Technical support scams (TSS) are responsible for a growing amount of financial losses year after year. Nevertheless, while the victims are losing more money than ever, the number of interactions between criminals and victims is decreasing. Why? Because the scammers are getting better at what they do. In this paper, I demonstrate through examples how the TSS practices have become more advanced recently.
Introduction The terms cyberwarfare and cyberterrorism are both used since the 1990s for describing adverse events in cyberspace. Even though the three-decade history of cyberwarfare and cyberterrorism, academic communities could not agree on a widely accepted definition of these terms and draw a clear line between the two types of cyber events.
Researchers claim that the majority of the dark web exist to facilitate criminal activities, including drug trade, financial fraud, and illegal pornography. This article explores the different methods researchers have experimented with to help the identification and deanonimisation of the marketplace vendors of the dark web.
This article explains how a disk image can be taken from a virtual machine running on the public cloud. The acquired disk image can then be used with offline forensic tools like Autopsy and Encase.