Blog Posts Tagged with "internet"

B1c4090e84dcfac820a2b8ebe6eee82b

On the Underground Economy of Twitter Followers

May 06, 2012 Added by:Gianluca Stringhini

All Twitter Account Markets we analyzed offer both "free" and "premium" versions. While premium clients pay for their services, the free ones gain followers by giving away their Twitter credentials - a clever way of phishing - or by sending out "promoted" content, typically spam...

Comments  (0)

B9d9352326e5421a02e698a51d10ad2c

Firewalls and Anti-Virus Aren't Dead - Should They Be?

May 04, 2012 Added by:Beau Woods

Decreasing the effectiveness of firewalls and antivirus in is the way they're used. Because of the massive number of connections in and out of a network, definitions of what is and is not allowed and exactly how to allow or deny network connections have become a sprawling mess...

Comments  (4)

7ddc1f3000a13e4dfec28074e9e7b658

FBI Overreaches with May First - Riseup Server Seizure

May 02, 2012 Added by:Electronic Frontier Foundation

Most troubling is the collateral damage. The search warrant authorized seizure of emails, communications, and files on the server, and records of IP addresses connected to the server. And the server was used by a wide range of people who had nothing to do with the bomb threats...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

On the Growth of Identity Theft

May 01, 2012 Added by:Pierluigi Paganini

It is clear that criminal organizations are devoting substantial resources in this sector. An increasing component of organized crime is specializing in this kind of activity characterized by high profits and low risks compared to traditional criminal activities...

Comments  (2)

94ae16c30d35ee7345f3235dfb11113c

Russian Cybercrime Pays

April 30, 2012 Added by:Joel Harding

Group iB has produced a report citing Russian cybercrime is responsible for almost one-third of all online crime. Not only are the details amazing, but the breakdown of the various types of crimes are illuminating. It t is a good primer on the various types of cybercrime...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Domains Selling Stolen Credit Card Numbers Seized

April 30, 2012 Added by:Headlines

“By seizing the websites the criminal underground uses to blatantly sell stolen personal information, Operation Wreaking hAVoC shows that we are committed to protecting individuals online and preventing criminals from using the Internet to line their pockets..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Will Industry Agree to a Meaningful Do Not Track?

April 27, 2012 Added by:Electronic Frontier Foundation

A coalition of companies say they "only" want to track opted-out users for security purposes, market research, testing and improving their various advertising and tracking products, auditing, copyright enforcement and other "legal compliance" purposes, not other purposes...

Comments  (3)

3e35900ae6facc6c146a85c435c71d82

Good Security Starts at Home

April 23, 2012 Added by:Ben Rothke

Not a day goes by without yet another spate of privacy and security issues. Threats to the security, privacy and personal information continue to increase in scope and complexity. To maintain competitive edge, vendors and service providers are scrambling to keep up...

Comments  (9)

69dafe8b58066478aea48f3d0f384820

Online Narcotics Marketplace Utilized TOR

April 23, 2012 Added by:Headlines

“The drug trafficking organization... was distributing dangerous and addictive drugs to every corner of the world, and trying to hide their activities through the use of advanced anonymizing on-line technology...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Checking Your System for the DNS Changer Malware

April 23, 2012 Added by:Headlines

The deadline for for systems infected with the DNS Changer malware is fast approaching. Failure to rid a device of the malware prior to the July 9 deadline could result in loss of Internet connectivity. To see if your system is infected, simply visit the following website...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

FTC Final Report Provides Meaningful Protection Online

April 21, 2012 Added by:Electronic Frontier Foundation

Recently, the FT) released a final report on digital consumer privacy after more than 450 companies, advocacy groups and individuals commented on the December 2010 draft. The final report creates strong guidelines for protecting consumer privacy choices in the online world...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FTC Commission Report on Protecting Consumers

April 16, 2012 Added by:David Navetta

The FTC has a front and center role in data privacy and enforcement. We have written extensively about the FTC’s actions and recommendations. How is the final Framework different from the draft Framework and what should your privacy professionals be taking away from the Framework?

Comments  (0)

37d5f81e2277051bc17116221040d51c

Cyber Security Legislation: What Does it Mean for Citizens?

April 12, 2012 Added by:Robert Siciliano

Members of Congress have recognized the need for increased security and introduced approximately fifty bills in the last session. The proposed legislation is focused on improving cyber security for citizens, critical infrastructure, and the Federal Government’s own networks...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Digital Assassination: Protecting Your Business Against Attacks

April 05, 2012 Added by:Ben Rothke

The Internet is being used to destroy brands, reputations, and people’s well-be­ing. These incidents range from inappropriate use of Facebook and blog postings to bogus Wiki­pedia entries to blatant Internet-based character assassination, and much more...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The FBI Discusses Internet Social Networking Risks

April 05, 2012 Added by:Infosec Island Admin

Social networking sites have created a revolution in connectivity. However, con artists, criminals, and other actors are exploiting this capability for nefarious purposes. There are primarily two tactics used to exploit social networks. In practice, they are often combined...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cyber Criminals Top Secret Service Most Wanted List

April 02, 2012 Added by:Headlines

The majority of fugitives on the Secret Service's top ten most wanted list can be described as "cyber criminals". While the objectives remain the same, the ubiquity of the digital systems that pervade every aspect of our culture presents a new set of challenges for law enforcement...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »