Blog Posts Tagged with "Headlines"

69dafe8b58066478aea48f3d0f384820

LulzSec Member Arrested for Sony Pictures Hack

September 05, 2012 Added by:Headlines

Rivera allegedly used a proxy server in an attempt to mask or hide his Internet protocol (IP) address and obtained confidential information from Sony Pictures’ computer systems using an SQL injection attack against its website...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Three Domains Seized for Distributing Pirated Android Apps

August 27, 2012 Added by:Headlines

“Software apps have become an increasingly essential part of our nation’s economy and creative culture, and the Criminal Division is committed to working with our law enforcement partners to protect the creators of these apps and other forms of intellectual property from those who seek to steal it..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

MS-ISAC Meeting Explores Advanced Persistent Threats

August 22, 2012 Added by:Headlines

The event brought together state Chief Information Security Officers and other cyber security professionals from the nation's state, local and territorial governments, along with representatives from the U.S. Department of Homeland Security and industry experts for briefings on current cyber threats...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Four Defendants Charged in Credit Card Skimming Scheme

August 21, 2012 Added by:Headlines

Four men were arrested for their roles in an identity theft scheme involving the theft of credit card numbers used to fraudulently purchase fuel at gas stations in order to be sold, distributed, or otherwise used by the defendants in order to obtain criminal proceeds...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Army to Integrate Cyber Considerations Across the Board

August 20, 2012 Added by:Headlines

"The vulnerabilities inherent in social media, ubiquitous encryption and malicious software that has the ability to change form and target enroute, retaining access and the freedom to maneuver in cyberspace will be essential for us to defend ourselves and influence the nature of future conflict..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI and IC3 Issue Advisory on Revetion Ransomware

August 10, 2012 Added by:Headlines

Reveton is drive-by malware and unlike many viruses which activate when users open a file or attachment. Reveton can install itself when users simply click on a compromised website. Once infected, the computer immediately locks, and the monitor displays a screen stating there has been a violation of federal law...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Center for Internet Security Joins NACo Cyber Security Task Force

August 08, 2012 Added by:Headlines

"In today's world where cyber has become a strategy in war, America's Counties are key players in homeland security; commissioners, supervisors, and local policy makers have to become educated on this issue and be ready to protect our citizens from breaches of confidentiality and more..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Student Pleads Guilty to Counterfeiting Coupons on the Internet

August 07, 2012 Added by:Headlines

In addition to creating and disseminating fake coupons, Henderson also wrote tutorials and created templates he posted online and that provided instructions for creating counterfeit coupons using their own computers. Henderson’s scheme caused retailers and manufacturers to lose approximately $900,000....

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Army Translator Re-Sentenced for Possession of Classified Docs

August 06, 2012 Added by:Headlines

The defendant took classified documents from the U.S. Army without authorization. While assigned to an intelligence group in the 82nd Airborne Division of the U.S. Army at Al Taqqadam Air Base, he downloaded a classified electronic document and took hard copies of several other classified documents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Seeks Solutions for Secure Mobile Capabilities

July 23, 2012 Added by:Headlines

“First and foremost, our whole strategy from a classified mobility perspective is very much focused on commercial solutions for classified [communications]... It’s our intent that we would deliver, end-to-end, a solution that is reliant on all commercial components and we believe we can do that...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senators Seek Investigation into Electric Grid Security Issue

July 20, 2012 Added by:Headlines

"These certificates protect access to control systems. They protect access to a $400 billion market. They protect access to trading systems. They also protect access to machines that do things like turn generators off. If you issue a fraudulent certificate or you're lax... the consequences could be disastrous..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

One in Ten Small Businesses Experienced a Data Hack

July 20, 2012 Added by:Headlines

"While the media is reporting a growing number of high profile data breaches, some small businesses may also be a popular target for hackers because their systems are usually easier to get into and the breach may not be found out for a good few weeks...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ZeroAccess Hits Victims with High Bandwidth Consumption

July 19, 2012 Added by:Headlines

“The concern with ZeroAccess is that it is using the subscriber’s bandwidth maliciously which will cost them money as they exceed bandwidth caps. And, once the computer is compromised, it can also spread additional malware or launch new attacks... while connecting to over one million computers globally..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Energy Department Develops Tool for Electric Grid Cybersecurity

July 19, 2012 Added by:Headlines

“The new Cybersecurity Self-Evaluation Survey Tool for utilities is vitally important in today’s environment where new cyber threats continue to emerge. Adoption by the electric sector will further protect critical infrastructure and... provide an invaluable view of the industry’s cybersecurity capabilities.”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Morphing Network Assets to Restrict Adversarial Reconnaissance

July 18, 2012 Added by:Headlines

"The intent of cyber maneuver is to place computer network defense technology into a proactive state, thereby shifting the advantage away from the attacker. By constantly changing the characteristics of the networks it resides on, MOPRHINATOR provides a more robust and trusted networking solution..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mahdi Trojan Employed in Middle Eastern Cyber Espionage

July 18, 2012 Added by:Headlines

"It is still unclear whether this is a state-sponsored attack or not. The targeted organizations seem to be spread between members of the attacking group by giving each victim machine a specific prefix name, meaning that this operation might require a large investment and financial backing..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked