Saturday, December 17, 2011

Corero Network Security Signs on Web Hosting Provider Applied Innovations.

Corero’s IPS Protects Applied Innovations’ 35,000 Client Websites, Primarily eCommerce Companies, Against DDoS and Other Malicious Attacks.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

IPhones Guide Artillery as Pentagon Plans App Store.

Tactical Nav, an iPhone application the U.S. Army captain built with $30,000 of his savings and a maxed-out credit card a year ago. The $5.99 app uses GPS technology and the iPhone’s camera to chart coordinates and guide artillery fire.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

DHS, FBI Dispute Illinois Water Hack.

The Department of Homeland Security and FBI on Tuesday issued a joint statement disputing that an Illinois water utility's industrial control systems were recently hacked.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Mueller: FBI's cyber crime operation is flawed but improving.

"The structure of the FBI does not lend itself to easily addressing cyber," Mueller said. He noted that the FBI has a cyber division, but cyber crime cuts across many other areas like organized crime and narcotics.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Hacker stole Seattleites’ credit card info for drug money.

A Seattle grand jury has indicted a Maryland man accused of hacking into the credit card systems of several Seattle businesses and using stolen funds to fuel his heroin addiction.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

China-Based Hacking of 760 Companies Shows Cyber Cold War.

Google Inc. and Intel Corp. were logical targets for China-based hackers, given the solid-gold intellectual property data stored in their computers. An attack by cyber spies on iBahn, a provider of Internet services to hotels, takes some explaining.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

A few hacker teams do most China-based hacking.

s few as 12 different Chinese groups, largely backed or directed by the government there, commit the bulk of the China-based cyber attacks stealing critical data from US companies and government agencies, according to US cybersecurity analysts and experts.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Hackistan: Indo-Pak rivalry takes on new frontiers.

The “rivalry” between India and Pakistan is considered to be an inherent part of both countries’ history and culture, influencing every field, from sports, movies to even marketing campaigns. It should therefore come as no surprise to the current tech-savvy crowd that cyber attacks have been added to this list.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

CBI, Interpol to set up research centre to tackle cyber, telecom crimes.

The Central Bureau of Investigation (CBI) and the Interpol are working on plans to tackle the telecom and cyber crimes. Both the sides have agreed to set up CBI-Interpol Research and Innovation Centre for Prevention of Telecommunication Crime. In India.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Top 5 Security Incidents of 2011.

With hacktivisiom" groups like Anonymous and Lulzsec claiming the spotlight week after week, large corporate breaches making the the front page and cyber incidents pointing to foreign government involvement, 2011 was an eventful year in cybersecurity.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

President's 10-Point Cybersecurity Action Plan.

President Barack Obama on Friday presented a 10-point near-term action plan aimed at securing the federal government's and the nation's critical IT infrastructure.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Top 10 security worries for 2012.

Predictions from risk consulting company Kroll are the latest to point to the heightened potential for cyberattacks aimed at small businesses in 2012.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

CSC Forms Cybersecurity Council.

CSC announces the establishment of the Insurance Cybersecurity Advisory Council for property & casualty insurers to facilitate the development of best practices and technology strategies that effectively mitigate the risk of cyber attacks on the insurance industry.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Cybersecurity a growing issue in the U.S.

According to U.S. cybersecurity analysts, 12 small groups of hackers from China are responsible for more than $1 billion worth of data from companies throughout the nation. These groups have been monitored by McAfee, a prestigious Internet security company, who drew upon information collected over time.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

USA Needs Cyber Threat Clearinghouse Says Former CIA Director.

In an opinion column published by Federal Computer Week Dec. 9, Hayden, and co-authors Samuel Visner and David Zolet, executives at CSC, suggest: "Washington should begin sharing cyber warnings with those responsible for America's critical infrastructure, from hospitals to water systems to banks."


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Iran's Cyber Attack Forces US to Replace Drones in Region.

TEHRAN (FNA)- The US Air Force is sending a single copy of a brand-new stealth drone to Afghanistan after its more - or better to say most - advanced stealth aircraft, RQ-170, was downed by an Iranian cyber attack earlier this month to see if Tehran can down this drone as well.


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

China ‘Incredibly Aggressive’ in Cyber Theft: Ex-CIA Chief.

China is stealing online information from the United States and feeding the data to homegrown companies for commercial benefit, Michael Hayden, Former Director of the Central Intelligence Agency said at the Black Hat Technical Security Conference in Abu Dhabi on Wednesday.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

FYI - FBI Bank Crime Statistics.

Bank Crime Statistics (BCS)
Federal Insured Financial Institutions
April 1, 2011 – June 30, 2011

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Diplomat in Miami linked to Iran-Venezuela cyber-terror plot.

Venezuela's top diplomat in Miami has been linked to an alleged cyber-terrorism plot against the U.S. in collusion with Iran and Cuba that already has prompted alarmed members of Congress to schedule hearings.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Secret Service vs Cyber Crime.

In recent testimony before the Senate Judiciary Committee, Pablo Martinez, the Secret Service’s Deputy Special Agent in Charge, testified regarding recent trends in cybercrime and the efforts of the Secret Service to combat those emerging threats.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Microsoft announces automatic upgrades for Internet Explorer.

According to the company's blog post, starting from Australia and Brazil next January, users of Windows XP, Vista and Windows 7 will get the IE updates if they have turned on automatic updating via Windows Update.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Stealth infections, polymorphic infections, multpartite infections and more. . .

Computer Internet Security Software & Spyware Protection

It’s amazing the number of people both casual Internet “viewers” an internet-based entrepreneurs decide to ignore computer internet security software.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

New Justice Department unit to fight tech crimes, identity theft.

The eCrime Unit will "make sure that vulnerable populations are safe, that consumers are safe and that we allow good behavior to occur," Harris said at a news conference Tuesday in San Jose, chosen because of its location in the tech hub of Silicon Valley.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

The Internet Crime Complaint Center.

The IC3 accepts online Internet crime complaints from either the actual victim or from a third party to the complainant. We can best process your complaint if we receive accurate and complete information from you.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

BBB Warns of New Death Threat Email Scam.

"There was an email that said 'attention someone wants you dead'," said Hilyard. "So that really got my attention."

She went on to open it, only to discover it was a death threat.
"Somebody telling me they had been hired to kill me," she said.
She re-read the email and realized it was a generic email.
It didn't include names, but the threat was still enough for the station to contact the police.
The Better Business Bureau said the email is a twist on the Nigerian scam, which has been going on since the 1980s.


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Domestic drones coming to your neighborhood ?

The Federal Aviation Administration is preparing new rules that could make it easier for law enforcement agencies to use drone aircraft in the U.S., raising concerns about privacy at a time when the aircraft are already conducting surveillance missions in some parts of the country

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Telephone Scams Targeting U.S. Citizens.

Law enforcement has seen an increase in the number of reports by victims of telephone scams where the caller impersonates a family member of the victim and concocts a phony scenario suggesting the relative is in distress, it was announced today by Steven Martinez, the FBI’s Assistant Director in Charge of the Los Angeles Field Office; André Birotte Jr, the United States Attorney in Los Angeles; and officials with the United States Postal Inspection Service, the Los Angeles Police Department and the Los Angeles County Sheriff’s Department.


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Sixteen Persons Charged in International Internet Fraud Scheme

LAS VEGAS—Federal charges have been unsealed against 16 individuals for their involvement in an international Internet scheme that defrauded online purchasers of purported merchandise such as automobiles and other items, announced Daniel G. Bogden, United States Attorney for the District of Nevada.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Friday, December 16, 2011

Adobe Patches Two Actively Exploited Vulnerabilities in Reader and Acrobat.

Adobe Systems has released Adobe Reader and Acrobat 9.4.7 in order to patch two vulnerabilities that are being actively exploited in attacks against companies from the defense industry.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

General Security Tips

Don't "friend" people you don't know

On social networking sites, it's often tempting to expand your circle of acquaintances. But do you REALLY need to "friend" your cousin's brother-in-law's work buddy? People on your "friends" list have access to personal information about you that you might not want the world to see. If you don't really know them, don't friend them.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

What You Need to Know About the Stop Online Piracy Act.



Despite attempts by opponents to prevent it from reaching this stage, the Stop Online Piracy Act (SOPA) moved to the House of Representatives' Judiciary Committee yesterday morning (Dec. 15) for debate. (UPDATE: As of 4:30 p.m. ET Friday, the committee vote had been indefinitely delayed.)

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

10 Ways the Government Watches US.

In the decade since the Sept. 11, 2001, terrorist attacks, the size and scope of the U.S. national-security apparatus has greatly expanded.

The trigger of that growth was the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 — more commonly known as the Patriot Act — which Congress overwhelmingly approved in the weeks following 9/11.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

2012 Privacy Software Review.

Why Do I Need Privacy Software?

Safeguarding your information is important in this era where data changes hands countless times every day. If you aren’t careful, the information that’s being exchanged could be your own and the participants could be the last ones you would want to handle it. Your surfing habits and private information could be tracked and stolen through aggressive cookies and unannounced browser downloads.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Anonymous Hackers Take Down Child Porn Websites, Leak Users' Names

Members of the Anonymous hacktivist movement are claiming responsibility for taking down more than 40 secret child-pornography websites and leaking the names of more than 1,500 members of one of the illegal sites.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Are Spammy Sites Ranking Better Than Yours?

Wistia



Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Network Security: Strong Safeguarding Techniques.

A recent survey conducted by the Computer Security Institute, states 70 percent of the organizations polled admitted breach of their network security defenses and that 60 percent of the attack oninformation securitycame from within the organization.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

iTwin makes moving data easy and secure.

Flash drives, remote access software and the cloud are just a sample of the plethora of measures one can use to move data between computers. A newcomer dubbed iTwin hopes to find its place within the group, touting enhanced security measures over the competition.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Free DNSCrypt tool enhances Mac Web security.

When you connect to a Web site on the Internet, your computer uses the Domain Name System (DNS) to convert URLs like "www.macfixit.com" to the IP address for the server where that Web site resides.


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security

CBI to set up international centre for tackling telecom crimes.

CBI would be setting up an international high-tech centre in partnership with the Interpol for unravelling telcommunication crimes keeping in mind growing popularity of mobile phones and devices as carriers of senstitive information, vulnerable to hackers.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security

Sixteen Persons Charged in International Internet Fraud Scheme.

LAS VEGAS—Federal charges have been unsealed against 16 individuals for their involvement in an international Internet scheme that defrauded online purchasers of purported merchandise such as automobiles and other items, announced Daniel G. Bogden, United States Attorney for the District of Nevada.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security

Cyber criminals will target small business, the cloud, mobile and social networks in 2012.

Cyber crooks will target small businesses, social media attacks will be more common, and mobile security threats will reach an all-time high in 2012.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security

Windows 8 will sync passwords between computers.

With Windows 8's cross-computer password syncing, Microsoft is looking to bypass what hacker Kevin Mitnick has called the weakest link of computer security: the user. After signing in using a Live ID — a new feature on Windows 8 — you'll be able to store any passwords you create, then sync them across all other trusted Windows 8 machines.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security

PC Security Warning: Vista Security 2012.

Penty of PC users have sent in reports to various security sites relinquishing data related to their system being attacked or infiltrated by a fake security program by the name of Vista Security 2012. Not only are those running Windows Vista being affected, but those running Windows XP and Windows 7 are in the mix.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security

Square Enix Downplays Server Hack.

Square Enix said Friday that it would continue to suspend its members' service after a breach this week accessed files associated with a reported 1.4 million users. However, the company said that it did not believe any user information had been accessed.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security

China-Based Hacking of 760 Companies Shows Global Cyber War.

Google Inc. and Intel Corp. were logical targets for China-based hackers, given the solid-gold intellectual property data stored in their computers. An attack by cyber spies on iBahn, a provider of Internet services to hotels, takes some explaining.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security

How Iran hacked super-secret CIA stealth drone.

"By putting noise [jamming] on the communications, you force the bird into autopilot. This is where the bird loses its brain,” says the source.
Less than two weeks after the RQ-170 Sentinel was lost over Iran, US officials cited a system malfunction as the culprit in another drone that crashed over the Indian Ocean on Tuesday this week.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security

Thursday, December 15, 2011

Why we're unfit to wage cyber war.

At the risk of pointing out the obvious, there are lessons to be learned from the false alarm raised over a pump that burned out in an Illinois municipal water plant in November. Analysts in the Illinois Statewide Terrorism and Intelligence Center jumped to the conclusion that it was the work of foreign hackers and journalists reported it as the first cyber-kinetic attack launched against U.S. assets.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security

FBI goes international to fight cyber criminals on their home turf

Criminals know no borders in cyberspace. Online malfeasance is big money, with organized gangs of hackers working in Eastern Europe and Asia to target businesses and government agencies for money and data.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security

Stop Online Piracy Act Version 2.0

Today, the House Judiciary Committee is scheduled to vote on the newest version of the Stop Online Piracy Act (SOPA) bill. The bill, which was introduced in late October, would enable the U.S. government and copyright holders to obtain court orders to shut down websites that are associated with infringing, pirating, or counterfeiting intellectual property.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security

U.S. Seizes 150 Websites in Counterfeit Crackdown.

The 150 seized domains are in the custody of the federal government, the DoJ said. Visitors to the sites will now find a seizure banner that notifies them that the domain name has been seized by federal authorities and educates them that willful copyright infringement is a federal crime.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security

Cisco: Cyber criminals keen on mobile device, cloud hacking.


Cisco Security’s 2011 Annual Security Report reveals some of the biggest security trends of the year, but it also gives insights as to what kind of threats we should be more aware of as we enter 2012.
As Cisco reported in June, most cyber criminals are dropping producing mass spam in favor of more targeted attacks.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security

Myths & Risks of 'Free' File Sharing

'Free' file sharing options such as FTP servers, DropBox and YouSendIt actually expose enterprises to substantial IT administration costs as well as security, governance and compliance risks, according to a new SEEBURGER white paper titled The TCO of FTP: The Hidden Costs of Free File Sharing.

Continue reading ...
hack, hacking, it security, network security, cloud computing,

Enhanced by Zemanta