No Password Required: USF Cybercrime Professor, Former Federal Agent, and Vintage Computer Archivist
Episode 334 -- District Court Dismisses Bulk of SEC Claims Against Solarwinds
The Presumption of Innocence Podcast: Episode 39 - Unthreading the Silk Road: A Conversation With Author Nick Bilton
Snooping Sadia Talks to Former Official Gene Fishel — Unauthorized Access Podcast
Episode 282 -- CISO and CCOs -- The Evolving Partnership
Cybersecurity Threats Facing Food and Agribusiness Companies & the Preparation and Protection Safeguards to Help Mitigate Them
Wire Fraud Scams: What You Need to Know - The Consumer Finance Podcast
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Understanding the Additional Risks When Making a Ransomware Payment
Fighting the Constantly Evolving Threat of Cybercrimes
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
No Password Required: A Former Police Officer Who Embodies All the Qualities of a Great Leader
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
JONES DAY TALKS®: The eBay Cyberstalking Case: Mitigating the Compliance Risks of Employee Misconduct
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
No Password Required: A Corvette-Driving Research Scientist Who Built His Own Video Games
Dr. Thomas Hyslip teaches at the master’s in cybercrime program at the University of South Florida, where he blends criminology, digital forensics, and incident response coursework. A retired U.S. Army colonel, Dr. Hyslip's...more
Businesses can breathe a little easier now that one of the world’s top five ransomware networks, the Hive, has been infiltrated and disbanded by the FBI....more
Die Bedrohungslage durch Cyberangriffe mittels Ransomware-Attacken hat sich zuletzt weiter verschärft. Angesichts der schwerwiegenden und kostenintensiven Auswirkungen solcher Attacken auf den laufenden Geschäftsbetrieb von...more
Russia’s Federal Security Service (“FSB”) issued a press release on January 14, 2022 claiming that it dismantled the REvil ransomware gang by arresting 14 suspected members and seizing computer equipment, luxury vehicles,...more
A search warrant is not required for law enforcement to use pen registers to record the IP addresses visited by a criminal suspect, a federal appeals court recently held. This follows a 1979 Supreme Court case, Smith v....more
On April 12, 2021, President Joe Biden nominated Kenneth Polite Jr. as Assistant Attorney General for the Criminal Division at the Department of Justice (“DOJ”). If confirmed by the Senate, Polite will hold the Criminal...more
The Situation: While investigating a website for criminal activities, federal agents traced Bitcoin transactions and issued a subpoena to a virtual-currency exchange to identify customers of the site. Using that information,...more
ABA Tax Fraud Panel to Discuss IRS CI and Crypto Criminals - The Internal Revenue Service – Criminal Investigation (IRS CI) has made it clear that it is focusing on the abuse of digital currencies to further tax evasion,...more
Organization Excels at Niche Branding but Stumbles in Avoiding Enforcement - The first paragraph of the press release sums it up: Today the U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) took action...more
On November 11, 2018, the IRS released its Criminal Investigation Annual Report as it begins its 2019 fiscal year and its 100th anniversary as a law enforcement agency. IRS-Criminal Investigation (IRS-CI) is a federal agency...more
In October 2017, the Supreme Court granted the Department of Justice’s petition to review the Second Circuit’s decision that limits the reach of warrants issued under the Stored Communications Act (“SCA”). Specifically, the...more
The Connecticut State Police have taken the lead in training police dogs skilled in the art of detecting hidden data. As more and more crimes involve electronic evidence, criminal enforcement agencies throughout the country...more
On June 6, 2016, during a speech at a Cybercrime Symposium co-organized by the Centers for Strategic and International Studies and the Department of Justice’s (“DOJ”) Computer Crime and Intellectual Property Section,...more
We previously reported that alleged Ukranian hacker Sergey Vovnenko, also known as “Flycracker,” “Fly” and “Darklife” was extradited from Italy, arrested and charged in New Jersey federal court for his part in disbursing the...more
We have been reporting on the success of the Department of Justice in combatting cybercrime through prosecutions of hackers. But we never expected this. Following Chinese President Xi’s visit to the U.S., and for the first...more
An anonymous hacker has contacted the New York Post to explain how he was able to hack into the CIA Director’s AOL email account. According to several reports, a high school student and his two friends implemented social...more
The Department of Treasury’s Office of Foreign Asset Control continues to ramp up sanctions enforcement. Even with the likely relaxation of the Iran and Cuba sanctions, OFAC has been continuing its aggressive enforcement...more