Browsing Category: Social Engineering

[img_assist|nid=2546|title=|desc=|link=none|align=left|width=100|height=100]On January 1, 2010, two important state data security and privacy laws
took effect in Nevada and New Hampshire that create new
obligations for most companies that do business in Nevada and for
health care providers and business associates in New Hampshire. Read the full article. [Hunton & Williams Law Blog]

Read more...

[img_assist|nid=2531|title=|desc=|link=none|align=left|width=100|height=100]Banks, military contractors and software companies, along with federal
agencies, are looking for “cyber ninjas” to fend off a sophisticated
array of hackers, from criminals stealing credit card numbers to
potential military adversaries. Read the full article. [NY Times]

Read more...

[img_assist|nid=2530|title=|desc=|link=none|align=right|width=100|height=100]The FBI is investigating the theft of nearly a half million dollars
from tiny Duanesburg Central School District in upstate New York, after
cyber thieves tried to loot roughly $3.8 million from district online
bank accounts last month. Read the full article. [KrebsonSecurity]

Read more...

[img_assist|nid=2461|title=|desc=|link=none|align=right|width=88|height=100]Notorious hacker Albert Gonzalez pleaded guilty Dec. 29 to conspiracy to hack into the computer networks of Heartland Payment Systems, 7-11 and Hannaford Brothers and faces sentencing between 17 and 25 years on top of his previous guilty plea for the TJX breach and others. Read the full article. [eWEEK]

Read more...

[img_assist|nid=2439|title=|desc=|link=none|align=left|width=100|height=100]At the 26th Chaos Communication Congress in Berlin, security researcher Fabian Yamaguchi demonstrated a number
of vulnerabilities that can apparently be found in many average
communication networks and affect all levels from the access layer to
the application layer. Read the full article. [The H Security]

Read more...