Get a Pentest and security assessment of your IT network.

News

Anatomy of Cybercriminal Communications: Why do crooks prefer Skype

Security firm Flashpoint published an interesting paper titled, Cybercrime Economy: An Analysis of Cybercriminal Communication Strategies about cybercriminal communications of threat actors. Cybercriminal Communications use a variety of software alongside with the access to communities in the deep and dark web. This is done in order to carry out cross domain organization for crimes like phishing, credit card fraud, spam, and every sort of attack that pass through the corporations filters and defenses. The most used programs by cybercriminals are ICQ, Skype, Jaber, Pretty Good Privacy, Pidgin, PSI and AOL Instant Messenger (AIM)”]

Source: http://securityaffairs.co/wordpress/58194/cyber-crime/anatomy-cybercriminal-communications.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Thousands of Magento websites compromised to serve malware

News

Facebook Bug #4: Password Reset Vulnerability Found in www.facebook.com