Tuesday, December 27, 2011

DIY security testing.

Penetration testing has been hailed as an effective way to keep the wolves from your corporate door, but often it is considered too hard or too expensive. While many organisations hire external pen testers to probe their networks, there are some tests that can be run in-house.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Keeping children safe on their new internet technology.

In a poll of over 19,000 parents and children conducted by security firm Norton, 7% of UK parents said they had absolutely no idea what their kids were up to on their computers and phones.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Monday, December 26, 2011

Smart Grid Security Threatened By Fragmented Control.

Cybersecurity wasn't the only IT fix the MIT study recommended to bolster the power grid in the future. The researchers also suggested that the energy industry do more R&D into using IT for bulk power system operations and planning for power transmission over wide geographic areas.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Most Cellular Networks Worldwide Vulnerable to Attack.

A German security researcher this week is detailing a manner in which the leading cellular networks worldwide are all vulnerable to attack.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

The 10 biggest tech stories of 2011.

Very influential tech pioneers died; cyber-security cost companies billions of dollars; and trends in electronics and on the Web provided new tools and created new challenges.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Congress Wants To Ban The Taliban From Twitter.

The Chair of the Senate Homeland Security Committee, Jow Lieberman, has called upon Twitter to block accounts being used for "Taliban propaganda." Apparently, the Taliban has taken to the social network as a means of quickly promoting its attacks, particularly in Afghanistan. The tweets in question range from detailed play-by-plays of terrorist attacks to almost completely fabricated reports and death tolls.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Sunday, December 25, 2011

Fraudulent Emails Appearing to Come from NACHA.

NACHA provides this resource area to educate consumers, businesses, financial institutions, and other parties about ways that they can protect themselves from the sustained and evolving phishing attacks in which individuals and organizations in the U.S. and other nations are receiving emails that fraudulently claim to come from NACHA regarding ACH payment transactions.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Danbury, Connecticut - Decades later, a Cold War secret is revealed.

"Big Bird" and it was considered the most successful space spy satellite program of the Cold War era. From 1971 to 1986 a total of 20 satellites were launched, each containing 60 miles of film and sophisticated cameras that orbited the earth snapping vast, panoramic photographs of the Soviet Union, China and other potential foes.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Hackers attack US security think-tank Stratfor, promise more targets for Christmas

LONDON - Hackers on Sunday claimed to have stolen a raft of emails and credit card data from U.S.-based security think-tank Stratfor, promising it was just the start of a weeklong Christmas-inspired assault on a long list of targets.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Saturday, December 24, 2011

CIA has suspended drone attacks in Pakistan.

The undeclared halt in CIA attacks in Pakistan, now in its sixth week, aims at reversing a sharp erosion in trust after deadly incidents, including the mistaken attack on soldiers by U.S. gunships.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

AT&T Hackers Have Terrorism Ties, Police Say.

FBI aids in arrests in Philippines of four men who allegedly hacked into AT&T customers' PBXs to generate revenue for Saudi-based militant group.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Stolen Credit Cards Go for $3.50 at Amazon-Like Online Bazaar

Symantec Corp. (SYMC), the cybersecurity firm, estimates that cyberthieves steal data worth $114 billion a year. By comparison, the Federal Bureau of Investigation said the take from all bank robberies in the U.S. in 2010 was just $43 million. The global market in cocaine is an estimated $85 billion, according to the United Nations.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Feds untangle $20 million scheme in DFW against telecom companies.

For years, a dozen or more conspirators ran a scheme in North Texas to rip off some of the nation's telecommunication giants. In the end, the $20 million cybercrime spree crumbled because of evidence painstakingly gathered from businesses and seized from the homes of conspirators.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Reston bank helps tackle cyber fraud.

Online hackers cost victims $400 billion each year, FBI says

“We see about 60,000 attempted online attacks or ‘pings’ in a typical month,” said bank CEO John R. Maxwell. “Bank robbers don’t always come through the front door. ... We take cybersecurity very, very seriously.”

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Consumers will lose $10M to cyber crime this holiday season.

Over $10 million will be intercepted by cyber criminals this holiday season, as consumers turn toward the Internet for their presents.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Army Piles on Evidence in Final Arguments in WikiLeaks Hearing.

FT. MEADE, Maryland – The government finished making its case against accused WikiLeaks source Bradley Manning Thursday morning with a 60-minute closing statement that piled on new details and exhibits, including snippets of 15 pages of chats allegedly between the Army intelligence analyst and WikiLeaks founder Julian Assange.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Avoiding Christmas cybercrime.

Only use reputable websites, avoid unsecure connections and use a special credit card.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Cyber Crime And Identity Theft Facts.

There are lots of methods that you may have your identification stolen, and also many causes that people want to steal your identity. In most cases, theft of your identity is to really setup a brand new identification with the identical information, only a special deal with in another metropolis or even one other state.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

“eCrime unit” to fight cyber-crime in the Golden State.

Attorney General Kamala D. Harris unveiled a new statewide cyber-crime unit in Silicon Valley on Tuesday aimed at investigating and prosecuting such misdeeds as the ATM-skimming scheme that recently fleeced more than 500 Lucky supermarket customers.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Chinese gaming sites hacked: Millions of users affected.

It was reported yesterday that CDSN — an IT portal and community — had been hacked, and data including the username and passwords combinations for over six millions user accounts had been stolen.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Friday, December 23, 2011

School district investigates Internet security breach.

The breach was discovered last weekend, according to a release send out by school officials on Wednesday. The district Internet technology (IT) department is working with school administration to determine if any data was breached during the incident.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Siemens fixing cyber bugs in industrial control systems.

Siemens (SIEGn.DE) said it is working to fix security flaws in industrial controls products that the U.S. government warned could make public utilities, hospitals and other critical parts of the country's infrastructure vulnerable to attack by hackers.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Ex-Dow Agro scientist set to be sentenced in espionage case.

China targeting private businesses as part of their spy strategies.

Federal prosecutors are recommending that a former Dow AgroSciences researcher be sentenced to more than seven years in prison for sending trade secrets worth millions to China and Germany.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Wikileaks: Bradley Manning revealed cyber-espionage danger to US.

Among its accusations against Bradley, the US government says he walked out of a US military base in Iraq with a compact disc labeled "Lady Gaga" that actually held more than 251,000 secret State Department diplomatic cables.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Cyber Alerts for Parents & Kids.

Tip #1: Be Prudent When Posting Images Online

You might unwittingly be letting others know where you live and work and your travel patterns and habits. These details can be revealed through bits of information embedded in images taken with smartphones and some digital cameras and then shared on public websites.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

HP, No Record Of Printers Set Ablaze By Hackers.

This morning, HP announced that the firmware update is now available and said it has still not received any customer reports of unauthorized access.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Thursday, December 22, 2011

Romance scams heat up for the holidays.

Here's how it works. You meet someone in a forum or a dating site. They're friendly, interesting and, most important, interested in you. Conversation - whether in emails, instant messages or phone calls - will continue for weeks, or even months, until a deep enough trust is built to start angling for money.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Don’t lend data cards.

In recent cases of cyber crimes, the police found that the accused were using the data cards of friends to post obscene photos and abusive messages on blogs and social networking sites including facebook, twitter etc.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Social networks: pressure or routine control?

Russian secret police had demanded that his site ban online opposition groups supporting post-election protests, as well as vocal anti-corruption blogger Alexei Navalny - who had been arrested before during the protests near the Chistye Prudy metro station

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Top 5 Targets For Internet Criminals In 2012.

Over the last few years it has become apparent that the range of handheld devices and services designed to bring convenience and flexibility to our everyday lives can also yield opportunities for malicious users to intercept data, potentially resulting in identity theft, fraud and access to sensitive information.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

FBI, Bulgarian Officials Jointly Foil Sophisticated Cyber-crime Group.

The FBI of USA jointly with the Bulgarian GDBOP's (Division for Combating Organized Crime's) 'Computer Crimes Department' recently terminated a global cyber-crime operation, published softpedia.com dated December 10, 2011.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Is Your Kid Safe Being Social in Cyberspace?

Police believe a 21-year old Nebraska man hooked up with a 13-year old Wisconsin girl online before the two were found in a motel near Lake Geneva, Wisconsin.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

UAE internet pirate faced with US$962,400 bill.

An OSN subscriber who helped millions of computer users illegally download the Middle East pay-TV platform’s high definition content has confessed to internet piracy following questioning by Abu Dhabi police this week.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Cyber crime cases on the rise this year.

KATHMANDU: With the number of people having access to the internet and mobile phones increasing by the day, police have recorded a rise in the number of cases where individuals have used technology to harass and blackmail others.


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Posting Videos Online Can Make You a Terrorist.

Tarek Mehanna, the Boston native who was accused of material support for terrorism based on what prosecutors said was his online advocacy on behalf of al Qaeda, was found guilty on all counts Monday.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Spies Try to Escape Spyware at ‘Wiretapper’s Ball’.

As he tries to detect hacker threats lurking in the wireless networks, the man who helps manage a Southeast Asian country’s Internet security says there’s reason for paranoia. The wares on offer include products that secretly access your Web cam, turn your cell phone into a location-tracking device, recognize your voice, mine your e-mail for anti-government sentiment and listen to supposedly secure Skype calls.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

News Corp. Must Pay Phone-Hacker’s Legal Fees.

Mulcaire, I was only following orders.

Mulcaire “always said he was acting on the instruction” of the company “and he clearly needs legal representation to deal with the numerous cases,” his lawyer, Sarah Webb, said in an e-mailed statement. The ruling will probably result in News Corp.’s News International unit paying another 750,000 pounds ($1.2 million) in legal fees, she said.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

A Fresh Perspective on Internet Security.

Herley says, we rely too much on password strength. We are encouraged to use “strong” passwords that go beyond the name of a pet or “12345”—and to change them regularly.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Lebanese FM Hails Iran's "Valuable" Positions on Syria

Mansour felicitated Iran for its successes in different fields, and expressed surprise at Tehran's superiority in cyber war over the US which resulted in the capture of a hi-tech US stealth drone through a cyber attack.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Helmbrecht sees new e-ID cards for increased Internet security.

Introduced by Germany’s government in October 2011, the new electronic ID card can be used on the Internet as proof of identity, and features functions that enable it to operate as an electronic document, providing extremely high levels of security.”

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

FBI Warns Hacktivists: You're Breaking the Law.

The July raid appeared to be the largest public indication that the FBI was finally making headway in its investigation of hacktivist activity during a year when groups including Anonymous and LulzSec made a mockery of public- and private-sector computer systems.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Wednesday, December 21, 2011

China hackers breached U.S. Chamber of Commerce.

Hackers in China broke through the computer defenses of the U.S. Chamber of Commerce last year and were able to access information about its operations and its 3 million members, the Wall Street Journal reported on Wednesday.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Cyber attacks reshape secure computing, says LynuxWorks v-p.

Malware has become very sophisticated in its entry, infection and damage mechanisms – and 2011 saw a dramatic increase in attacks. In the UK, the information commissioner reported that data security breaches were up 58% in 2011/12 so far (Note 1). High profile cases around the world included HBGary and Sony PSN.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Greatest Security Risks to a Wide Area Network.

Firewall program adds a level of protection, which is not provided by antivirus protection alone. Filtering network packets determine whether to send them along with their destination.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

How hackers gave Subway a $30 million lesson in point-of-sale security.

For thousands of customers of Subway restaurants around the US over the past few years, paying for their $5 footlong sub was a ticket to having their credit card data stolen. In a scheme dating back at least to 2008, a band of Romanian hackers is alleged to have stolen payment card data from the point-of-sale (POS) systems of hundreds of small businesses, including more than 150 Subway restaurant franchises and at least 50 other small retailers.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

RIAA and Homeland Security the latest organizations accused of illegal downloading.

More revelations are coming to light about who is illegally downloaded pirated content via the website YouHaveDownloaded, and this time it appears to be RIAA employees.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Tuesday, December 20, 2011

Cyber war leads to capture of CIA spy in Iran.

The budding cyber war between America and Iran could be quickly transcending off of computer networks and into the real world, with the US allegedly putting boots on the ground. Iranian state television is reporting that they’ve captured a CIA spy.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

White House Moves To Future-Proof Government IT.

The White House plans to require agencies to future-proof information technology decisions through the use of some mix of agile development, machine readable data, Web services and modular procurement techniques, federal CIO Steven VanRoekel said in an interview with InformationWeek.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Insulin pump hack delivers fatal dosage over the air.

The attack on wireless insulin pumps made by medical devices giant Medtronic was demonstrated Tuesday at the Hacker Halted conference in Miami. It was delivered by McAfee's Barnaby Jack, the same researcher who last year showed how to take control of two widely used models of automatic teller machines so he could to cause them to spit out a steady stream of dollar bills.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Hackers Infiltrate Restaurant Depot.

PC hackers from Romania and Russia may have filched innumerable payment card numbers belonging to consumers all across USA, particularly St. Louis (Missouri, U.S) following the wholesale retailer Restaurant Depot, situated at St. Louis, recently falling victim to a hack, states kmov.com dated December 9, 2011.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Key infrastructure systems of 3 US cities Under Attack By Hackers.

The infrastructure systems of three US cities have been attacked, according to the Federal Bureau of Investigation.

At a recent cybersecurity conference, Michael Welch, deputy assistant director of the FBI's cyber division, said hackers had accessed crucial water and power services.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Apple Crash Reports Help Hackers to create a jailbreak exploit.

iPhone "jailbreaking" has been a hot topic since Apple released its smartphone more than two years ago. According to the Latest report posted by BBC that Thousands of iPhone owners have joined forces with a team of hackers to help them find new ways to jailbreak Apple's phone software & Jailbreakers use Apple crash reports to unlock iPhones.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Data Center Post: Protect Your Organization Against Emerging HTML5 Threats.

Influential organizations and browsers such as Google, Facebook, PayPal and YouTube are already backing the move to HTML5 and the expansion into well-known media and browser outlets. HTML5 is a necessary transition for industries in need of a new method for content delivery.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Starbucks Wifi and Other Public Networks: Be Cautious.

though the coffee conglomerate has transacted over 26 million mobile payments since January 2011, all this financial information could turn into a public relations nightmare if the Wifi network and data servers are not secure.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Quarri Prevents Users From Copying Sensitive Data on Android Devices.

Quarri Technologies is extending its endpoint security platform to Android devices, calling the mobile operating system the "second-largest attack surface," according to company executives.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Terrorism threat raises spending on security technology.

The heightened risk of terrorist attacks, especially from elements believed to be linked to the Al-Shabaab terrorist network from Somalia, is forcing investors in Kenya to increase spending on security technology, boosting the balance sheet of companies.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

CompTIA Offers Mobile App Security Certification.

CompTIA and viaForensics are collaborating to launch a secure mobile application developer credential and security testing service scheduled for availability in the first half of 2012.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

CompTIA Offers Mobile App Security Certification.

CompTIA and viaForensics are collaborating to launch a secure mobile application developer credential and security testing service scheduled for availability in the first half of 2012.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Flash Player SMS scam charges victims for free Adobe software.

BitDefender has uncovered a creative scheme that charges people via SMS for what should be a free copy of Adobe Systems' Flash player, which is apparently undergoing a test run on a Russian social network.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Online crime makes more money than drug cartels.

Online crime groups make more money than drug cartels worldwide, and arresting these cybercriminals can be exceedingly difficult. This startling revelation was made by representatives of the Organization of American States (OAS) at a regional meeting on cyber security in Barbados earlier this month.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Feds Indict 55 For Cyber Crime Fraud.

Federal authorities Friday announced the indictment of 55 people for participating in a cyber crime fraud ring that relied on insiders to steal hundreds of people's personal details from a bank and a car dealer, among other organizations.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Microsoft to Force New Internet Explorer on Users.

Millions of users now running outdated versions of Microsoft's Internet Explorer (IE) web browser will soon be forced by Microsoft to use newer versions of its proprietary browser.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Giving gift cards safely.

Gift cards are all the rage this year. According to the National Retail Federation, the average consumer spent $145 on gift cards during the 2010 holiday season

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Law Enforcement Warns of Rise in "Relative in Distress" Scams.

Los Angeles County residents are being warned of an increase in the number of reports by victims of telephone scams where a caller impersonates a family member in distress.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Monday, December 19, 2011

FCC official delivers warning on threat to ‘Internet freedom’

The 193-member International Telecommunications Union (ITU), a U.N. agency, will meet in Dubai next December to renegotiate the 24-year-old treaty that deals with international oversight of the Internet. A growing number of countries are pushing greater governmental control and management of the Web’s availability, financial model and infrastructure.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

US Homeland Security beefing up presence in NM.

