Saturday, July 10, 2010

Internet Fraud

David Lawrence on MSNBC on internet scams and hackers

Google Cash Scam

Spyware Blockers.

A hacker is someone who knows how to get into your computer from their own computer.
Continue. . .

Intrusion Prevention - Palo Alto

This week the Ponemon Institute released a study of almost 600 IT security professionals who overwhelmingly reported an increase in advanced threats and a lack of proper security mechanisms to deal with them.
Continue. . .

VeriSign Appeal Denied.

The case could potentially end the company’s control of .com and .net domain names.
Continue. . .

How hackers work.

If you have ever had your computer or an account hacked, you will know how invasive this crime can be.
Continue. . .

Wednesday, July 7, 2010

Americans Adopt Chinese Web Habits ?

When it comes to revenue on the U.S. Internet, it has traditionally come from three sources:
Continue. . .

Twitter to Promote Marketers' Special Offers.

Twitter has introduced another advertising service, hoping to generate revenue this time by promoting special offers, events and one-time deals from marketers.
Continue

Sourcefire Awards Sixth Annual Snort Cybersecurity Scholarships.

Sourcefire, Inc. (FIRE 18.42, -0.06, -0.33%) is a world leader in intelligent Cybersecurity solutions. Sourcefire is transforming the way Global 2000 organizations and government agencies manage and minimize network security risks.
Continue

RiskMetrics Group Recommends SonicWALL.

The recommendations of ISS are relied upon by hundreds of major institutional investment firms, mutual funds and other fiduciaries throughout the country.
Continue

Hack Brings Verizon To iPad.

In an effort to improve the iPad's mobile data connection one hacker modded an iPad 3G to work with Verizon's network.
Continue. . .

Your Phone Number Can Be Easily Hacked.

Using “widely available information and existing techniques,” DePetrillo and Bailey reportedly were able to construct detailed files on a cellphone user.
Continue. . .

Houston hacker gets a year's porridge.

A HACKER who broke into his former employer's network has been jailed for a year.
Continue. . .

Monday, July 5, 2010

At least four Armenian websites were attacked by Azerbaijani hackers.

At least four Armenian websites were attacked by Azerbaijani hackers during a week.
Continue. . .

Hacking the Night Away.

The hour approaches midnight on the campus of Carnegie-Mellon University in Pittsburgh, but in Wean Hall, C.M.U.'s computer center, it might as well be high noon.
Continue. . .

Is Wireless Security a Contradiction in Terms ?

Wi-Fi is everywhere. Whether you travel for business or simply need Internet access while out and about, your options are plentiful.
Continue. . .

Steganography. What ?

Steganography disguises the messages as something else, so the interceptor doesn’t even know there’s a message buried in there.
Continue. . .

3G users vulnerable to hackers.

3G mobile phone users in Viet Nam are vulnerable to attacks by hackers, experts from the Ha Noi-based Bach Khoa Internet Security warn.
Continue. . .

40,000 hackers in China ?

While the Government of India is keen to deliver a number of services to its people by using information and communication technology (ICT) tools, it is highly worried about prevention of data that it would generate from cyber criminals, especially in China.
Continue. . .

U.S. largely ruling out N. Korea in 2009 cyberattacks.

U.S. officials have largely ruled out North Korea as the origin of a computer attack last July that took down U.S. and South Korean government websites, according to cybersecurity experts.
Continue. . .

Sunday, July 4, 2010

Is your college student carelessly invite identity thieves and predators?

In its annual report earlier this year, the Federal Trade Commission announced that the most vulnerable targets of identity theft are 18-29 years old.
Continue. . .

Secure Your iTunes Account.

Some desperate iPhone developer(s) has hacked a lot of accounts of the users located all over the world.
Continue. . .

App Store hacked.

Various blogs are reporting that it appears some iTunes customer accounts have been hacked and that funds from those accounts may have been used to purchase apps in the iTunes App Store.
Continue. . .