Saturday, December 24, 2011

CIA has suspended drone attacks in Pakistan.

The undeclared halt in CIA attacks in Pakistan, now in its sixth week, aims at reversing a sharp erosion in trust after deadly incidents, including the mistaken attack on soldiers by U.S. gunships.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

AT&T Hackers Have Terrorism Ties, Police Say.

FBI aids in arrests in Philippines of four men who allegedly hacked into AT&T customers' PBXs to generate revenue for Saudi-based militant group.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Stolen Credit Cards Go for $3.50 at Amazon-Like Online Bazaar

Symantec Corp. (SYMC), the cybersecurity firm, estimates that cyberthieves steal data worth $114 billion a year. By comparison, the Federal Bureau of Investigation said the take from all bank robberies in the U.S. in 2010 was just $43 million. The global market in cocaine is an estimated $85 billion, according to the United Nations.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Feds untangle $20 million scheme in DFW against telecom companies.

For years, a dozen or more conspirators ran a scheme in North Texas to rip off some of the nation's telecommunication giants. In the end, the $20 million cybercrime spree crumbled because of evidence painstakingly gathered from businesses and seized from the homes of conspirators.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Reston bank helps tackle cyber fraud.

Online hackers cost victims $400 billion each year, FBI says

“We see about 60,000 attempted online attacks or ‘pings’ in a typical month,” said bank CEO John R. Maxwell. “Bank robbers don’t always come through the front door. ... We take cybersecurity very, very seriously.”

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Consumers will lose $10M to cyber crime this holiday season.

Over $10 million will be intercepted by cyber criminals this holiday season, as consumers turn toward the Internet for their presents.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Army Piles on Evidence in Final Arguments in WikiLeaks Hearing.

FT. MEADE, Maryland – The government finished making its case against accused WikiLeaks source Bradley Manning Thursday morning with a 60-minute closing statement that piled on new details and exhibits, including snippets of 15 pages of chats allegedly between the Army intelligence analyst and WikiLeaks founder Julian Assange.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Avoiding Christmas cybercrime.

Only use reputable websites, avoid unsecure connections and use a special credit card.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Cyber Crime And Identity Theft Facts.

There are lots of methods that you may have your identification stolen, and also many causes that people want to steal your identity. In most cases, theft of your identity is to really setup a brand new identification with the identical information, only a special deal with in another metropolis or even one other state.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

“eCrime unit” to fight cyber-crime in the Golden State.

Attorney General Kamala D. Harris unveiled a new statewide cyber-crime unit in Silicon Valley on Tuesday aimed at investigating and prosecuting such misdeeds as the ATM-skimming scheme that recently fleeced more than 500 Lucky supermarket customers.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Chinese gaming sites hacked: Millions of users affected.

It was reported yesterday that CDSN — an IT portal and community — had been hacked, and data including the username and passwords combinations for over six millions user accounts had been stolen.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Friday, December 23, 2011

School district investigates Internet security breach.

The breach was discovered last weekend, according to a release send out by school officials on Wednesday. The district Internet technology (IT) department is working with school administration to determine if any data was breached during the incident.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Siemens fixing cyber bugs in industrial control systems.

Siemens (SIEGn.DE) said it is working to fix security flaws in industrial controls products that the U.S. government warned could make public utilities, hospitals and other critical parts of the country's infrastructure vulnerable to attack by hackers.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Ex-Dow Agro scientist set to be sentenced in espionage case.

China targeting private businesses as part of their spy strategies.

Federal prosecutors are recommending that a former Dow AgroSciences researcher be sentenced to more than seven years in prison for sending trade secrets worth millions to China and Germany.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Wikileaks: Bradley Manning revealed cyber-espionage danger to US.

Among its accusations against Bradley, the US government says he walked out of a US military base in Iraq with a compact disc labeled "Lady Gaga" that actually held more than 251,000 secret State Department diplomatic cables.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Cyber Alerts for Parents & Kids.

Tip #1: Be Prudent When Posting Images Online

You might unwittingly be letting others know where you live and work and your travel patterns and habits. These details can be revealed through bits of information embedded in images taken with smartphones and some digital cameras and then shared on public websites.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

HP, No Record Of Printers Set Ablaze By Hackers.

This morning, HP announced that the firmware update is now available and said it has still not received any customer reports of unauthorized access.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Thursday, December 22, 2011

Romance scams heat up for the holidays.

Here's how it works. You meet someone in a forum or a dating site. They're friendly, interesting and, most important, interested in you. Conversation - whether in emails, instant messages or phone calls - will continue for weeks, or even months, until a deep enough trust is built to start angling for money.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Don’t lend data cards.

In recent cases of cyber crimes, the police found that the accused were using the data cards of friends to post obscene photos and abusive messages on blogs and social networking sites including facebook, twitter etc.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Social networks: pressure or routine control?

Russian secret police had demanded that his site ban online opposition groups supporting post-election protests, as well as vocal anti-corruption blogger Alexei Navalny - who had been arrested before during the protests near the Chistye Prudy metro station

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Top 5 Targets For Internet Criminals In 2012.

Over the last few years it has become apparent that the range of handheld devices and services designed to bring convenience and flexibility to our everyday lives can also yield opportunities for malicious users to intercept data, potentially resulting in identity theft, fraud and access to sensitive information.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

FBI, Bulgarian Officials Jointly Foil Sophisticated Cyber-crime Group.

The FBI of USA jointly with the Bulgarian GDBOP's (Division for Combating Organized Crime's) 'Computer Crimes Department' recently terminated a global cyber-crime operation, published softpedia.com dated December 10, 2011.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Is Your Kid Safe Being Social in Cyberspace?

Police believe a 21-year old Nebraska man hooked up with a 13-year old Wisconsin girl online before the two were found in a motel near Lake Geneva, Wisconsin.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

UAE internet pirate faced with US$962,400 bill.

An OSN subscriber who helped millions of computer users illegally download the Middle East pay-TV platform’s high definition content has confessed to internet piracy following questioning by Abu Dhabi police this week.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Cyber crime cases on the rise this year.

KATHMANDU: With the number of people having access to the internet and mobile phones increasing by the day, police have recorded a rise in the number of cases where individuals have used technology to harass and blackmail others.


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Posting Videos Online Can Make You a Terrorist.

Tarek Mehanna, the Boston native who was accused of material support for terrorism based on what prosecutors said was his online advocacy on behalf of al Qaeda, was found guilty on all counts Monday.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Spies Try to Escape Spyware at ‘Wiretapper’s Ball’.

As he tries to detect hacker threats lurking in the wireless networks, the man who helps manage a Southeast Asian country’s Internet security says there’s reason for paranoia. The wares on offer include products that secretly access your Web cam, turn your cell phone into a location-tracking device, recognize your voice, mine your e-mail for anti-government sentiment and listen to supposedly secure Skype calls.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

News Corp. Must Pay Phone-Hacker’s Legal Fees.

Mulcaire, I was only following orders.

Mulcaire “always said he was acting on the instruction” of the company “and he clearly needs legal representation to deal with the numerous cases,” his lawyer, Sarah Webb, said in an e-mailed statement. The ruling will probably result in News Corp.’s News International unit paying another 750,000 pounds ($1.2 million) in legal fees, she said.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

A Fresh Perspective on Internet Security.

Herley says, we rely too much on password strength. We are encouraged to use “strong” passwords that go beyond the name of a pet or “12345”—and to change them regularly.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Lebanese FM Hails Iran's "Valuable" Positions on Syria

Mansour felicitated Iran for its successes in different fields, and expressed surprise at Tehran's superiority in cyber war over the US which resulted in the capture of a hi-tech US stealth drone through a cyber attack.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Helmbrecht sees new e-ID cards for increased Internet security.

Introduced by Germany’s government in October 2011, the new electronic ID card can be used on the Internet as proof of identity, and features functions that enable it to operate as an electronic document, providing extremely high levels of security.”

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

FBI Warns Hacktivists: You're Breaking the Law.

The July raid appeared to be the largest public indication that the FBI was finally making headway in its investigation of hacktivist activity during a year when groups including Anonymous and LulzSec made a mockery of public- and private-sector computer systems.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Wednesday, December 21, 2011

China hackers breached U.S. Chamber of Commerce.

Hackers in China broke through the computer defenses of the U.S. Chamber of Commerce last year and were able to access information about its operations and its 3 million members, the Wall Street Journal reported on Wednesday.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Cyber attacks reshape secure computing, says LynuxWorks v-p.

Malware has become very sophisticated in its entry, infection and damage mechanisms – and 2011 saw a dramatic increase in attacks. In the UK, the information commissioner reported that data security breaches were up 58% in 2011/12 so far (Note 1). High profile cases around the world included HBGary and Sony PSN.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Greatest Security Risks to a Wide Area Network.

Firewall program adds a level of protection, which is not provided by antivirus protection alone. Filtering network packets determine whether to send them along with their destination.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

How hackers gave Subway a $30 million lesson in point-of-sale security.

For thousands of customers of Subway restaurants around the US over the past few years, paying for their $5 footlong sub was a ticket to having their credit card data stolen. In a scheme dating back at least to 2008, a band of Romanian hackers is alleged to have stolen payment card data from the point-of-sale (POS) systems of hundreds of small businesses, including more than 150 Subway restaurant franchises and at least 50 other small retailers.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

RIAA and Homeland Security the latest organizations accused of illegal downloading.

More revelations are coming to light about who is illegally downloaded pirated content via the website YouHaveDownloaded, and this time it appears to be RIAA employees.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Tuesday, December 20, 2011

Cyber war leads to capture of CIA spy in Iran.

The budding cyber war between America and Iran could be quickly transcending off of computer networks and into the real world, with the US allegedly putting boots on the ground. Iranian state television is reporting that they’ve captured a CIA spy.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

White House Moves To Future-Proof Government IT.

The White House plans to require agencies to future-proof information technology decisions through the use of some mix of agile development, machine readable data, Web services and modular procurement techniques, federal CIO Steven VanRoekel said in an interview with InformationWeek.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Insulin pump hack delivers fatal dosage over the air.

The attack on wireless insulin pumps made by medical devices giant Medtronic was demonstrated Tuesday at the Hacker Halted conference in Miami. It was delivered by McAfee's Barnaby Jack, the same researcher who last year showed how to take control of two widely used models of automatic teller machines so he could to cause them to spit out a steady stream of dollar bills.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Hackers Infiltrate Restaurant Depot.

PC hackers from Romania and Russia may have filched innumerable payment card numbers belonging to consumers all across USA, particularly St. Louis (Missouri, U.S) following the wholesale retailer Restaurant Depot, situated at St. Louis, recently falling victim to a hack, states kmov.com dated December 9, 2011.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Key infrastructure systems of 3 US cities Under Attack By Hackers.

The infrastructure systems of three US cities have been attacked, according to the Federal Bureau of Investigation.

At a recent cybersecurity conference, Michael Welch, deputy assistant director of the FBI's cyber division, said hackers had accessed crucial water and power services.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Apple Crash Reports Help Hackers to create a jailbreak exploit.

iPhone "jailbreaking" has been a hot topic since Apple released its smartphone more than two years ago. According to the Latest report posted by BBC that Thousands of iPhone owners have joined forces with a team of hackers to help them find new ways to jailbreak Apple's phone software & Jailbreakers use Apple crash reports to unlock iPhones.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Data Center Post: Protect Your Organization Against Emerging HTML5 Threats.

Influential organizations and browsers such as Google, Facebook, PayPal and YouTube are already backing the move to HTML5 and the expansion into well-known media and browser outlets. HTML5 is a necessary transition for industries in need of a new method for content delivery.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Starbucks Wifi and Other Public Networks: Be Cautious.

though the coffee conglomerate has transacted over 26 million mobile payments since January 2011, all this financial information could turn into a public relations nightmare if the Wifi network and data servers are not secure.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Quarri Prevents Users From Copying Sensitive Data on Android Devices.

Quarri Technologies is extending its endpoint security platform to Android devices, calling the mobile operating system the "second-largest attack surface," according to company executives.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Terrorism threat raises spending on security technology.

The heightened risk of terrorist attacks, especially from elements believed to be linked to the Al-Shabaab terrorist network from Somalia, is forcing investors in Kenya to increase spending on security technology, boosting the balance sheet of companies.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

CompTIA Offers Mobile App Security Certification.

CompTIA and viaForensics are collaborating to launch a secure mobile application developer credential and security testing service scheduled for availability in the first half of 2012.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

CompTIA Offers Mobile App Security Certification.

CompTIA and viaForensics are collaborating to launch a secure mobile application developer credential and security testing service scheduled for availability in the first half of 2012.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Flash Player SMS scam charges victims for free Adobe software.

BitDefender has uncovered a creative scheme that charges people via SMS for what should be a free copy of Adobe Systems' Flash player, which is apparently undergoing a test run on a Russian social network.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Online crime makes more money than drug cartels.

Online crime groups make more money than drug cartels worldwide, and arresting these cybercriminals can be exceedingly difficult. This startling revelation was made by representatives of the Organization of American States (OAS) at a regional meeting on cyber security in Barbados earlier this month.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Feds Indict 55 For Cyber Crime Fraud.

Federal authorities Friday announced the indictment of 55 people for participating in a cyber crime fraud ring that relied on insiders to steal hundreds of people's personal details from a bank and a car dealer, among other organizations.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Microsoft to Force New Internet Explorer on Users.

Millions of users now running outdated versions of Microsoft's Internet Explorer (IE) web browser will soon be forced by Microsoft to use newer versions of its proprietary browser.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Giving gift cards safely.

Gift cards are all the rage this year. According to the National Retail Federation, the average consumer spent $145 on gift cards during the 2010 holiday season

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter,HackItSecure

Law Enforcement Warns of Rise in "Relative in Distress" Scams.

Los Angeles County residents are being warned of an increase in the number of reports by victims of telephone scams where a caller impersonates a family member in distress.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Monday, December 19, 2011

FCC official delivers warning on threat to ‘Internet freedom’

The 193-member International Telecommunications Union (ITU), a U.N. agency, will meet in Dubai next December to renegotiate the 24-year-old treaty that deals with international oversight of the Internet. A growing number of countries are pushing greater governmental control and management of the Web’s availability, financial model and infrastructure.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

US Homeland Security beefing up presence in NM.

ALBUQUERQUE, N.M. — In May, around dozen undercover federal agents were dispatched to Roswell, N.M., a city of 48,000 known for its annual UFO festival. For months, agents followed "small time drug dealers" and gang members, many of whom had been terrorizing this quiet section of rural southeast New Mexico for years while overwhelmed local law enforcement agencies cried out for help.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

India, Mumbai: Cybercrime on the rise, but not all cases getting reported.

The official cybercrime numbers also do not match the findings of security reports. For instance, the Norton Cybercrime Report 2011, released in September by research firm Symantec Corp., estimated that nearly 30 million people were victims of cybercrime in 2010, suffering $4 billion in direct financial losses and an additional $3.6 billion in time spent resolving the crime.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Romania, FBI crack down on cyber crime.

Experts say cyber crime has found fertile ground in Romania, where schools provide high-level IT training. But harsh economic conditions make it difficult for graduates to find jobs, making them easy prey for crime rings seeking recruits.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Most young professionals shun IT policies.

The Cisco Connected World Technology Report reveals that 70pc of young employees frequently ignore IT policies and go to great lengths to stay connected to the internet, even if it compromises their company or their own security.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Firms Bid on NATO Cyberwar.

The North Atlantic Treaty Organization on Monday will collect bids from some of the world's top defense companies, including Lockheed Martin Co. and Northrop Grumman Corp., to update and expand the alliance's cybersecurity abilities.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Windows 8 will have picture password sign in.

As much as security experts would like for it to be otherwise, experience has taught us that no matter how many times some people are lectured on the use of complex passwords, a good number of them will always go for short, simple, easy-to-remember (but also to guess!) ones.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

India, New Delhi - Security Cameras As Planning Tools.

A camera system is being unveiled in the Indian capital of New Delhi that has a lot more than security on its mind. New Delhi's new cameras are also designed to help advance a citywide 3D GIS mapping project for urban planning efforts. The first of 63 cameras was installed earlier this month, India Today reports, and they'll be used to take high-resolution images of the city.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Symantec, Internet Security Threat Report.

This year, Symantec is offering its annual report on the Internet threat landscape in a whole new way. With the online "Build Your Report" tool, you can create your own custom version of the Internet Security Threat Report by selecting only those topic areas in which you are most interested, then compiling your report.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Security, HP’s Unexpected Strength !

In 2009 and 2010, HP made two key acquisitions in the area of security: It spent $1.5 billion for ArcSight, a security software player. And before that it nabbed the networking concern 3Com for $2.7 billion, and a key asset in that deal was TippingPoint, a line network intrusion prevention products.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

VSS Monitoring Releases Industry's First Line-Rate Packet Reassembly.

VSS Monitoring's new defragmentation capabilities lower the cost of ownership on media and network intelligence tools by reducing CPU cycles on voice and video analyzers while increasing bandwidth for relevant traffic.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Virtual private network tools 'can improve security'.

.irtual private network equipment can reduce the risk of data loss and external attacks when working on open networks, it has been claimed.

