The FBI Made a Crypto Coin Just to Catch Fraudsters
Briefly

The ongoing situation surrounding the Internet Archive highlights the precarious balance between digital preservation and the challenges of cybersecurity, legal battles, and external attacks. The site faced a barrage of DDoS attacks alongside a major data breach that compromised 31 million user accounts, temporarily taking archive.org offline. This incident underlines the urgent need for organizations in the digital archiving space to bolster their security measures and prepare for potential threats from both legal and cyber fronts.
In an unexpected turn of events, a judge's ruling allowed the US Treasury to claim 69,000 bitcoins that were seized from the notorious Silk Road marketplace. The investigator involved in the seizure, Tigran Gambaryan, is now in legal turmoil, detained in Nigeria amid calls from Congress for action. With the bitcoins valued at $4.4 billion, their impending auction raises significant questions not just for crypto investors, but also about the implications for law enforcement's crypto recovery methods.
Security researchers have identified a new strain of malware named Perfctl that particularly targets Linux systems, making it more challenging to detect. It employs sophisticated techniques to blend in with legitimate system files and avoid scrutiny from administrative tools. The widespread vulnerability of millions of Linux devices makes it imperative for users and system administrators to remain vigilant against such hidden threats, underscoring the evolving landscape of cybersecurity risks and the need for enhanced protective measures.
This week's analysis of Google's decision to postpone phasing out third-party tracking cookies in Chrome indicates significant ramifications for user privacy. By maintaining support for these cookies, Google continues to facilitate tracking across different websites, potentially hindering efforts to enhance online privacy standards. Understanding the long-term impact of this move is essential for users and privacy advocates, as it directly affects the landscape of data collection practices and the overall internet ecosystem.
Read at WIRED
[
|
]