Blog Posts Tagged with "Law Enforcement"

69dafe8b58066478aea48f3d0f384820

Microsoft and Law Enforcement Hit Zeus Botnet Servers

March 26, 2012 Added by:Headlines

"With this legal and technical action, a number of the most harmful botnets using the Zeus family of malware worldwide have been disrupted in an unprecedented, proactive cross-industry operation against this cybercriminal organization..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Bank Fraud Hacker Sentenced

March 26, 2012 Added by:Headlines

Hackers had used the Zeus Trojan, which would embed itself in victims’ computers and recorded their keystrokes as they logged into their online bank accounts, to steal money from small and mid-sized businesses throughout the United States...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

IP Address Leads Police to Shootout with French Terrorist

March 24, 2012 Added by:Dan Dieterle

Elite French special operation RAID Police took down the radical Muslim terrorist Mohamed Merah on Thursday. Merah had contacted one of his victims, a French soldier, on the pretext of buying his scooter. Investigators were able to match Merah to his IP address...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Supreme Court Decision on GPS Surveillance Ripples

March 23, 2012 Added by:Electronic Frontier Foundation

The U.S. Supreme Court’s decision has been lauded as a landmark ruling and the FBI's own lawyer commented that it is perceived as a sea change within the FBI. And now its impact is starting to work its way through the judicial system as courts evaluate warrantless use of GPS devices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Four Convicted for Roles in Massive Identity Theft Ring

March 23, 2012 Added by:Headlines

After a five week trial, four defendants have been convicted for their roles in one of the largest bank fraud and identity theft schemes in California history, with dozens of victims in four states and millions of dollars in losses...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks are Fastest Growing National Security Threat

March 22, 2012 Added by:Bill Gerneglia

Cybercrime is a relatively new phenomenon but because of its recent scale and game-changing implications for both government and industry it is rapidly becoming the dominant risk theme of the 21st century. The opportunity for cyber attacks grows daily...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Wireless Security: Wi-Fi Hacking Burglars Get Busted

March 22, 2012 Added by:Robert Siciliano

Once a Wi-Fi network was located through wardriving, the hackers remotely watched for information that revealed the network’s security setup and vulnerabilities. Police said they used sophisticated electronic equipment to break through networks with WEP protection...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Digital Posse Comitatus: Generals Obfuscate and Inveigle Congress

March 21, 2012 Added by:Infosec Island Admin

9/11 opened the floodgates to the world of warrantless wiretaps and surveillance culture we now have and diminished the lines between military and civilian agencies collection and alleged sharing of data. In the case of the NSA though, the abilities were always there...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

On Security, Legislation and Cloud Vendors

March 16, 2012 Added by:Ben Kepes

Ever since the MegaUpload case, when innocent customers of an admittedly generally dodgy cloud service lost their data after a global take-down notice, it has concerned me that more mainstream vendors might have an impending issue they need to think about...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

Who Fights for the Users? Part II: FBI's AntiSec

March 15, 2012 Added by:Ali-Reza Anghaie

News is rampant with speculation that the FBI created AntiSec as a sting operation. I'm going to a further extreme to explore this - yes, conspiratorial. Cans of conspiracy worms get opened and they can't ever be closed. Something Government should strive to avoid...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Sabu: The Latter Day Joey Pardella - Oh There Will be Lulz!

March 11, 2012 Added by:Infosec Island Admin

As the press is now digging into his past and finding all the fidly bits about Sabu, they turned up a big one in the fact that Monsegur attended Stuyvesant High in NYC, which is the very same high school where they filmed the cult hacker hit “Hackers” back in 1995. Smirk...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

So Long and Thanks for All the Lulz...

March 07, 2012 Added by:Infosec Island Admin

The Sabu fallout will damage Anonymous like a neutron bomb - it won’t destroy the structures, but the radiation will kill everything around. Some ideas are just bad, and most of the bad ideas are cooked up by guys like Monsegur. It turns out that the lulz is ultimately on Sabu...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Issues Press Release on Anonymous - LulzSec Arrests

March 06, 2012 Added by:Headlines

Four Principal Members of “Anonymous” and “LulzSec” charged with computer hacking and fifth member pleads guilty; “AntiSec” member also charged with stealing confidential information from approximately 860,000 clients and subscribers of Stratfor...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Lulzer Sabu Turns in Top Anonymous Leadership

March 06, 2012 Added by:Headlines

Fox News reports that infamous LulzSec leader known as Sabu has been working with law enforcement for months to investigate key members of the anonymous movement, resulting in multiple arrests of key Anonymous conspirators...

Comments  (0)

Ecadf7bc12303bf9d93a73b5ea4a6ace

Don't Be Naïve about Anonymous or the Occupy Movement

February 22, 2012 Added by:Robin Jackson

If you are an information security professional, then I urge you to quit worrying about what conferences you're going to speak at and get serious about shoring up the defenses of every computer system that you are responsible for immediately...

Comments  (4)

7fef78c47060974e0b8392e305f0daf0

Social Media Monitoring: A Rubric for Control

February 21, 2012 Added by:Infosec Island Admin

We have become a watched commodity via all means of communication. Programs have been put together with the veneer of protecting us from another 9/11 and perhaps some of them were made with the best of intentions, but this idea of monitoring social media is half baked...

Comments  (2)

Page « < 2 - 3 - 4 - 5 - 6 > »