Filters








35 Hits in 8.6 sec

Deviating From the Cybercriminal Script: Exploring Tools of Anonymity (Mis)Used by Carders on Cryptomarkets

Gert Jan van Hardeveld, Craig Webber, Kieron O'Hara
2017 American Behavioral Scientist  
This work presents an overview of some of the tools that cybercriminals employ in order to trade securely.  ...  Finally, we conclude that finding pitfalls in the usage of tools by cybercriminals has the potential to increase the efficiency of disruption, interception and prevention approaches.  ...  Also, we are grateful to TNO for providing access to their tool, the 'Dark Web Monitor', which has helped in collecting data which would otherwise not have been accessible to us.  ... 
doi:10.1177/0002764217734271 fatcat:htckhkq5ivax3lhetjeoma72me

Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime [article]

Colin C. Ife, Toby Davies, Steven J. Murdoch, Gianluca Stringhini
2019 arXiv   pre-print
To this end, we provide an overview of the research from environmental criminology and how it has been applied to cybercrime.  ...  We discuss this as a potential research direction, taking into account both fields of research, in the hope of broadening interdisciplinary efforts in cybercrime research  ...  Ife is supported by the Dawes Centre for Future Crimes, and EPSRC under grant EP/M507970/1. Steven J. Murdoch is supported by The Royal Society under grant UF160505.  ... 
arXiv:1910.06380v1 fatcat:3eeuyriojnc63oimf4ka5u5krq

Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context

R.V. Gundur, Michael Levi, Volkan Topalli, Marie Ouellet, Maria Stolyarova, Lennon Yao-Chung Chang, Diego Domínguez Mejía
2021 CrimRxiv  
Acknowledgements This work was supported by the UK Home Office through a National Cyber Security Programme research grant. Research assistance was provided by Tessa Cole and David Flint.  ...  On the dark web, 20% of all malware offers in 2017 were for cryptojacking (Positive Technologies 2018b).  ...  to take full advantage of cryptocurrencies, blockchain technology, dark web exchanges, IoT, and unsanctioned payments systems.  ... 
doi:10.21428/cb6ab371.5f335e6f fatcat:vmrt7shntreqbg2z5mgysr5anq

A Cryptocurrency Spectrum Short Analysis

Mircea Constantin Șcheau, Simona Liliana Crăciunescu, Iulia Brici, Monica Violeta Achim
2020 Journal of Risk and Financial Management  
The implementation of blockchain technologies that bring cryptocurrencies into the economy and everyday life also induce risks.  ...  This paper attempts to dive deeper into the worldwide operations, related to cryptocurrencies, as part of a general phenomenon, and also expose some of the intersections with cybercrime.  ...  Conflicts of Interest: The authors declare no conflicts of interest.  ... 
doi:10.3390/jrfm13080184 fatcat:iex6n3cetrcxzkqc4hsbxzrl6a

Cybercrime and You: How Criminals Attack and the Human Factors That They Seek to Exploit [article]

Jason R. C. Nurse
2018 arXiv   pre-print
This chapter engages in a comprehensive and topical analysis of the cybercrimes that target individuals.  ...  It also examines the motivation of criminals that perpetrate such attacks and the key human factors and psychological aspects that help to make cybercriminals successful.  ...  The Dark Web is particularly relevant here as it is one of the most well-known places where identity data and banking details can be found and traded by cybercriminals.  ... 
arXiv:1811.06624v1 fatcat:es3xtkax4zanrd5mkfkmr7txa4

Cryptocurrency
Kripto valute

Monia Milutinović
2018 Ekonomika  
In this way, the security of the transaction is confirmed. This paper will address the theme of the cryptocurrency and their role in economic growth.  ...  Types of Cryptocurrencies will also be shown as well as their expansion in countries in transition. Among other things, we will see the market of the currency in Serbia and Switzerland.  ...  Dark Web represents a section on the web that you can not access to using your search engine. We only have access to web surface, which is not even a half of what internet exists of.  ... 
doi:10.5937/ekonomika1801105m fatcat:fj2xoisdrneydfrgrsdpurzngq

A systematic literature review of blockchain cyber security

Paul J. Taylor, Tooska Dargahi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo
2019 Digital Communications and Networks  
This timely systematic review also sheds light on future directions of research, education and practices in the blockchain and cyber security space, such as security of blockchain in IoT, security of blockchain  ...  A B S T R A C T Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer  ...  Choo is funded by the Cloud Technology Endowed Professorship.  ... 
doi:10.1016/j.dcan.2019.01.005 fatcat:rsto5tqjhraipe2kxzv6ezlmiq

Online Child Sexual Exploitation: A New MIS Challenge

Dionysios Demetis, Centre for Systems Studies, University of Hull, UK, Jan Kietzmann, Gustavson School of Business, University of Victoria, Canada
2021 Journal of the AIS  
Through the use of secondary and publicly available data from the Federal Bureau of Investigation, as well as primary data from a cybercrime police unit in the United Kingdom, this study takes a grounded  ...  In informing the construction of the model, the paper extracts, organizes, and generalizes the affordances of technology and discusses the role of information systems in detecting online CSE.  ...  A dark-web based study could yield significant insights. What is the role of cryptocurrencies like Bitcoin in facilitating transactions for underground markets?  ... 
doi:10.17705/1jais.00652 fatcat:fqlpacxbvzb2bit7vxvvv3bmxi

Use Cases Definition and Pilot Overview Document v2

Manso Marco
2020 Zenodo  
In particular, this document provides an overview and the main outcomes of the work performed by the SPHINX Consortium on the SPHINX use cases, as part of Task 2.4 – Reference Scenarios and Pilot Operations  ...  relevant to enable the evaluation of the SPHINX's impact in cybersecurity systems and healthcare organisations.  ...  the web interface of the PACS server to view the images from investigation.  ... 
doi:10.5281/zenodo.4427729 fatcat:3x3cline5vehji5sbwx4nvjzra

Use Cases Definition and Pilot Overview Document v3

Marco Manso
2021 Zenodo  
In particular, this document provides an overview and the main outcomes of the work performed by the SPHINX Consortium on the SPHINX use cases, as part of Task 2.4 – Reference Scenarios and Pilot Operations  ...  Overall, the SPHINX use cases are intended to highlight the greatest possible breadth of the SPHINX's capabilities, whilst remaining realistic and testable in realistic conditions.  ...  the web interface of the PACS server to view the images from investigation.  ... 
doi:10.5281/zenodo.5052727 fatcat:5ikl6umlafftroplmkbspcbmse

A Systematic Literature Review on the Cyber Security

Dr.Yusuf Perwej, Syed Qamar Abbas, Jai Pratap Dixit, Dr. Nikhat Akhtar, Anurag Kumar Jaiswal
2021 International Journal of Scientific Research and Management  
In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world.  ...  Online criminality, on the other hand, has risen in tandem with the growth of Internet activity.  ...  This data bounty could then be sold by the attacker on the dark web.  ... 
doi:10.18535/ijsrm/v9i12.ec04 fatcat:bxrsidjhpngdxgllk5cpomoyxa

Current security threats in the national and international context

Lavinia Mihaela Cristea, Bucharest University of Economic Studies, Romania
2020 Contabilitate şi Informatică de Gestiune  
Idea: This paper intends to underline the great exposure of financial and non-financial information in the new cybersecurity context, indicated by IT impact on security threats and cyberattacks.  ...  Data: The author traced the analysis of the most frequent cyber threats, over a period of six years (2013-2018), based on 20 security reports.  ...  The author benefited of the recommendations of the participants and incorporates the feedbacks of the specialists and suggestions from active debates that took part at the conference.  ... 
doi:10.24818/jamis.2020.02007 fatcat:4tfeapf4bfdyzjl3mdedxyah7e

Advanced Cyber Security threats digest and analysis

Evangelos Markakis
2019 Zenodo  
Additionally, the document provides a thorough and comprehensive taxonomy of cyber-threats and the existing research concerning cybersecurity in the Healthcare domain.  ...  The content of this document will be utilised as an input for tasks T2.4 and T2.5 for formulating or refining the project's use cases and application scenarios, thus providing sufficient information to  ...  The credit card details were sold in the dark web for $10 a card.  ... 
doi:10.5281/zenodo.3521666 fatcat:koiwtjej3fgmnkgj643xuruak4

Internet organised crime threat assessment (IOCTA) 2020 [article]

(:Unkn) Unknown, Universitaet Tuebingen, Europol, European Union Agency For Law Enforcement Cooperation
2021
Investigating carding on the dark web During the Carding Action Week at the end of 2018, the Hungarian police launched an investigation into a vendor who was active on various markets offering card details  ...  Cryptocurrency as an investigation opportunity Cryptocurrency investigations have become an essential tool for many cybercrime investigators.  ... 
doi:10.15496/publikation-58501 fatcat:dreqhqnpkvcsxbjenjtyph2z2m

More Amazon than Mafia: analysing a DDoS stresser service as organised cybercrime

Roberto Musotto, David S. Wall
2020 Trends in Organized Crime  
This paper adds to current knowledge by exploring the development, operation and demise of an online criminal group as a case study.  ...  Finally, we show that the users of the service (mainly offenders) are not only a mixed group of actors, but that it is also possible to discriminate between different levels of seriousness of offending  ...  These are not only tolerated by stresser organisers, but also rarely prevented to the point that the lack of prevention is tantamount to an encouragement of abuse of service.  ... 
doi:10.1007/s12117-020-09397-5 fatcat:c6o3q6t4vnc6bin67ijshjwa5m
« Previous Showing results 1 — 15 out of 35 results