![]() On Google Devices like Google Home, simply say “ OK Google, play 89 3 The Current.” With our app, you can stream The Current and our additional streams like Purple Current, Radio Heartland, Local Current and Rock the Cradle.Īpple iOS: Available for download from iTunesĪndroid: Available for download from the Google Play storeįind more details about The Current app. To listen live on your phone, go to and tap on “Listen Live” on the top of the page. The audio will continue to play until you click pause or close the window.įind our on-air schedule here and request a song here. Click on “Listen Live” in the top left-hand corner of our homepage. Want to interview Mike? Please let us know.To listen to our live stream on a desktop computer. He has subsequently developed an international profile in the study of technology and the justice system and has published widely in these areas. Dr McGuire read Philosophy & Scientific method at the London School of Economics where he acquired a first-class BSc Econ and he completed his Ph.D., at Kings College London. Michael McGuire joined the Department as Senior Lecturer in Criminology in September 2012. If you’d like to learn more about protecting email, phishing links, and documents, find out here.ĭr. ![]() With application isolation supported by micro-virtualization, we’re able to protect without detection. From security pros admitting they have paid ransoms and bypassed security protocols to CISOs feeling stuck in the middle between locking down access to prevent breaches to being chastised for throttling innovation. We see that end users are often held accountable as the last line of defense – at the endpoint – and that approach isn’t working. We’ve been reporting on “The Cyber Drug Wars” since early last year, in an attempt to pull together best practices that change the way cybersecurity is used today. ![]() We need a whole new approach to cybersecurity or these figures will continue to increase over time.”Įnding The Cyber Drug Wars – we’re on a mission Protecting applications that access sensitive data is an absolute requirement. Law enforcement, the cybersecurity industry and both the public and private sectors need to be vigilant about disrupting cybercrime. “We need to attack the problem in a different way. It is equally easy for them to wash that money and convert it into cash – and the rise in use of unregulated, virtual currencies is making this even easier. “Today it is easy for hackers to infect machines, steal data, and hold businesses and individuals for ransom or sell stolen IP because enterprise defences are not fit for purpose. “We invested in this research to instigate a meaningful conversation about how to disrupt the economic systems and poor security practices that enable cybercrime around the world frankly because it’s far too easy for them,” commented Gregory Webb, CEO of Bromium. We need to work together to disrupt cybercrime The advice on how to do this is readily available online and explains how cybercriminals can launder proceeds through both in-game currencies and goods.” Explainer: How Money Laundering Really Works. This trend appears to be particularly prevalent in countries like South Korea and China – with South Korean police arresting a gang transferring $38 million laundered in Korean games, back to China. McGuire added, “Gaming currencies and items that can be easily converted and moved across borders offer an attractive prospect to cybercriminals. Just for fun: Watch Sheldon sell the Sword of Azeroth on eBay.ĭr. Games such as Minecraft, FIFA, World of Warcraft, Final Fantasy, Star Wars Online and GTA 5 are among the most popular options because they allow covert interactions with other players that allow trade of currency and goods. Video games generate goods and money that can be bought and sold with dirty money.Ĭybercriminals are spending “considerable time” converting stolen income into video game currency or “virtual goods” that include in-game items like gold, which are then converted into bitcoin or other electronic formats. ![]() Today, in part two, we find out how gaming currency and goods are used to clean dirty money. Mike McGuire, Senior Lecturer in Criminology at Surrey University, England. The full findings will be presented at the RSA Conference in April by Dr. This is just part of the nine-month study we sponsored titled Into the Web of Profit. In April of 2017, we started an independent, academic study into the macro economics of cybercrime and how cybercriminals launder and ‘cash out’ the profits of criminal endeavours. China and South Korea become hotspots for gaming-currency laundering.Minecraft, FIFA, World of Warcraft and more are used for laundering.In-game purchases and currencies are spurring a rise in gaming-related laundering. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |