Categories

  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
  • Contact
  • Home
  • Contact
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
#1 Source for Cyber Security News, Reports and Threat Intelligence
Categories
  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
  • Cyber Security Videos
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
Home /
Cyber Security /
FBI created a cryptocurrency so it could watch it being abused

FBI created a cryptocurrency so it could watch it being abused

Oct 11, 2024 08:00 am Cyber Security 201

It worked – alleged pump and dump schemers arrested in UK, US and Portugal this week

The FBI created its own cryptocurrency so it could watch suspected fraudsters use it – an idea that worked so well it produced arrests in three countries.…



Support the originator by clicking the read the rest link below.
created cryptocurrency could watch being abused
  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Pinterest
  • VK
  • WhatsApp
Read The Rest from the original source
go.theregister.com
Tiny Drones Do Distributed Mapping
Prev
Tiny Drones Do Distributed Mapping
AI deepfake tool on ‘new level’ at bypassing crypto exchange KYC: Report
Next
AI deepfake tool on ‘new level’ at bypassing...

Related News

  • Bitcoin Setting Up For ‘Large Move’ Amid $103,000 Retest – Key Levels To Watch
    Bitcoin Setting Up For ‘Large Move’ Amid...
  • Top 5 AI SOC Analyst Platforms to Watch out for in 2025
    Top 5 AI SOC Analyst Platforms to Watch out for...
  • The Best VPNs for Cryptocurrency Trading and Buying Bitcoin in 2025
    The Best VPNs for Cryptocurrency Trading and...
  • Ed Williams created the red team tool RedSnarf!
    Ed Williams created the red team tool RedSnarf!
  • 20 Top-Level Domain Names Abused by Hackers in Phishing Attacks
    20 Top-Level Domain Names Abused by Hackers in...
  • Open Source Watch Movement Really Ticks All the Boxes
    Open Source Watch Movement Really Ticks All the...
  • The best Apple Watch Ultra bands of 2025: Expert tested
    The best Apple Watch Ultra bands of 2025:...
  • Bitcoin price levels to watch as ‘bear flag’ breakdown targets $97K
    Bitcoin price levels to watch as ‘bear flag’...
  • Firebase, Google Apps Script Abused in Fresh Phishing Campaigns
    Firebase, Google Apps Script Abused in Fresh...
  • These headphones transformed how I watch movies and TV at home - and they're at their lowest price ever
    These headphones transformed how I watch movies...
1 Qilin Offers
Qilin Offers "Call a lawyer" Button For Affiliates Attempting To Extort Ransoms From Victims Who Won't Pay
How to use the viral AutoMix feature on iOS 26 (and which iPhone models support it)
2 How to use the viral AutoMix feature on iOS 26 (and which...
North Korea targets crypto workers with new info-stealing malware
3 North Korea targets crypto workers with new info-stealing...
Anubis Ransomware Lists Disneyland Paris as New Victim
4 Anubis Ransomware Lists Disneyland Paris as New Victim
New Mocha Manakin Malware Deploys NodeInitRAT via Clickfix Attack
5 New Mocha Manakin Malware Deploys NodeInitRAT via...

Newsletter

Be in Touch


Current News Sources: 60

Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!

If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.

  • Incident Response Tool List
  • Blue Team Tool List
  • Privacy Policy
All Rights Reserved #1 Source for Cyber Security News, Reports and Threat Intelligence
Powered By The Internet!!!!