ALBUQUERQUE, N.M. — In May, around dozen undercover federal agents were dispatched to Roswell, N.M., a city of 48,000 known for its annual UFO festival. For months, agents followed "small time drug dealers" and gang members, many of whom had been terrorizing this quiet section of rural southeast New Mexico for years while overwhelmed local law enforcement agencies cried out for help.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

India, Mumbai: Cybercrime on the rise, but not all cases getting reported.

The official cybercrime numbers also do not match the findings of security reports. For instance, the Norton Cybercrime Report 2011, released in September by research firm Symantec Corp., estimated that nearly 30 million people were victims of cybercrime in 2010, suffering $4 billion in direct financial losses and an additional $3.6 billion in time spent resolving the crime.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Romania, FBI crack down on cyber crime.

Experts say cyber crime has found fertile ground in Romania, where schools provide high-level IT training. But harsh economic conditions make it difficult for graduates to find jobs, making them easy prey for crime rings seeking recruits.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Most young professionals shun IT policies.

The Cisco Connected World Technology Report reveals that 70pc of young employees frequently ignore IT policies and go to great lengths to stay connected to the internet, even if it compromises their company or their own security.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Firms Bid on NATO Cyberwar.

The North Atlantic Treaty Organization on Monday will collect bids from some of the world's top defense companies, including Lockheed Martin Co. and Northrop Grumman Corp., to update and expand the alliance's cybersecurity abilities.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Windows 8 will have picture password sign in.

As much as security experts would like for it to be otherwise, experience has taught us that no matter how many times some people are lectured on the use of complex passwords, a good number of them will always go for short, simple, easy-to-remember (but also to guess!) ones.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

India, New Delhi - Security Cameras As Planning Tools.

A camera system is being unveiled in the Indian capital of New Delhi that has a lot more than security on its mind. New Delhi's new cameras are also designed to help advance a citywide 3D GIS mapping project for urban planning efforts. The first of 63 cameras was installed earlier this month, India Today reports, and they'll be used to take high-resolution images of the city.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Symantec, Internet Security Threat Report.

This year, Symantec is offering its annual report on the Internet threat landscape in a whole new way. With the online "Build Your Report" tool, you can create your own custom version of the Internet Security Threat Report by selecting only those topic areas in which you are most interested, then compiling your report.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Security, HP’s Unexpected Strength !

In 2009 and 2010, HP made two key acquisitions in the area of security: It spent $1.5 billion for ArcSight, a security software player. And before that it nabbed the networking concern 3Com for $2.7 billion, and a key asset in that deal was TippingPoint, a line network intrusion prevention products.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

VSS Monitoring Releases Industry's First Line-Rate Packet Reassembly.

VSS Monitoring's new defragmentation capabilities lower the cost of ownership on media and network intelligence tools by reducing CPU cycles on voice and video analyzers while increasing bandwidth for relevant traffic.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Virtual private network tools 'can improve security'.

.irtual private network equipment can reduce the risk of data loss and external attacks when working on open networks, it has been claimed.

According to Cisco, there are "significant" risks to organisations when employees use their own consumer devices in the workplace, if the necessary precautions are not taken.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

US relies on Central Asia route.

The United States is increasingly relying on three transit routes snaking through Central Asia, Russia and the Caucasus, to ship non-military supplies and fuel into Afghanistan as the deteriorating relationship between Washington and Pakistan closes off border crossings, according to a Senate report obtained by The Associated Press.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Lax UK border controls attacked in report.

A woman was allowed into the UK to live with a partner she claimed she had met on the internet despite being unable to prove that she had ever even spoken to him, a report into the UK Border Agency (UKBA) reveals.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Symantec Internet Security Threat Report.

The Norton Cybercrime Report 2011 reveals that 10 per cent of adults online have experienced cybercrime on their mobile. The advent of applications has been instrumental in turning mobile devices into a common computing platform and laying the foundation for tablets, which offer yet more consumer content.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Xbox LIVE not hacked insists Microsoft.

Microsoft has denied claims that Xbox LIVE has been hacked, despite reports suggesting the online gaming service had suffered a security breach exposing user data. The company took to its official Facebook page after UK newspaper The Sun alleged gamers had lost between £100 and £20o each ($156-313); in fact, Microsoft clarified, victims had been the unfortunate quarry of a phishing scam.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Big crime meets big data.

Data and social media are being used against us.

Malicious types of software, like viruses, worms, and trojans, are the main tools used to harvest personal data. Cyber criminals also use social engineering techniques, such as phishing emails populated with data gleaned from social networks, to trick people into providing further details.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Facebook Alternative: OnlyMeWorld Launches.

There is a growing concern over the handling of users' information, security, privacy, data mining, web tracking, and facial recognition software used by Facebook and other social networking sites.

The real issues people should be concerned about are: how much information Facebook and other social networking sites are collecting about them "Knowingly" versus. "Unknowingly".

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

FTC tells global Internet body to cut back domain name plan.

The FTC argues ICANN has failed to police the current set of domains, so adding more domains will make it even easier for scammers to game the naming system.

Already, tricksters engage in phishing schemes that spoof legitimate sites, such as Citibank.com, to trick unwitting depositors into entering account information on bogus sites by using similar names -- perhaps Citybanks.com or Citigroup.biz.


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Sunday, December 18, 2011

Police Say Beware of Cyber Monday Scams, Identity Theft.

The FBI recommends shoppers buy gift cards from the actual retailers, and not from third parties, which may sell the cards for less than face value (say a $50 gift card for $45). Many times, the gift cards won't have any value and shoppers won't know until they try to use the card.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

New e-ID cards for increased Internet security ?

Professor Helmbrecht said: “It is highly impressive to see how complex and sophisticated the production line of this innovative ID card of the Bundesdruckerei is. These cards significantly improve IT security in the digital age

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Mesa County’s cyber disaster casts shadow.

Initially, authorities concluded more than 200,000 name files associated with personal, identifying information were exposed, but the estimate was scaled back.

“... Many of these items were duplicates,” the report said, adding it was determined approximately 105,000 unique records were exposed.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Can a hack force HP printers to burst into flame ?

Now that Columbia has shown the world this potential vulnerability, the Great Printer Hack of 2012 may be in the works right now.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Anonymous exposes cybercrime investigator's Gmail, voicemail.

A group of hackers operating under the banner of Anonymous' Operation AntiSec published the private e-mails of a California Department of Justice investigator. The hackers posted the entirety of the 38,000 e-mails in a Gmail account that appears to belong to Alfredo "Fred" Baclagan, a California Department of Justice special agent

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

The most famous (caught) Hackers of 2011.

Although there are many subtle hackers who are always able to evade law enforcement authorities, however, failed this year to achieve impressive gains in arrests and charges. Here is a list of the most sensational cases of the year.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Odds of hacker 'shenanigans' during the presidential primaries are high.

Expect hackers to try to disgrace presidential candidates with electronic extortion and other forms of digital deception during the upcoming primaries, say some former hackers and computer security specialists.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

DOD's Private Sector Opportunity.

The Department of Defense (DoD) is seeking DoD or private sector employees working in the information technology field to participate in DoD's Information Technology Exchange Program pilot.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Saturday, December 17, 2011

Corero Network Security Signs on Web Hosting Provider Applied Innovations.

Corero’s IPS Protects Applied Innovations’ 35,000 Client Websites, Primarily eCommerce Companies, Against DDoS and Other Malicious Attacks.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

IPhones Guide Artillery as Pentagon Plans App Store.

Tactical Nav, an iPhone application the U.S. Army captain built with $30,000 of his savings and a maxed-out credit card a year ago. The $5.99 app uses GPS technology and the iPhone’s camera to chart coordinates and guide artillery fire.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

DHS, FBI Dispute Illinois Water Hack.

The Department of Homeland Security and FBI on Tuesday issued a joint statement disputing that an Illinois water utility's industrial control systems were recently hacked.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Mueller: FBI's cyber crime operation is flawed but improving.

"The structure of the FBI does not lend itself to easily addressing cyber," Mueller said. He noted that the FBI has a cyber division, but cyber crime cuts across many other areas like organized crime and narcotics.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Hacker stole Seattleites’ credit card info for drug money.

A Seattle grand jury has indicted a Maryland man accused of hacking into the credit card systems of several Seattle businesses and using stolen funds to fuel his heroin addiction.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

China-Based Hacking of 760 Companies Shows Cyber Cold War.

Google Inc. and Intel Corp. were logical targets for China-based hackers, given the solid-gold intellectual property data stored in their computers. An attack by cyber spies on iBahn, a provider of Internet services to hotels, takes some explaining.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

A few hacker teams do most China-based hacking.

s few as 12 different Chinese groups, largely backed or directed by the government there, commit the bulk of the China-based cyber attacks stealing critical data from US companies and government agencies, according to US cybersecurity analysts and experts.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Hackistan: Indo-Pak rivalry takes on new frontiers.

The “rivalry” between India and Pakistan is considered to be an inherent part of both countries’ history and culture, influencing every field, from sports, movies to even marketing campaigns. It should therefore come as no surprise to the current tech-savvy crowd that cyber attacks have been added to this list.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

CBI, Interpol to set up research centre to tackle cyber, telecom crimes.

The Central Bureau of Investigation (CBI) and the Interpol are working on plans to tackle the telecom and cyber crimes. Both the sides have agreed to set up CBI-Interpol Research and Innovation Centre for Prevention of Telecommunication Crime. In India.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Top 5 Security Incidents of 2011.

With hacktivisiom" groups like Anonymous and Lulzsec claiming the spotlight week after week, large corporate breaches making the the front page and cyber incidents pointing to foreign government involvement, 2011 was an eventful year in cybersecurity.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

President's 10-Point Cybersecurity Action Plan.

President Barack Obama on Friday presented a 10-point near-term action plan aimed at securing the federal government's and the nation's critical IT infrastructure.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Top 10 security worries for 2012.

Predictions from risk consulting company Kroll are the latest to point to the heightened potential for cyberattacks aimed at small businesses in 2012.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

CSC Forms Cybersecurity Council.

CSC announces the establishment of the Insurance Cybersecurity Advisory Council for property & casualty insurers to facilitate the development of best practices and technology strategies that effectively mitigate the risk of cyber attacks on the insurance industry.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Cybersecurity a growing issue in the U.S.

According to U.S. cybersecurity analysts, 12 small groups of hackers from China are responsible for more than $1 billion worth of data from companies throughout the nation. These groups have been monitored by McAfee, a prestigious Internet security company, who drew upon information collected over time.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

USA Needs Cyber Threat Clearinghouse Says Former CIA Director.

In an opinion column published by Federal Computer Week Dec. 9, Hayden, and co-authors Samuel Visner and David Zolet, executives at CSC, suggest: "Washington should begin sharing cyber warnings with those responsible for America's critical infrastructure, from hospitals to water systems to banks."


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Iran's Cyber Attack Forces US to Replace Drones in Region.

TEHRAN (FNA)- The US Air Force is sending a single copy of a brand-new stealth drone to Afghanistan after its more - or better to say most - advanced stealth aircraft, RQ-170, was downed by an Iranian cyber attack earlier this month to see if Tehran can down this drone as well.


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

China ‘Incredibly Aggressive’ in Cyber Theft: Ex-CIA Chief.

China is stealing online information from the United States and feeding the data to homegrown companies for commercial benefit, Michael Hayden, Former Director of the Central Intelligence Agency said at the Black Hat Technical Security Conference in Abu Dhabi on Wednesday.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

FYI - FBI Bank Crime Statistics.

Bank Crime Statistics (BCS)
Federal Insured Financial Institutions
April 1, 2011 – June 30, 2011

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Diplomat in Miami linked to Iran-Venezuela cyber-terror plot.

Venezuela's top diplomat in Miami has been linked to an alleged cyber-terrorism plot against the U.S. in collusion with Iran and Cuba that already has prompted alarmed members of Congress to schedule hearings.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Secret Service vs Cyber Crime.

In recent testimony before the Senate Judiciary Committee, Pablo Martinez, the Secret Service’s Deputy Special Agent in Charge, testified regarding recent trends in cybercrime and the efforts of the Secret Service to combat those emerging threats.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Microsoft announces automatic upgrades for Internet Explorer.

