Items Tagged with "internet"


3e35900ae6facc6c146a85c435c71d82

The Rise of the Virtual-Plagiarist

August 13, 2012 Added by:Ben Rothke

Amazon is a prime feeding ground for the virtual-plagiarist given that Amazon makes a profit off everything sold, and they have no incentive to stop such practices as it would affect their profitability. Amazon takes a kid-gloves approach to plagiarism. That is all the more true for virtual-plagiarized text...

Comments  (3)

03b2ceb73723f8b53cd533e4fba898ee

Traveling the Silk Road: A Study of the Online Black Market

August 10, 2012 Added by:Pierluigi Paganini

I've found some interesting research conducted by Carnegie Mellon computer security professor Nicolas Christin on the earnings of one of the most famous black markets in the Deep Web, the Silk Road. It seems to be able to realize $22 Million in annual revenues related to the drug market...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Online Threats That Will Throw You Off the Security Balance Beam

August 09, 2012 Added by:Kelly Colgan

We can’t sugarcoat it, because there’s more at stake for online users than going for gold or settling for silver. One blip on the beam or pratfall on the pommel can make a bank-account balance drop faster than an icy judge’s score. And it’ll take more than a Wheaties box to build it back...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Newest U.S. Counter-Terrorism Strategy: Trolling

August 08, 2012 Added by:Infosec Island Admin

The State Department has given the go ahead to a 20-something to put together a coalition of people across the globe to subtly troll the jihadi’s online in the hope that it will shame them into dropping the notions of radical jihad. Why am I surprised that a hair brained scheme like this would come out of State?

Comments  (0)

F29746c6cb299c1755e4087e6126a816

The Bad Guys Know You’re an Olympics Addict

August 08, 2012 Added by:Kelly Colgan

The emerging theme from these Summer Games: There’s a general lack of awareness among consumers and end users about possible threats when they’re online. Even with corporate security professionals on high alert, it is ultimately end users and consumers who will make the choice that infects the system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Student Pleads Guilty to Counterfeiting Coupons on the Internet

August 07, 2012 Added by:Headlines

In addition to creating and disseminating fake coupons, Henderson also wrote tutorials and created templates he posted online and that provided instructions for creating counterfeit coupons using their own computers. Henderson’s scheme caused retailers and manufacturers to lose approximately $900,000....

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Psychopathy Tweets: Too Many Statistics, Not Enough Proof of Concept

August 01, 2012 Added by:Infosec Island Admin

What I came out with, after many slides of numbers, was “nope not really”, which I pretty much had thought before. There are just too many variables to this type of venture and you would need to have a trained psychoanalyst to talk to the individual to determine whether or not they are a true psychopath...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Cyber: Boundless Nonsense

July 31, 2012 Added by:Don Eijndhoven

What is neutral behavior in the context of cyber warfare? Are you, as a neutral country obliged to drop all traffic between these two waring nations that crosses your networks? And if you’re not, are you obliged to make sure none of the cyber attacks are originating from compromised systems within your borders?

Comments  (8)

7fef78c47060974e0b8392e305f0daf0

Detecting Psychopathy via Tweets? A Flawed Premise...

July 25, 2012 Added by:Infosec Island Admin

It seems to me that more and more we are being collectively mined not only for our habits, but now our emotions as well as our psychological makeups. All of this could potentially be collated from numerous sources. I doubt we will ever be able to contextualize the human psyche just from internet datum…

Comments  (2)

D03c28fd5a80c394905c980ee1ecdc88

Take Social Media Privacy into Your Own Hands

July 23, 2012 Added by:Bill Mathews

I've gotten in a lot of arguments lately about the end-user side of technology - privacy. Many in the security industry already know most of the things people are discovering, and have screamed warnings from the mountaintops to the folks below. Alas, this is the woe of being a security engineer...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Ad Biz Disregards User Choices to Safeguard "Cybersecurity"

July 19, 2012 Added by:Electronic Frontier Foundation

Senator Rockefeller was skeptical about the industry’s claims that they needed to engage in pervasive tracking for cybersecurity purposes. He stated: “I just want to declare the whole cybersecurity matter a total red herring.” We agree that strong cybersecurity does not necessitate surveillance of our browsing habits...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

DHS: Cybersecurity Awareness and the Summer Olympics

July 19, 2012 Added by:Infosec Island Admin

Hackers frequently take advantage of highly-publicized events and popular news to get users to click on fraudulent links and unknowingly download malware onto their computers, smart phones, tablets, and other wireless devices. To avoid these online scams, it's important to follow these practices...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Government Agencies Gain Emergency Internet Control

July 16, 2012 Added by:Stefano Mele

"Survivability, resilient, enduring, and effective communications, both domestic and international, are essential to enable the executive branch to communicate... Such communications must be possible under all circumstances to ensure national security, effectively manage emergencies, and improve national resilience..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI: More Arrests in International Cyber Crime Takedown

July 13, 2012 Added by:Headlines

"The FBI announced three more arrests arising from Operation Card Shop, an international operation aimed at sophisticated, highly organized cyber criminals involved in buying and selling stolen identities, exploited credit cards, counterfeit documents, and sophisticated hacking tools..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Does it Take to be Digitally Secure?

July 09, 2012 Added by:Robert Siciliano

It’s no longer possible to deny that your life in the physical world and your digital life are one and the same. While you are present here on the ground, you also exist online, whether you know it or like it or not. Coming to terms with this reality will help you make better decisions in many aspects of your life...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

DNSChanger Malware Deadline: July 9th Has Arrived

July 09, 2012 Added by:Pierluigi Paganini

Despite the calls to check for infected units provided by the press and law enforcement, too many PCs are still infected and potentially vulnerable to the planned blackout. The estimation is that 64,000 users in the United States, plus an additional 200,000 users outside the United States are still at risk...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »