Blog Posts Tagged with "FBI"

03b2ceb73723f8b53cd533e4fba898ee

FBI on Bitcoin: Cybercrime, Opportunity and Digital Choice

May 11, 2012 Added by:Pierluigi Paganini

The real danger of digital money, above the vulnerabilities in its processes, is the inability of governments to exert control over finances, which could lead to a distortion of the main mechanisms of economic control and taxation, bringing total chaos to the market...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Malware Spreading Through Hotel Internet Connections

May 10, 2012 Added by:Headlines

The FBI and other agencies warn that malicious actors are targeting travelers with pop-up windows while establishing an Internet connection in their hotel rooms, infecting laptops with malicious software. Anyone who has been a target of this attack should contact the FBI and IC3...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

The FBI, Content Monitoring, Backdoors and Going Dark

May 09, 2012 Added by:Pierluigi Paganini

The FBI is working to obtain a backdoor for major social networks like Facebook and also for some of the most used communications platforms such as Skype and Instant Messaging for government surveillance, and is collaborating with companies like Microsoft, Google and Yahoo...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

DHS Comments on DNSChanger Malware Deadline

May 09, 2012 Added by:Headlines

Please act now. The clean servers maintained by the private sector in coordination with the FBI will expire on July 9, 2012. Internet users who have the DNSChanger malware and whose IS) has moved them to one of the clean servers, may not have access to the Internet after this date...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

US Cybersecurity Capability: National Preparedness Report

May 07, 2012 Added by:Pierluigi Paganini

Cybersecurity is identified as a priority issue to enhance the efficiency of prevention and incident response. The report invites federal and private sector partners to accelerate initiatives to enhance data collection, detect events, raise awareness, and respond to incidents...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

FBI Overreaches with May First - Riseup Server Seizure

May 02, 2012 Added by:Electronic Frontier Foundation

Most troubling is the collateral damage. The search warrant authorized seizure of emails, communications, and files on the server, and records of IP addresses connected to the server. And the server was used by a wide range of people who had nothing to do with the bomb threats...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Domains Selling Stolen Credit Card Numbers Seized

April 30, 2012 Added by:Headlines

“By seizing the websites the criminal underground uses to blatantly sell stolen personal information, Operation Wreaking hAVoC shows that we are committed to protecting individuals online and preventing criminals from using the Internet to line their pockets..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Checking Your System for the DNS Changer Malware

April 23, 2012 Added by:Headlines

The deadline for for systems infected with the DNS Changer malware is fast approaching. Failure to rid a device of the malware prior to the July 9 deadline could result in loss of Internet connectivity. To see if your system is infected, simply visit the following website...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Warrantless Cell Phone Tracking, Drones, and FBI Surveillance

April 19, 2012 Added by:Electronic Frontier Foundation

Documents prove warrantless cell phone tracking “has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

FBI Increasingly Concerned About Smart Meter Hacks

April 10, 2012 Added by:Headlines

"The FBI warns that insiders and individuals with only a moderate level of computer knowledge are likely able to compromise meters with low-cost tools and software readily available on the Internet..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The FBI Discusses Internet Social Networking Risks

April 05, 2012 Added by:Infosec Island Admin

Social networking sites have created a revolution in connectivity. However, con artists, criminals, and other actors are exploiting this capability for nefarious purposes. There are primarily two tactics used to exploit social networks. In practice, they are often combined...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Coming Soon: FUD FUD FUD!

April 03, 2012 Added by:Infosec Island Admin

The terrorists may aspire to this, as nebulous as that aspiration can be from an image like the one in question. This in NO WAY means we are doomed or that NYC will be seeing an attack like 9/11 again directly relating to this piece of so called artwork...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Pleads Guilty to Celebrity Computer Intrusions

March 27, 2012 Added by:Headlines

Chaney admitted he hacked into the e-mail accounts by taking the victims’ e-mail addresses, clicking on the “Forgot your password?” feature, then re-setting the passwords by answering security questions using publicly available information he found on the Internet...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Bank Fraud Hacker Sentenced

March 26, 2012 Added by:Headlines

Hackers had used the Zeus Trojan, which would embed itself in victims’ computers and recorded their keystrokes as they logged into their online bank accounts, to steal money from small and mid-sized businesses throughout the United States...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Supreme Court Decision on GPS Surveillance Ripples

March 23, 2012 Added by:Electronic Frontier Foundation

The U.S. Supreme Court’s decision has been lauded as a landmark ruling and the FBI's own lawyer commented that it is perceived as a sea change within the FBI. And now its impact is starting to work its way through the judicial system as courts evaluate warrantless use of GPS devices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Four Convicted for Roles in Massive Identity Theft Ring

March 23, 2012 Added by:Headlines

After a five week trial, four defendants have been convicted for their roles in one of the largest bank fraud and identity theft schemes in California history, with dozens of victims in four states and millions of dollars in losses...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »