Blog Posts Tagged with "FBI"
January 10, 2011 Added by:Headlines
The website of the second largest political party in Ireland, Fine Gael, has been breached by hackers associated with the international script-kiddie movement known as Anonymous. Fine Gail's recently launched website was defaced, and the following message was inserted...
January 03, 2011 Added by:Headlines
What the so-called "leaders" of the Anonymous minions failed to relay to the participants in the DDoS attacks is that the LOIC tool would send their IP addresses along with every packet during the attack. The FBI will use the IP addresses to identify those who participated in the attack...
December 30, 2010 Added by:Headlines
An FBI affidavit obtained by The Smoking Gun identifies members of Anonymous and 4chan as being the primary suspects in the DDoS attack, and the servers seized in the Tailor Made Services raid are likely to contain evidence of the attack and clues to some of the participants...
December 27, 2010 Added by:Headlines
U.S. District Judge Lewis Kaplan issued an opinion on the use of "roving bugs" for criminal investigations, confirming suspicions that the FBI was employing the technique of listening to nearby conversations via a suspect's cell phone mic...
December 06, 2010 Added by:Headlines
The nefarious Zeus Trojan has been modified to target enterprise bank accounts. Zeus had previously netted millions of dollars after spreading through tainted emails and communications designed to look like messages from the popular business-oriented social networking service LinkedIn...
November 24, 2010 Added by:David Navetta
November 9, marked the 2 millionth consumer complaint filed with the IC3. This milestone is all the more notable because it took seven years for the IC3 to receive its first million complaints. The second million arrived in less than half the time - just under 3.5 years....
November 17, 2010 Added by:Headlines
Creating systems to easily and quickly un-encrypt data could produce a threat to sensitive information that would otherwise remain secure. The widely publicized Aurora attacks originating in China used back-doors that were originally created to give the government easy access to communications..
November 16, 2010 Added by:Headlines
Statistics reported by the organization, which was was established as a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), indicate the losses from cyber crime have doubled in recent years...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013