- Cryptocurrencies
- Cyber Investigation
- Software
- Private Data / PII / Information
- Operating Systems (OSes)
- Tor
- Users Affected
- Networked Devices
- Ransom / Blackmail
- Cryptography
- Bitcoin
- Computer Hardware
- Ransomware
- Local Area Network (LAN)
- Legal
- Cyber Attacks