Blog Posts Tagged with "FBI"
May 10, 2012 Added by:Headlines
The FBI and other agencies warn that malicious actors are targeting travelers with pop-up windows while establishing an Internet connection in their hotel rooms, infecting laptops with malicious software. Anyone who has been a target of this attack should contact the FBI and IC3...
May 09, 2012 Added by:Pierluigi Paganini
The FBI is working to obtain a backdoor for major social networks like Facebook and also for some of the most used communications platforms such as Skype and Instant Messaging for government surveillance, and is collaborating with companies like Microsoft, Google and Yahoo...
May 09, 2012 Added by:Headlines
Please act now. The clean servers maintained by the private sector in coordination with the FBI will expire on July 9, 2012. Internet users who have the DNSChanger malware and whose IS) has moved them to one of the clean servers, may not have access to the Internet after this date...
May 07, 2012 Added by:Pierluigi Paganini
Cybersecurity is identified as a priority issue to enhance the efficiency of prevention and incident response. The report invites federal and private sector partners to accelerate initiatives to enhance data collection, detect events, raise awareness, and respond to incidents...
May 02, 2012 Added by:Electronic Frontier Foundation
Most troubling is the collateral damage. The search warrant authorized seizure of emails, communications, and files on the server, and records of IP addresses connected to the server. And the server was used by a wide range of people who had nothing to do with the bomb threats...
April 30, 2012 Added by:Headlines
“By seizing the websites the criminal underground uses to blatantly sell stolen personal information, Operation Wreaking hAVoC shows that we are committed to protecting individuals online and preventing criminals from using the Internet to line their pockets..."
April 23, 2012 Added by:Headlines
The deadline for for systems infected with the DNS Changer malware is fast approaching. Failure to rid a device of the malware prior to the July 9 deadline could result in loss of Internet connectivity. To see if your system is infected, simply visit the following website...
April 19, 2012 Added by:Electronic Frontier Foundation
Documents prove warrantless cell phone tracking “has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show...
April 10, 2012 Added by:Headlines
"The FBI warns that insiders and individuals with only a moderate level of computer knowledge are likely able to compromise meters with low-cost tools and software readily available on the Internet..."
April 05, 2012 Added by:Infosec Island Admin
Social networking sites have created a revolution in connectivity. However, con artists, criminals, and other actors are exploiting this capability for nefarious purposes. There are primarily two tactics used to exploit social networks. In practice, they are often combined...
April 03, 2012 Added by:Scot Terban
The terrorists may aspire to this, as nebulous as that aspiration can be from an image like the one in question. This in NO WAY means we are doomed or that NYC will be seeing an attack like 9/11 again directly relating to this piece of so called artwork...
March 27, 2012 Added by:Headlines
Chaney admitted he hacked into the e-mail accounts by taking the victims’ e-mail addresses, clicking on the “Forgot your password?” feature, then re-setting the passwords by answering security questions using publicly available information he found on the Internet...
March 26, 2012 Added by:Headlines
Hackers had used the Zeus Trojan, which would embed itself in victims’ computers and recorded their keystrokes as they logged into their online bank accounts, to steal money from small and mid-sized businesses throughout the United States...
March 23, 2012 Added by:Electronic Frontier Foundation
The U.S. Supreme Court’s decision has been lauded as a landmark ruling and the FBI's own lawyer commented that it is perceived as a sea change within the FBI. And now its impact is starting to work its way through the judicial system as courts evaluate warrantless use of GPS devices...
March 23, 2012 Added by:Headlines
After a five week trial, four defendants have been convicted for their roles in one of the largest bank fraud and identity theft schemes in California history, with dozens of victims in four states and millions of dollars in losses...
March 22, 2012 Added by:Bill Gerneglia
Cybercrime is a relatively new phenomenon but because of its recent scale and game-changing implications for both government and industry it is rapidly becoming the dominant risk theme of the 21st century. The opportunity for cyber attacks grows daily...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013