article thumbnail

Two Estonian citizens arrested in $575M cryptocurrency fraud scheme

Security Affairs

“They induced victims to enter into fraudulent equipment rental contracts with the defendants’ cryptocurrency mining service called HashFlare. ” The defendants are accused to have defrauded the victims between December 2013 and August 2019, they operated with other co-conspirators residing in Estonia, Belarus, and Switzerland.

Mining 86
article thumbnail

Breach Exposes Users of Microleaves Proxy Service

Krebs on Security

Launched in 2013, Microleaves is a service that allows customers to route their Internet traffic through PCs in virtually any country or city around the globe. ” Abhishek Gupta is the PR and marketing manager for Microleaves, which he said in the process of being rebranded to “ Shifter.io.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LeakedSource Owner Quit Ashley Madison a Month Before 2015 Hack

Krebs on Security

LeakedSource also tried to pass itself off as a legal, legitimate business that was marketing to security firms and professionals. A GREY MARKET The Impact Team , the hacker group that claimed responsibility for stealing and leaking the AshleyMadison user data, also leaked several years worth of email from then-CEO Noel Biderman. .

Passwords 201
article thumbnail

MY TAKE: Why DDoS weapons will proliferate with the expansion of IoT and the coming of 5G

The Last Watchdog

In March 2013, several impossibly massive waves of nuisance requests – peaking as high as 300 gigabytes per second— swamped Spamhaus , knocking the anti-spam organization off line for extended periods. I had the chance at RSA 2019 to discuss the wider implications with Don Shin, A10 Networks’ senior product marketing manager.

IoT 263
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Mariposa Botnet Author, Darkcode Crime Forum Admin Arrested in Germany

Krebs on Security

In December 2013, a Slovenian court sentenced Škorjanc to four years and ten months in prison for creating the malware that powered the ‘ Mariposa ‘ botnet. The “sellers” page on the Darkode cybercrime forum, circa 2013. 5, 2013, federal investigators visited McCormick at his University of Massachusetts dorm room.

Mining 39
article thumbnail

Selling and utilising personal data in an insolvency situation

Data Protection Report

A purchaser may decide to buy a distressed business, or part of it, as a going concern, with the sole intention of utilising the customer list to market its own products and services. The Privacy and Electronic Communications Regulations 2003 ( PECR ) generally requires an entity sending any marketing to consumers via “electronic mail” (e.g.