Blog Posts Tagged with "internet"


On the Underground Economy of Twitter Followers

May 06, 2012 Added by:Gianluca Stringhini

All Twitter Account Markets we analyzed offer both "free" and "premium" versions. While premium clients pay for their services, the free ones gain followers by giving away their Twitter credentials - a clever way of phishing - or by sending out "promoted" content, typically spam...

Comments  (0)


Firewalls and Anti-Virus Aren't Dead - Should They Be?

May 04, 2012 Added by:Beau Woods

Decreasing the effectiveness of firewalls and antivirus in is the way they're used. Because of the massive number of connections in and out of a network, definitions of what is and is not allowed and exactly how to allow or deny network connections have become a sprawling mess...

Comments  (4)


FBI Overreaches with May First - Riseup Server Seizure

May 02, 2012 Added by:Electronic Frontier Foundation

Most troubling is the collateral damage. The search warrant authorized seizure of emails, communications, and files on the server, and records of IP addresses connected to the server. And the server was used by a wide range of people who had nothing to do with the bomb threats...

Comments  (5)


On the Growth of Identity Theft

May 01, 2012 Added by:Pierluigi Paganini

It is clear that criminal organizations are devoting substantial resources in this sector. An increasing component of organized crime is specializing in this kind of activity characterized by high profits and low risks compared to traditional criminal activities...

Comments  (2)


Russian Cybercrime Pays

April 30, 2012 Added by:Joel Harding

Group iB has produced a report citing Russian cybercrime is responsible for almost one-third of all online crime. Not only are the details amazing, but the breakdown of the various types of crimes are illuminating. It t is a good primer on the various types of cybercrime...

Comments  (0)


Domains Selling Stolen Credit Card Numbers Seized

April 30, 2012 Added by:Headlines

“By seizing the websites the criminal underground uses to blatantly sell stolen personal information, Operation Wreaking hAVoC shows that we are committed to protecting individuals online and preventing criminals from using the Internet to line their pockets..."

Comments  (0)


Will Industry Agree to a Meaningful Do Not Track?

April 27, 2012 Added by:Electronic Frontier Foundation

A coalition of companies say they "only" want to track opted-out users for security purposes, market research, testing and improving their various advertising and tracking products, auditing, copyright enforcement and other "legal compliance" purposes, not other purposes...

Comments  (3)


Good Security Starts at Home

April 23, 2012 Added by:Ben Rothke

Not a day goes by without yet another spate of privacy and security issues. Threats to the security, privacy and personal information continue to increase in scope and complexity. To maintain competitive edge, vendors and service providers are scrambling to keep up...

Comments  (22)


Online Narcotics Marketplace Utilized TOR

April 23, 2012 Added by:Headlines

“The drug trafficking organization... was distributing dangerous and addictive drugs to every corner of the world, and trying to hide their activities through the use of advanced anonymizing on-line technology...”

Comments  (0)


Checking Your System for the DNS Changer Malware

April 23, 2012 Added by:Headlines

The deadline for for systems infected with the DNS Changer malware is fast approaching. Failure to rid a device of the malware prior to the July 9 deadline could result in loss of Internet connectivity. To see if your system is infected, simply visit the following website...

Comments  (0)


FTC Final Report Provides Meaningful Protection Online

April 21, 2012 Added by:Electronic Frontier Foundation

Recently, the FT) released a final report on digital consumer privacy after more than 450 companies, advocacy groups and individuals commented on the December 2010 draft. The final report creates strong guidelines for protecting consumer privacy choices in the online world...

Comments  (0)


FTC Commission Report on Protecting Consumers

April 16, 2012 Added by:David Navetta

The FTC has a front and center role in data privacy and enforcement. We have written extensively about the FTC’s actions and recommendations. How is the final Framework different from the draft Framework and what should your privacy professionals be taking away from the Framework?

Comments  (0)


Cyber Security Legislation: What Does it Mean for Citizens?

April 12, 2012 Added by:Robert Siciliano

Members of Congress have recognized the need for increased security and introduced approximately fifty bills in the last session. The proposed legislation is focused on improving cyber security for citizens, critical infrastructure, and the Federal Government’s own networks...

Comments  (1)


Digital Assassination: Protecting Your Business Against Attacks

April 05, 2012 Added by:Ben Rothke

The Internet is being used to destroy brands, reputations, and people’s well-be­ing. These incidents range from inappropriate use of Facebook and blog postings to bogus Wiki­pedia entries to blatant Internet-based character assassination, and much more...

Comments  (0)


The FBI Discusses Internet Social Networking Risks

April 05, 2012 Added by:Infosec Island Admin

Social networking sites have created a revolution in connectivity. However, con artists, criminals, and other actors are exploiting this capability for nefarious purposes. There are primarily two tactics used to exploit social networks. In practice, they are often combined...

Comments  (0)


Cyber Criminals Top Secret Service Most Wanted List

April 02, 2012 Added by:Headlines

The majority of fugitives on the Secret Service's top ten most wanted list can be described as "cyber criminals". While the objectives remain the same, the ubiquity of the digital systems that pervade every aspect of our culture presents a new set of challenges for law enforcement...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »