• Report: U.S. companies should consider counter-hacking Chinese hackers

    A group studying how the United States should respond to the sustained campaign of cyberattacks conducted by Chinese government hackers against U.S. companies, said the United States should seriously consider a campaign of retaliatory cyberattacks against the hackers.

  • Criminals may use new channels to trigger mobile malware

    Researchers have uncovered new hard-to-detect methods that criminals may use to trigger mobile device malware that could eventually lead to targeted attacks launched by a large number of infected mobile devices in the same geographical area. Such attacks could be triggered by music, lighting or vibration.

  • House panel approves CISPA, angering privacy advocates

    The U.S. House Intelligence Committee passed a cybersecurity measure by an overwhelming vote, a measure which privacy advocates dislike because, they argue, it does not protect the personal information of citizens.

  • DHS, international tech-crime investigative body, partners on cybersecurity

    The High Technology Crime Investigation Association (HTCIA) said it would team up with DHS Stop. Think. Connect. Campaign’s National Network. The partnership will promote awareness of cyber security to industry, university, and government organizations nationwide.

  • view counter
  • Sponsors of CISPA to address nagging privacy concerns about the bill

    House Intelligence Committee chairman Mike Rogers (R-Michigan) and Ranking Member Dutch Ruppersberger (D-Maryland), sponsors of the Cyber Information Sharing and Protection Act (CISPA), say they are currently working on the draft to alleviate privacy concerns civil liberty advocates may have about the bill.

  • Cat Killer Sean Lynde MacKenzie moves to Cyber-Extortion, Cyber-Harassment

    Sean Lynde, who pled guilty in New York to criminal animal cruelty and cyber extortion, has now assumed the name “MacKenzie” and is expanding his cyber extortion activities. According to charges filed before the New York Supreme Court, Lynde is now purchasing Web site accounts using other people’s names, posting death threats and defamatory statements on these sites, and then trying to extort funds from the targets. Holding multiple drivers licenses, in multiple names, Lynde reflects how criminals increasingly use the Web to cyber extort businesses and individuals

  • view counter
  • Cat Killer Sean Lynde MacKenzie moves to Cyber-Extortion, Cyber-Harassment

    Sean Lynde, who pled guilty in New York to criminal animal cruelty and cyber extortion, has now assumed the name “MacKenzie” and is expanding his cyber extortion activities. According to charges filed before the New York Supreme Court, Lynde is now purchasing Web site accounts using other people’s names, posting death threats and defamatory statements on these sites, and then trying to extort funds from the targets. Holding multiple drivers licenses, in multiple names, Lynde reflects how criminals increasingly use the Web to cyber extort businesses and individuals

  • South Carolina exploring different cybersecurity plans

    Last month state officials in South Carolina discovered a massive breach at the Department of Revenue; the attack exposed 3.6 million social security numbers of residents in the state, 387,000 credit and debit card numbers, and information for 657,000 businesses as well as other personal information; now, officials are trying to figure out what security measures they need to take in order to prevent another attack

  • ICE, federal agencies train computer forensic investigators

    For the past fourteen years, U.S. Immigration and Customs Enforcement (ICE) has been responsible for training ICE officers and special agents to become computer forensic investigators; ICE teaches the class in conjunction with the U.S. Secret Service and the Internal Revenue Service

  • Wynyard Group takes New Zealand Police forensics solution global

    Developed in 2007, New Zealand Police technology called EVE (Environment for Virtualized Evidence) allows enforcement officers rapidly to analyze seized electronic goods such as mobile phones, PCs, and other storage devices for evidence and intelligence

  • FTC charges businesses exposed sensitive information on P2P file-sharing networks

    The U.S. Federal Trade Commission (FTC) has charged two businesses with illegally exposing the sensitive personal information of thousands of consumers by allowing peer to peer file-sharing software to be installed on their corporate computer systems

  • June is National Internet Safety Month

    Private organizations and government agencies collaborate in promoting June as National Internet Safety Month; the sponsors encourage all Internet users to follow three simple steps when connecting to the Web: STOPTHINKCONNECT; the National Cyber Security Alliance also encourages Internet users to take a few moments to teach a young person about better online safety so that they use good judgment and behavior all-year long

  • SAIC Launches Inaugural Utah Cyber Defense Challenge and Symposium 2012

    SAIC will lead a Utah statewide cyber competition and symposium designed to raise cyber awareness across government, academia, and industry; the Utah Cyber Defense Challenge and Symposium (UCDC) 2012, to be held 1 June

  • Texas fights identity theft

    Everything is bigger in Texas, including the number of instances of identity manipulation; according to an April report from ID Analytics, the cities of Beaumont and El Paso lead the nation in per-capita identity manipulation attempts

  • Companies hiring hackers to harden defenses

    To burglar-proof your home, it is best hire a burglar as a consultant, as he is more likely to find the security vulnerabilities and demonstrate how they can be exploited; following this approach, companies large and small are now hiring hackers to test the companies’ security system vulnerabilities and find ways to harden these systems to withstand intrusion