According to Cisco, there are "significant" risks to organisations when employees use their own consumer devices in the workplace, if the necessary precautions are not taken.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

US relies on Central Asia route.

The United States is increasingly relying on three transit routes snaking through Central Asia, Russia and the Caucasus, to ship non-military supplies and fuel into Afghanistan as the deteriorating relationship between Washington and Pakistan closes off border crossings, according to a Senate report obtained by The Associated Press.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Lax UK border controls attacked in report.

A woman was allowed into the UK to live with a partner she claimed she had met on the internet despite being unable to prove that she had ever even spoken to him, a report into the UK Border Agency (UKBA) reveals.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Symantec Internet Security Threat Report.

The Norton Cybercrime Report 2011 reveals that 10 per cent of adults online have experienced cybercrime on their mobile. The advent of applications has been instrumental in turning mobile devices into a common computing platform and laying the foundation for tablets, which offer yet more consumer content.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Xbox LIVE not hacked insists Microsoft.

Microsoft has denied claims that Xbox LIVE has been hacked, despite reports suggesting the online gaming service had suffered a security breach exposing user data. The company took to its official Facebook page after UK newspaper The Sun alleged gamers had lost between £100 and £20o each ($156-313); in fact, Microsoft clarified, victims had been the unfortunate quarry of a phishing scam.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure,virus,worm,trojan,facebook,twitter

Big crime meets big data.

Data and social media are being used against us.

Malicious types of software, like viruses, worms, and trojans, are the main tools used to harvest personal data. Cyber criminals also use social engineering techniques, such as phishing emails populated with data gleaned from social networks, to trick people into providing further details.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Facebook Alternative: OnlyMeWorld Launches.

There is a growing concern over the handling of users' information, security, privacy, data mining, web tracking, and facial recognition software used by Facebook and other social networking sites.

The real issues people should be concerned about are: how much information Facebook and other social networking sites are collecting about them "Knowingly" versus. "Unknowingly".

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

FTC tells global Internet body to cut back domain name plan.

The FTC argues ICANN has failed to police the current set of domains, so adding more domains will make it even easier for scammers to game the naming system.

Already, tricksters engage in phishing schemes that spoof legitimate sites, such as Citibank.com, to trick unwitting depositors into entering account information on bogus sites by using similar names -- perhaps Citybanks.com or Citigroup.biz.


Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Sunday, December 18, 2011

Police Say Beware of Cyber Monday Scams, Identity Theft.

The FBI recommends shoppers buy gift cards from the actual retailers, and not from third parties, which may sell the cards for less than face value (say a $50 gift card for $45). Many times, the gift cards won't have any value and shoppers won't know until they try to use the card.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

New e-ID cards for increased Internet security ?

Professor Helmbrecht said: “It is highly impressive to see how complex and sophisticated the production line of this innovative ID card of the Bundesdruckerei is. These cards significantly improve IT security in the digital age

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Mesa County’s cyber disaster casts shadow.

Initially, authorities concluded more than 200,000 name files associated with personal, identifying information were exposed, but the estimate was scaled back.

“... Many of these items were duplicates,” the report said, adding it was determined approximately 105,000 unique records were exposed.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Can a hack force HP printers to burst into flame ?

Now that Columbia has shown the world this potential vulnerability, the Great Printer Hack of 2012 may be in the works right now.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Anonymous exposes cybercrime investigator's Gmail, voicemail.

A group of hackers operating under the banner of Anonymous' Operation AntiSec published the private e-mails of a California Department of Justice investigator. The hackers posted the entirety of the 38,000 e-mails in a Gmail account that appears to belong to Alfredo "Fred" Baclagan, a California Department of Justice special agent

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

The most famous (caught) Hackers of 2011.

Although there are many subtle hackers who are always able to evade law enforcement authorities, however, failed this year to achieve impressive gains in arrests and charges. Here is a list of the most sensational cases of the year.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

Odds of hacker 'shenanigans' during the presidential primaries are high.

Expect hackers to try to disgrace presidential candidates with electronic extortion and other forms of digital deception during the upcoming primaries, say some former hackers and computer security specialists.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure

DOD's Private Sector Opportunity.

The Department of Defense (DoD) is seeking DoD or private sector employees working in the information technology field to participate in DoD's Information Technology Exchange Program pilot.

Continue reading ...
hack, hacking, it security, network security, cloud computing, cyber crime, DOJ Cyber crime, FBI Cyber crime, International Cyber crime, Homeland Cyber Security, Homeland Security, secure