Feeds

Veteran UK fraud fighter 'BobBear' retires

Pipe and slippers for celebrated anti-phishing crusader

Seven Steps to Software Security

Veteran UK-based fraud fighter Bob Harrison, who runs phish victim support website BobBear, has announced plans to retire at the end of April.

BobBear has greatly inconvenienced phishing fraudsters over the last four years by publishing details of fake corporations and scams. He also took on the unfashionable job of providing victim support and advice on his site to those duped into working as phishing mules. The 66-year-old said he had decided to close the site in order to have more time to enjoy his retirement, as he explained in a message to supporters on Saturday:

This is a very sad day for me - I've decided to retire and close the websites [http://www.bobbear.co.uk and http://www.bobbear.com].

It was a hard and very sad decision as it's been really rewarding for the years I've been doing it and I hope I've helped a few people, but all good things must come to an end, I'm not getting any younger, the website is a hard taskmaster and I'd like to do other things.

I've been really grateful for all your help and support - without it and the help of so many others I could not have carried on so long.

In an interview with Krebs on Security, Harrison explained the project was taking up too much of his time and was beginning to affect his health.

“The wife says I spend about 15 hours a day on it, although it may not be quite that much,” Harrison explained. “Things are quite hard and health isn’t that good, so the time has come.”

Bobbear.com has been the target of several denial of service attacks over the years, likely mounted by the fraudsters Harrison sought to expose. Worse, on two occasions over the last three years fraudulent emails were sent out in the site's name in an attempt to damage its reputation. Harrison told Krebs on Security that attacks have diminished over recent months and his main problem of late has been making sure he doesn't label a legitimate firm as potentially dodgy.

Harrison is hoping someone will come forward with an offer to continue his work. ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.