Browsing Category: Social Engineering

A federal cybersecurity law edged closer to reality late last week when the Senate Judiciary Committee approved a bill to protect the personal data of Americans. The bill is a bipartisan effort sponsored by Chairman Patrick Leahy, D-Vt., and co-sponsored by former Chairman Orrin Hatch, R-Utah, that would, among other things, force companies and data brokers to institute data privacy and security programs. Some technology professionals surveyed don’t think the Federal law will do much to help. Read the full article. [CSOonline.com] 

Read more...

[img_assist|nid=1653|title=|desc=|link=none|align=left|width=115|height=115]Human error is to blame for the accidental exposure last week of
more than 4,500 Chaminade University student’s Social Security numbers
on the private Catholic college’s official Web site. University officials discovered the snafu Wednesday and quickly removed the obscure but accessible links from the Web site. The students’ Social Security numbers were exposed for about
eight months, according to a statement released by the Honolulu-based
university. Read the full article. [internetnews.com]

Read more...

[img_assist|nid=1647|title=|desc=|link=none|align=right|width=115|height=115]As of this morning, an anonymous group hijacked more than 200 Facebook groups and renamed them “Control Your Info”. Pasted on each group’s Wall was a message announcing that it had been “hijacked” and reminding members to be careful about controlling personal information on social networking sites. “This means we control a certain part of the information about you on
Facebook. If we wanted we could make you appear in a bad way which
could damage your image,” the message said. Read the full article. [Computerworld] 

Read more...

[img_assist|nid=1624|title=|desc=|link=none|align=right|width=115|height=115]Mohamed Abdel-Mottaleb, professor and chair in the UM Department of
Electrical and Computer Engineering has developed state-of-the-art
systems capable of photographing an image of someone’s face and ear and
comparing it against pre-stored images of the same person, with 95-100
percent accuracy. Read the full article. [Science Daily]

Read more...

The latest MySpace attac[img_assist|nid=1616|title=|desc=|link=none|align=left|width=115|height=115]k tries to lure recipients into giving up their
MySpace credentials, and then attempts to trick victims into installing
password-stealing malicious software. Attackers began blasting out the junk e-mails early Monday, according to researchers at the University of Alabama, Birmingham, Researchers at the school so far have tracked more than 30 Web site names associated with this attack, each beginning with “accounts.myspace.com” and ending in a United Kingdom country code domain (.uk). Read the full article. [Washington Post] 

Read more...

Categories: Social Engineering

[img_assist|nid=1595|title=|desc=|link=none|align=left|width=115|height=115]A team of Catalan researchers has developed a protocol to distort the
user profile generated by Internet search engines, in such a way that
they cannot save the searches undertaken by Internet users and thus
preserve their privacy.  Read the full story [Science Daily]

Read more...

Individual [img_assist|nid=1443|title=|desc=|link=none|align=right|width=115|height=115]data compromised in a data breach is four times more likely to be used for identity theft finds Javelin Research in a multi-year study. Another key finding cited: Most consumers do not see the link between breaches and identity theft. “[D]espite 19.5 percent of breach victims
suffering some kind of fraud in the past year, only 2 percent attribute
their fraud to the breach.” Read the full article. [Dark Reading]

Read more...

The[img_assist|nid=1529|title=|desc=|link=none|align=left|width=115|height=115] state of Maryland tested a new cryptographic voting system on Election day that allowed users to confirm their votes online, as well as allow anyone to independently audit the system. Scantegrity is an optical-scan, open-source system that uses a combination of paper ballots and unique cryptographic codes inside the ballots. It was designed by David Chaum and researchers from MIT, Univ. of Maryland, George Washington Univ., the Univ. of Ottawa, and the Univ. of Waterloo. Read the full article. [Wired]

Read more...

Martin Quoc Pham, 28, of Garden Grove was sentenced by a judge to 11 [img_assist|nid=1443|title=|desc=|link=none|align=right|width=115|height=115]years in Federal prison for spearheading an identity theft ring targeting home equity lines. The compromised accounts of JP Morgan Chase customers were fraudulently accessed and lines of credit were stolen including nearly $1 million that was transferred to accounts controlled by the ring.

Read more...

The U.S. C[img_assist|nid=1138|title=|desc=|link=none|align=right|width=120|height=186]omputer Emergency Readiness Team warned BlackBerry users on Tuesday about a new program called PhoneSnoop that allows someone to remotely eavesdrop on phone conversations.The PhoneSnoop application must be installed on the phone by someone who has physical access to it or by tricking the user into downloading it, the CERT advisory said. Read the full story [CNET/Elinor Mills]

Read more...