were acquired from...
    457 KB (2,265 words) - 05:17, 30 May 2024
  • hackers seek millions in ransom on claims of stolen employee data". Global News. Retrieved 2024-05-22. "Cybercriminals threaten to leak London Drugs data if...
    51 KB (4,377 words) - 05:02, 9 July 2024