Thursday, January 5, 2012

FBI Contacted Phone Monitoring Firm About Software.

WASHINGTON (AP) — A senior executive at a technology company that makes monitoring software secretly installed on 141 million cellphones said Thursday that the FBI approached the company about using its technology but was rebuffed.

Continue reading ...
Carrier IQ ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Wednesday, January 4, 2012

An 'explosive' year in security.

As we turn the page to 2012, it makes sense to sit back and take a look at what happened during the past twelve months in the IT Security world. If we were to summarize the year in one word, I think it would probably be “explosive.”

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Saudi Hackers Post Israeli Credit Card Numbers Online.

The hackers said they broke into one of Israel's top sports Web sites, One.co.il, and redirected visitors to a site where they could download a file containing the personal information of 400,000 Israelis.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Hackers Launching Satellite to Evade Internet Censorship.

During the Chaos Communication Congress in Berlin back in August -- an annual hacker conference sponsored by the German Chaos Computer Club -- a team of German hackers revealed plans to launch their own communication satellites into space in order to create a separate, "uncensorable" network called the Hackerspace Global Grid (HGG).

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Tuesday, December 27, 2011

DIY security testing.

Penetration testing has been hailed as an effective way to keep the wolves from your corporate door, but often it is considered too hard or too expensive. While many organisations hire external pen testers to probe their networks, there are some tests that can be run in-house.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Keeping children safe on their new internet technology.

In a poll of over 19,000 parents and children conducted by security firm Norton, 7% of UK parents said they had absolutely no idea what their kids were up to on their computers and phones.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Monday, December 26, 2011

Smart Grid Security Threatened By Fragmented Control.

Cybersecurity wasn't the only IT fix the MIT study recommended to bolster the power grid in the future. The researchers also suggested that the energy industry do more R&D into using IT for bulk power system operations and planning for power transmission over wide geographic areas.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Most Cellular Networks Worldwide Vulnerable to Attack.

A German security researcher this week is detailing a manner in which the leading cellular networks worldwide are all vulnerable to attack.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

The 10 biggest tech stories of 2011.

Very influential tech pioneers died; cyber-security cost companies billions of dollars; and trends in electronics and on the Web provided new tools and created new challenges.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Congress Wants To Ban The Taliban From Twitter.

The Chair of the Senate Homeland Security Committee, Jow Lieberman, has called upon Twitter to block accounts being used for "Taliban propaganda." Apparently, the Taliban has taken to the social network as a means of quickly promoting its attacks, particularly in Afghanistan. The tweets in question range from detailed play-by-plays of terrorist attacks to almost completely fabricated reports and death tolls.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Sunday, December 25, 2011

Fraudulent Emails Appearing to Come from NACHA.

NACHA provides this resource area to educate consumers, businesses, financial institutions, and other parties about ways that they can protect themselves from the sustained and evolving phishing attacks in which individuals and organizations in the U.S. and other nations are receiving emails that fraudulently claim to come from NACHA regarding ACH payment transactions.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Danbury, Connecticut - Decades later, a Cold War secret is revealed.

"Big Bird" and it was considered the most successful space spy satellite program of the Cold War era. From 1971 to 1986 a total of 20 satellites were launched, each containing 60 miles of film and sophisticated cameras that orbited the earth snapping vast, panoramic photographs of the Soviet Union, China and other potential foes.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Hackers attack US security think-tank Stratfor, promise more targets for Christmas

LONDON - Hackers on Sunday claimed to have stolen a raft of emails and credit card data from U.S.-based security think-tank Stratfor, promising it was just the start of a weeklong Christmas-inspired assault on a long list of targets.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Saturday, December 24, 2011

CIA has suspended drone attacks in Pakistan.

The undeclared halt in CIA attacks in Pakistan, now in its sixth week, aims at reversing a sharp erosion in trust after deadly incidents, including the mistaken attack on soldiers by U.S. gunships.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

AT&T Hackers Have Terrorism Ties, Police Say.

FBI aids in arrests in Philippines of four men who allegedly hacked into AT&T customers' PBXs to generate revenue for Saudi-based militant group.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Stolen Credit Cards Go for $3.50 at Amazon-Like Online Bazaar

Symantec Corp. (SYMC), the cybersecurity firm, estimates that cyberthieves steal data worth $114 billion a year. By comparison, the Federal Bureau of Investigation said the take from all bank robberies in the U.S. in 2010 was just $43 million. The global market in cocaine is an estimated $85 billion, according to the United Nations.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Feds untangle $20 million scheme in DFW against telecom companies.

For years, a dozen or more conspirators ran a scheme in North Texas to rip off some of the nation's telecommunication giants. In the end, the $20 million cybercrime spree crumbled because of evidence painstakingly gathered from businesses and seized from the homes of conspirators.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Reston bank helps tackle cyber fraud.

Online hackers cost victims $400 billion each year, FBI says

“We see about 60,000 attempted online attacks or ‘pings’ in a typical month,” said bank CEO John R. Maxwell. “Bank robbers don’t always come through the front door. ... We take cybersecurity very, very seriously.”

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Consumers will lose $10M to cyber crime this holiday season.

Over $10 million will be intercepted by cyber criminals this holiday season, as consumers turn toward the Internet for their presents.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Army Piles on Evidence in Final Arguments in WikiLeaks Hearing.

FT. MEADE, Maryland – The government finished making its case against accused WikiLeaks source Bradley Manning Thursday morning with a 60-minute closing statement that piled on new details and exhibits, including snippets of 15 pages of chats allegedly between the Army intelligence analyst and WikiLeaks founder Julian Assange.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Avoiding Christmas cybercrime.

Only use reputable websites, avoid unsecure connections and use a special credit card.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Cyber Crime And Identity Theft Facts.

There are lots of methods that you may have your identification stolen, and also many causes that people want to steal your identity. In most cases, theft of your identity is to really setup a brand new identification with the identical information, only a special deal with in another metropolis or even one other state.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

“eCrime unit” to fight cyber-crime in the Golden State.

Attorney General Kamala D. Harris unveiled a new statewide cyber-crime unit in Silicon Valley on Tuesday aimed at investigating and prosecuting such misdeeds as the ATM-skimming scheme that recently fleeced more than 500 Lucky supermarket customers.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Chinese gaming sites hacked: Millions of users affected.

It was reported yesterday that CDSN — an IT portal and community — had been hacked, and data including the username and passwords combinations for over six millions user accounts had been stolen.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Friday, December 23, 2011

School district investigates Internet security breach.

The breach was discovered last weekend, according to a release send out by school officials on Wednesday. The district Internet technology (IT) department is working with school administration to determine if any data was breached during the incident.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Siemens fixing cyber bugs in industrial control systems.

Siemens (SIEGn.DE) said it is working to fix security flaws in industrial controls products that the U.S. government warned could make public utilities, hospitals and other critical parts of the country's infrastructure vulnerable to attack by hackers.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Ex-Dow Agro scientist set to be sentenced in espionage case.

China targeting private businesses as part of their spy strategies.

Federal prosecutors are recommending that a former Dow AgroSciences researcher be sentenced to more than seven years in prison for sending trade secrets worth millions to China and Germany.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Wikileaks: Bradley Manning revealed cyber-espionage danger to US.

Among its accusations against Bradley, the US government says he walked out of a US military base in Iraq with a compact disc labeled "Lady Gaga" that actually held more than 251,000 secret State Department diplomatic cables.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Cyber Alerts for Parents & Kids.

Tip #1: Be Prudent When Posting Images Online

You might unwittingly be letting others know where you live and work and your travel patterns and habits. These details can be revealed through bits of information embedded in images taken with smartphones and some digital cameras and then shared on public websites.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

HP, No Record Of Printers Set Ablaze By Hackers.

This morning, HP announced that the firmware update is now available and said it has still not received any customer reports of unauthorized access.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Thursday, December 22, 2011

Romance scams heat up for the holidays.

Here's how it works. You meet someone in a forum or a dating site. They're friendly, interesting and, most important, interested in you. Conversation - whether in emails, instant messages or phone calls - will continue for weeks, or even months, until a deep enough trust is built to start angling for money.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Don’t lend data cards.

In recent cases of cyber crimes, the police found that the accused were using the data cards of friends to post obscene photos and abusive messages on blogs and social networking sites including facebook, twitter etc.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Social networks: pressure or routine control?

Russian secret police had demanded that his site ban online opposition groups supporting post-election protests, as well as vocal anti-corruption blogger Alexei Navalny - who had been arrested before during the protests near the Chistye Prudy metro station

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Top 5 Targets For Internet Criminals In 2012.

Over the last few years it has become apparent that the range of handheld devices and services designed to bring convenience and flexibility to our everyday lives can also yield opportunities for malicious users to intercept data, potentially resulting in identity theft, fraud and access to sensitive information.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

FBI, Bulgarian Officials Jointly Foil Sophisticated Cyber-crime Group.

The FBI of USA jointly with the Bulgarian GDBOP's (Division for Combating Organized Crime's) 'Computer Crimes Department' recently terminated a global cyber-crime operation, published softpedia.com dated December 10, 2011.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Is Your Kid Safe Being Social in Cyberspace?

Police believe a 21-year old Nebraska man hooked up with a 13-year old Wisconsin girl online before the two were found in a motel near Lake Geneva, Wisconsin.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

UAE internet pirate faced with US$962,400 bill.

An OSN subscriber who helped millions of computer users illegally download the Middle East pay-TV platform’s high definition content has confessed to internet piracy following questioning by Abu Dhabi police this week.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Cyber crime cases on the rise this year.

KATHMANDU: With the number of people having access to the internet and mobile phones increasing by the day, police have recorded a rise in the number of cases where individuals have used technology to harass and blackmail others.


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Posting Videos Online Can Make You a Terrorist.

Tarek Mehanna, the Boston native who was accused of material support for terrorism based on what prosecutors said was his online advocacy on behalf of al Qaeda, was found guilty on all counts Monday.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Spies Try to Escape Spyware at ‘Wiretapper’s Ball’.

As he tries to detect hacker threats lurking in the wireless networks, the man who helps manage a Southeast Asian country’s Internet security says there’s reason for paranoia. The wares on offer include products that secretly access your Web cam, turn your cell phone into a location-tracking device, recognize your voice, mine your e-mail for anti-government sentiment and listen to supposedly secure Skype calls.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

News Corp. Must Pay Phone-Hacker’s Legal Fees.

Mulcaire, I was only following orders.

Mulcaire “always said he was acting on the instruction” of the company “and he clearly needs legal representation to deal with the numerous cases,” his lawyer, Sarah Webb, said in an e-mailed statement. The ruling will probably result in News Corp.’s News International unit paying another 750,000 pounds ($1.2 million) in legal fees, she said.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

A Fresh Perspective on Internet Security.

Herley says, we rely too much on password strength. We are encouraged to use “strong” passwords that go beyond the name of a pet or “12345”—and to change them regularly.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Lebanese FM Hails Iran's "Valuable" Positions on Syria

Mansour felicitated Iran for its successes in different fields, and expressed surprise at Tehran's superiority in cyber war over the US which resulted in the capture of a hi-tech US stealth drone through a cyber attack.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Helmbrecht sees new e-ID cards for increased Internet security.

Introduced by Germany’s government in October 2011, the new electronic ID card can be used on the Internet as proof of identity, and features functions that enable it to operate as an electronic document, providing extremely high levels of security.”

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

FBI Warns Hacktivists: You're Breaking the Law.

The July raid appeared to be the largest public indication that the FBI was finally making headway in its investigation of hacktivist activity during a year when groups including Anonymous and LulzSec made a mockery of public- and private-sector computer systems.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Wednesday, December 21, 2011

China hackers breached U.S. Chamber of Commerce.

Hackers in China broke through the computer defenses of the U.S. Chamber of Commerce last year and were able to access information about its operations and its 3 million members, the Wall Street Journal reported on Wednesday.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Cyber attacks reshape secure computing, says LynuxWorks v-p.

Malware has become very sophisticated in its entry, infection and damage mechanisms – and 2011 saw a dramatic increase in attacks. In the UK, the information commissioner reported that data security breaches were up 58% in 2011/12 so far (Note 1). High profile cases around the world included HBGary and Sony PSN.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Greatest Security Risks to a Wide Area Network.

Firewall program adds a level of protection, which is not provided by antivirus protection alone. Filtering network packets determine whether to send them along with their destination.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

How hackers gave Subway a $30 million lesson in point-of-sale security.

For thousands of customers of Subway restaurants around the US over the past few years, paying for their $5 footlong sub was a ticket to having their credit card data stolen. In a scheme dating back at least to 2008, a band of Romanian hackers is alleged to have stolen payment card data from the point-of-sale (POS) systems of hundreds of small businesses, including more than 150 Subway restaurant franchises and at least 50 other small retailers.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

RIAA and Homeland Security the latest organizations accused of illegal downloading.

More revelations are coming to light about who is illegally downloaded pirated content via the website YouHaveDownloaded, and this time it appears to be RIAA employees.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure