Browsing Category: Social Engineering

[img_assist|nid=2103|title=|desc=|link=none|align=left|width=100|height=100]Two Bulgarians have been sentenced for their roles in an online
money-laundering scheme that collected about $1.2 million from U.S.
residents and sent it to a criminal group in Eastern Europe, the U.S.
Department of Justice said. Read the full article. [Computerworld]

Read more...

[img_assist|nid=2105|title=|desc=|link=none|align=right|width=100|height=100]Although the combined number of reported data breaches in the
government and the military has dropped in 2009 compared to last year,
many more records were compromised in those breaches, according to
recent figures compiled by the Identity Theft Resource Center. Read the full article. [Government Technology]

Read more...

[img_assist|nid=2079|title=|desc=|link=none|align=left|width=129|height=44]A Cyber Forensics panel at the U.S Spy Museum discussed data breaches and the effects one bad hacking event can have; The panel discussion included the CEO of Heartland Payment Systems, whose company was the victim of a very large, very publicized data breach in 2008. Read the full article. [Dark Reading]

Read more...

Categories: Social Engineering

[img_assist|nid=2075|title=|desc=|link=none|align=left|width=100|height=100]Facebook was built as a powerful social connector, allowing users to befriend others with similar interests, locations, schools, and more. But as privacy concerns mount and users demand more protection, the social networking site’s philosophy has started to go down the toilet. Now that Facebook is eliminating regional networks — or groupings of people based on where they live — it’s becoming apparent that proclivities lean towards building fences rather than crossing them. Read the full story [PCWorld].  Also see: How to protect your privacy on Facebook and Twitter.

Read more...

[img_assist|nid=2070|title=|desc=|link=none|align=right|width=100|height=100]Malware attacks and infections are up 50 percent from 2008 and losses are down, according to a Computer Security Institute report, but the industry organization says very few companies are willing to disclose dollar amounts. Read the full article. [Security Focus]

Read more...

[img_assist|nid=2072|title=|desc=|link=none|align=left|width=100|height=100]Michael A. Roseboro, a/k/a “Mike Ross,” a/k/a “Michael Johnson,” a/k/a
“Michael Smith,” was sentenced on November 25 to 116 months in prison
for his participation in a massive identity-theft and credit card fraud
scheme in which he targeted and stole the identities of at least 176
dentists. Read the full article. [DataBreaches.net]

Read more...

[img_assist|nid=2063|title=|desc=|link=none|align=left|width=100|height=100]A consortium of cybersecurity researchers from MIT, Purdue and Carnegie Mellon was announced in Washington D.C. with the stated goal is to collaborate on cybersecurity research including 10 projects, one which is the development of an Internet-scale model on which to perform
constrained experiments not possible on the live Internet. Read the full article. [TechTarget]

Read more...

[img_assist|nid=2062|title=|desc=|link=none|align=right|width=100|height=100]Microsoft released data collected from an FTP-server
honeypot, showing that attempts to guess passwords continue to focus on
the low-hanging fruit: passwords with an average length of eight
characters, with “password” and “123456” being the most common. Read the full article. [Security Focus]

Read more...