According to the company's blog post, starting from Australia and Brazil next January, users of Windows XP, Vista and Windows 7 will get the IE updates if they have turned on automatic updating via Windows Update.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Stealth infections, polymorphic infections, multpartite infections and more. . .

Computer Internet Security Software & Spyware Protection

It’s amazing the number of people both casual Internet “viewers” an internet-based entrepreneurs decide to ignore computer internet security software.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

New Justice Department unit to fight tech crimes, identity theft.

The eCrime Unit will "make sure that vulnerable populations are safe, that consumers are safe and that we allow good behavior to occur," Harris said at a news conference Tuesday in San Jose, chosen because of its location in the tech hub of Silicon Valley.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

The Internet Crime Complaint Center.

The IC3 accepts online Internet crime complaints from either the actual victim or from a third party to the complainant. We can best process your complaint if we receive accurate and complete information from you.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

BBB Warns of New Death Threat Email Scam.

"There was an email that said 'attention someone wants you dead'," said Hilyard. "So that really got my attention."

She went on to open it, only to discover it was a death threat.
"Somebody telling me they had been hired to kill me," she said.
She re-read the email and realized it was a generic email.
It didn't include names, but the threat was still enough for the station to contact the police.
The Better Business Bureau said the email is a twist on the Nigerian scam, which has been going on since the 1980s.


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Domestic drones coming to your neighborhood ?

The Federal Aviation Administration is preparing new rules that could make it easier for law enforcement agencies to use drone aircraft in the U.S., raising concerns about privacy at a time when the aircraft are already conducting surveillance missions in some parts of the country

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Telephone Scams Targeting U.S. Citizens.

Law enforcement has seen an increase in the number of reports by victims of telephone scams where the caller impersonates a family member of the victim and concocts a phony scenario suggesting the relative is in distress, it was announced today by Steven Martinez, the FBI’s Assistant Director in Charge of the Los Angeles Field Office; André Birotte Jr, the United States Attorney in Los Angeles; and officials with the United States Postal Inspection Service, the Los Angeles Police Department and the Los Angeles County Sheriff’s Department.


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Sixteen Persons Charged in International Internet Fraud Scheme

LAS VEGAS—Federal charges have been unsealed against 16 individuals for their involvement in an international Internet scheme that defrauded online purchasers of purported merchandise such as automobiles and other items, announced Daniel G. Bogden, United States Attorney for the District of Nevada.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Friday, December 16, 2011

Adobe Patches Two Actively Exploited Vulnerabilities in Reader and Acrobat.

Adobe Systems has released Adobe Reader and Acrobat 9.4.7 in order to patch two vulnerabilities that are being actively exploited in attacks against companies from the defense industry.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

General Security Tips

Don't "friend" people you don't know

On social networking sites, it's often tempting to expand your circle of acquaintances. But do you REALLY need to "friend" your cousin's brother-in-law's work buddy? People on your "friends" list have access to personal information about you that you might not want the world to see. If you don't really know them, don't friend them.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

What You Need to Know About the Stop Online Piracy Act.



Despite attempts by opponents to prevent it from reaching this stage, the Stop Online Piracy Act (SOPA) moved to the House of Representatives' Judiciary Committee yesterday morning (Dec. 15) for debate. (UPDATE: As of 4:30 p.m. ET Friday, the committee vote had been indefinitely delayed.)

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

10 Ways the Government Watches US.

In the decade since the Sept. 11, 2001, terrorist attacks, the size and scope of the U.S. national-security apparatus has greatly expanded.

The trigger of that growth was the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 — more commonly known as the Patriot Act — which Congress overwhelmingly approved in the weeks following 9/11.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

2012 Privacy Software Review.

Why Do I Need Privacy Software?

Safeguarding your information is important in this era where data changes hands countless times every day. If you aren’t careful, the information that’s being exchanged could be your own and the participants could be the last ones you would want to handle it. Your surfing habits and private information could be tracked and stolen through aggressive cookies and unannounced browser downloads.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Anonymous Hackers Take Down Child Porn Websites, Leak Users' Names

Members of the Anonymous hacktivist movement are claiming responsibility for taking down more than 40 secret child-pornography websites and leaking the names of more than 1,500 members of one of the illegal sites.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Are Spammy Sites Ranking Better Than Yours?

Wistia



Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure