Skip to main content

Questions tagged [crime]

Questions relating criminal activity, performed (or aided) with the usage of a computer system. Also occasionally used for the CRIME TLS vulnerability.

Filter by
Sorted by
Tagged with
21 votes
9 answers
4k views

I am writing a book, and in it, a character has hacked an employee database. They want to do two things: read and write. They want to see all the employees, but they also want to insert a new employee ...
user110391's user avatar
2 votes
0 answers
121 views

I’m looking to have my murderer use tech as her alibi, without hacking any major systems or turning her phone off The murder (at the moment) is happening in a city - so there’ll be CCTV, dash cams, ...
Katherine Palmano's user avatar
0 votes
1 answer
214 views

I am not an information security expert (just a developer) and recently discovered this kind of vulnerability, and have a few questions (so sorry if I misinterpreted something about how the attack ...
Skary's user avatar
  • 103
0 votes
1 answer
484 views

I have been reading on CRIME and BREACH attacks and I want to learn better how to protect against them. From what I understood, those attacks require TLS encryption over HTTP compression and HTTP ...
Alexandre's user avatar
  • 101
3 votes
2 answers
438 views

I lent my old laptop to a person who was in need of it in order to work abroad during autumn. Recently though, I learnt from a trusted source that his father had faced trouble with the police in the ...
Argenteuil's user avatar
0 votes
0 answers
291 views

If authorities find access logs or some other linking between an IP address and the access of illegal materials online, in order to trace down who the owner of the IP address is any IP assignment logs ...
walstack's user avatar
  • 101
2 votes
1 answer
386 views

Is there a standard procedure when it comes to preserving evidence of a crime committed on a website of a third party? Let's assume that a crime was committed on a website I visit, like defamation. ...
Lili's user avatar
  • 43
52 votes
7 answers
11k views

Cloud computing provider Blackbaud reported on https://www.blackbaud.com/securityincident "...the cybercriminal removed a copy of a subset of data from our self-hosted environment. ... we paid ...
Gnubie's user avatar
  • 573
2 votes
3 answers
2k views

Last year (2018) I was accused of torrenting Files whilst in my residence in Germany. I have never torrented any file ever. One thing that stands out is that during the same day CyberGhost (the VPN [...
Martin's user avatar
  • 29
0 votes
2 answers
959 views

I found a website which is not secure and tried to post a form on that site using cURL request in PHP and it worked successfully. However, that is a simple site with contact form and no special or ...
Vinit Singh's user avatar
1 vote
1 answer
1k views

It got me thinking recently. Wouldn't a fake/incorrect address be enough to deter investigating/finding a criminal via cyberspace? The reason we know it's so easy to find someone is because they give ...
Not Trolling's user avatar
3 votes
2 answers
812 views

Currently, we know few compression attacks on the SSL/TLS protocol (such as Crime or Breach). I wonder for few days if these attacks are practicable on a mail server (smtp). Is CRIME attack ...
Arthur's user avatar
  • 33
-1 votes
1 answer
177 views

Especially in light of the recent KRACK problem. Wifi has been compromised before; and undoubtedly it will again. So I have to wonder, why don't criminal organizations travel around major cities, ...
Benubird's user avatar
  • 316
1 vote
1 answer
552 views

If you scrape Pastebin for research or even just out of curiosity, it quickly becomes apparent that there is an abundance of compromised data that is uploaded there by unknown malicious actors. My ...
Boblicon's user avatar
  • 121
-1 votes
1 answer
193 views

Disclaimer: I am pretty noob on this issue. I made my research but could not find satisfying information. The question is pretty straightforward but I still want to elaborate a little bit more: ...
Ekrem Doğan's user avatar

15 30 50 per page