Questions tagged [crime]
Questions relating criminal activity, performed (or aided) with the usage of a computer system. Also occasionally used for the CRIME TLS vulnerability.
41 questions
21
votes
9
answers
4k
views
Plausibility of a write-only hack of an employee database [closed]
I am writing a book, and in it, a character has hacked an employee database. They want to do two things: read and write. They want to see all the employees, but they also want to insert a new employee ...
2
votes
0
answers
121
views
How could technology be used to create a false alibi? [closed]
I’m looking to have my murderer use tech as her alibi, without hacking any major systems or turning her phone off The murder (at the moment) is happening in a city - so there’ll be CCTV, dash cams, ...
0
votes
1
answer
214
views
CRIME like attack and locality of randomized data
I am not an information security expert (just a developer) and recently discovered this kind of vulnerability, and have a few questions (so sorry if I misinterpreted something about how the attack ...
0
votes
1
answer
484
views
CRIME and BREACH attacks, HTTP/2 and HTTP/3
I have been reading on CRIME and BREACH attacks and I want to learn better how to protect against them.
From what I understood, those attacks require TLS encryption over HTTP compression and HTTP ...
3
votes
2
answers
438
views
What is the worst thing that can happen to me if I use a laptop that I had lent to a person who might have been involved in shady activities?
I lent my old laptop to a person who was in need of it in order to work abroad during autumn. Recently though, I learnt from a trusted source that his father had faced trouble with the police in the ...
0
votes
0
answers
291
views
Do authorities have a limited amount of time to pursue cyber-crime? [duplicate]
If authorities find access logs or some other linking between an IP address and the access of illegal materials online, in order to trace down who the owner of the IP address is any IP assignment logs ...
2
votes
1
answer
386
views
Preserving crime evidence from a website I do not own
Is there a standard procedure when it comes to preserving evidence of a crime committed on a website of a third party?
Let's assume that a crime was committed on a website I visit, like defamation. ...
52
votes
7
answers
11k
views
How can a company ensure cybercriminals destroy hacked data after payment?
Cloud computing provider Blackbaud reported on https://www.blackbaud.com/securityincident "...the cybercriminal removed a copy of a subset of data from our self-hosted environment. ... we paid ...
2
votes
3
answers
2k
views
Torrented files under my IP address
Last year (2018) I was accused of torrenting Files whilst in my residence in Germany. I have never torrented any file ever. One thing that stands out is that during the same day CyberGhost (the VPN [...
0
votes
2
answers
959
views
Will it be a crime if I post data into someone's website using cURL? [closed]
I found a website which is not secure and tried to post a form on that site using cURL request in PHP and it worked successfully.
However, that is a simple site with contact form and no special or ...
1
vote
1
answer
1k
views
Is a fake address/info to an ISP/service enough to be untraceable in theory?
It got me thinking recently. Wouldn't a fake/incorrect address be enough to deter investigating/finding a criminal via cyberspace? The reason we know it's so easy to find someone is because they give ...
3
votes
2
answers
812
views
SSL/TLS compression attacks on mail servers (smtp)
Currently, we know few compression attacks on the SSL/TLS protocol (such as Crime or Breach). I wonder for few days if these attacks are practicable on a mail server (smtp). Is CRIME attack ...
-1
votes
1
answer
177
views
Why aren't more wifi points compromised? [closed]
Especially in light of the recent KRACK problem. Wifi has been compromised before; and undoubtedly it will again. So I have to wonder, why don't criminal organizations travel around major cities, ...
1
vote
1
answer
552
views
Why is Pastebin still widely used by malicious actors for sensitive data dumps, given that it's public and easily parsable?
If you scrape Pastebin for research or even just out of curiosity, it quickly becomes apparent that there is an abundance of compromised data that is uploaded there by unknown malicious actors.
My ...
-1
votes
1
answer
193
views
What are the potential pitfalls of running a VPN business? [closed]
Disclaimer: I am pretty noob on this issue. I made my research but could not find satisfying information.
The question is pretty straightforward but I still want to elaborate a little bit more:
...