PID Perspectives

Stay in the Know with Our Blog

START READING

Latest Articles

Cybercrime

The Gary McKinnon case

Between 2001 and 2002, a British national gained unauthorized access to 97 U.S. military and NASA computers and other government networks, in search of UFO evidence and other conspiracy theories…

Read More »
Cybercrime

The Equifax Data Breach

The Equifax data breach, discovered in 2017, was one of history’s most devastating identity theft-related cyberattacks. It exposed the personal and financial data of 147 million Americans and thousands of…

Read More »
Computer Forensics

Understanding the MO of cybercriminals

In a previous article, we have seen how cybercrime is, by nature, difficult to define. However, criminologists have successfully categorized different generations of cybercriminals and constantly observe their evolution compared…

Read More »
Computer Forensics

OSs for cybersecurity professionals

If you work in cybersecurity in a technical capacity, you probably operate with a few different operating systems. And while you might immediately think of Kali Linux, there’s much more…

Read More »
Crime analysis

Cybercrime in MMORGPs

MMORPGs can attract millions of users from all over the world. These users spend hours of their lives having fun and socializing on their favourite platforms, customizing their characters, competing,…

Read More »
Cybercrime

The WannaCry Ransomware Attack

The WannaCry ransomware attack was one of history’s most destructive and fast-moving cyberattacks. It highlighted the dangers of unpatched systems, weaponized exploits, and the growing sophistication of ransomware as a…

Read More »
Digital investigations

The Lake City Quiet Pills Enigma

“Lake City Quiet Pills” is a well-known and complex internet mystery originating around 2009. It revolves around a series of cryptic messages found on an image-hosting website, potentially linked to…

Read More »
Crime analysis

How the Internet reshaped criminal activity

The defining characteristic of cybercrime is that the criminal activity rests upon Internet-connected technology. The Internet is, after all, a set of informational protocols enabling computers to communicate with each…

Read More »
Register to access our content

Create Your Account

Focus Topics

Featured Articles

For beginners and non-technical audience
Geek Zone
Life at Negative PID
All topics
Click to access the login or register cheese
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO