Feeds

Veteran UK fraud fighter 'BobBear' retires

Pipe and slippers for celebrated anti-phishing crusader

The Power of One eBook: Top reasons to choose HP BladeSystem

Veteran UK-based fraud fighter Bob Harrison, who runs phish victim support website BobBear, has announced plans to retire at the end of April.

BobBear has greatly inconvenienced phishing fraudsters over the last four years by publishing details of fake corporations and scams. He also took on the unfashionable job of providing victim support and advice on his site to those duped into working as phishing mules. The 66-year-old said he had decided to close the site in order to have more time to enjoy his retirement, as he explained in a message to supporters on Saturday:

This is a very sad day for me - I've decided to retire and close the websites [http://www.bobbear.co.uk and http://www.bobbear.com].

It was a hard and very sad decision as it's been really rewarding for the years I've been doing it and I hope I've helped a few people, but all good things must come to an end, I'm not getting any younger, the website is a hard taskmaster and I'd like to do other things.

I've been really grateful for all your help and support - without it and the help of so many others I could not have carried on so long.

In an interview with Krebs on Security, Harrison explained the project was taking up too much of his time and was beginning to affect his health.

“The wife says I spend about 15 hours a day on it, although it may not be quite that much,” Harrison explained. “Things are quite hard and health isn’t that good, so the time has come.”

Bobbear.com has been the target of several denial of service attacks over the years, likely mounted by the fraudsters Harrison sought to expose. Worse, on two occasions over the last three years fraudulent emails were sent out in the site's name in an attempt to damage its reputation. Harrison told Krebs on Security that attacks have diminished over recent months and his main problem of late has been making sure he doesn't label a legitimate firm as potentially dodgy.

Harrison is hoping someone will come forward with an offer to continue his work. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.