Monthly Archives: February 2015

Crime Terrorism News February 26, 2015

Putin is Operating a Counterfeit, Propoganda TV Station in Ukraine BBC Ukraine reports that Ukrainian television broadcasts have disappeared from viewer screens in the self-proclaimed People’s Republic…

Posted in Computer Crime and Malware | Tagged | Comments Off

Crime Terrorism News February 23, 2015

Ukraine remains most corrupt country in Europe – Transparency International Ukraine has received only one additional point in the new Corruption Perception Index (CPI) 2014 by Transparency International, in comparison with… Ukraine to get modern counterfire radars in early 2015 … Continue reading

Posted in Computer Crime and Malware | Tagged | Comments Off

Crime Terrorism News February 16, 2015

Video purports to show ISIS militants beheading Christian hostages A video released on Sunday by militants in Libya claiming loyalty to the Islamic State terror group purports to show the mass beheading of Coptic Christian hostages. The video, which appeared … Continue reading

Posted in Computer Crime and Malware | Tagged | Comments Off

Crime Terrorism News February 12, 2015

Rights activists seek changes in draft cybercrime bill KARACHI: With the Prevention of Electronic Crimes Bill 2015, which will be tabled in parliament soon, rights activists have stepped up efforts to… Senators From Both Parties Back ACLU, New York Times … Continue reading

Posted in Computer Crime and Malware | Tagged | Comments Off

Crime Terrorism News February 5, 2015

Former Los Alamos Lab Workers Sentenced The case of a scientist and his wife who sold some of our nation’s nuclear secrets.

Posted in Computer Crime and Malware | Tagged | Comments Off

Crime Terrorism News February 3, 2015

Jordan pilot hostage Moaz al-Kasasbeh reportedly ‘burned alive’ A video published online by Islamic State (IS) militants claims to show Jordanian pilot Moaz al-Kasasbeh being burned alive. The video, which could not immediately be verified, showed a man standing in … Continue reading

Posted in Computer Crime and Malware | Tagged | Comments Off