Blog Posts Tagged with "Law Enforcement"
February 16, 2012 Added by:Jeffrey Carr
We should re-assess which attacks should be investigated and which should be let go. The FBI and US-CERT are overwhelmed with tracking everything from probes against government networks to DDoS attacks to targeted attacks against the Defense Industrial Base...
February 14, 2012 Added by:Rafal Los
Most people don't get prosecuted or charged for distributing or re-tweeting a link to an Anonymous pastebin dump. Where is the line drawn then, and why are some incidents bigger than others? The question ultimately goes to the contents of the cache of information...
February 13, 2012 Added by:Fergal Glynn
Employees forward confidential calendar events and messages to personal calendars and personal email accounts. This may make their jobs easier but it can put their companies at risk. A recent security incident involving the FBI can teach us something about corporate security...
February 13, 2012 Added by:Pierluigi Paganini
The login credentials were stored in plain text in the repository that had been exposed, and that is absurd. This is a failure of the basic security procedures that should be recognized internationally, and is an offense for which there should be heavy penalties...
February 13, 2012 Added by:Headlines
The President’s proposal would establish national standards, protect federal networks, and allow DHS to provide enhanced voluntary assistance to our private sector and state, local, tribal, and territorial government partners...
February 08, 2012 Added by:Electronic Frontier Foundation
The DOJ has been unequivocal that cloud users have no right to challenge government access to "non-content" information held by Cloud systems - their location, their contacts, their communications patterns and more. Lawyers call this the "third party problem"...
February 07, 2012 Added by:Anthony M. Freed
"The e-mail string posted by YamaTough was actually between them and... law enforcement. YamaTough actually reached out to us, first, saying that if we provided them with money, they would not post any more source code. At that point... it was a clear cut case of extortion..."
February 07, 2012 Added by:Headlines
U.S. Secret Service’s New York Field Office recently investigated a sophisticated operation in which information from the cell phone accounts of tens of thousands of people is stolen to support a black market in international calling...
February 06, 2012 Added by:Headlines
Among the greatest challenges in cyber security are knowing the perpetrator of a cyber attack in real time and finding capability gaps in the cyber supply chain – the entire set of key actors involved in the cyber infrastructure...
February 05, 2012 Added by:Infosec Island Admin
Over the last year we have seen an evolution within Anonymous and its various movements. The latest being the AntiSec movement, the more cohesive core of Anonymous, one that has a set group of leaders at its center, leaders with an agenda... Anarchy....
January 19, 2012 Added by:Headlines
Multiple websites appear to be under DDoS attack, including the DoJ's http://justice.gov, the Recording Industry Association of America's http://riaa.com, and music publisher Universal Music's http://universalmusic.com...
January 13, 2012 Added by:Anthony M. Freed
Update: “The Lords of Dharmaraja” claim to have released the source code for Symantec's Norton Utilities as was threatened earlier today. The alleged data dump has not been confirmed, and company officials have not yet released a statement. Exclusive interview with YamaTough here...
December 21, 2011 Added by:Headlines
“The federal prison sentence handed down in this case sends a strong message of deterrence to would-be Internet pirates. The Justice Department will pursue and prosecute persons who seek to steal the intellectual property of this nation..."
December 19, 2011 Added by:Headlines
Eighty-three innovators, inventors and engineers signed the letter that specifically calls for Congress to reject the Stop Online Piracy Act (SOPA) and the PROTECT IP Act (PIPA) in an attempt to prevent government efforts to codify broad Internet censorship powers...
December 15, 2011 Added by:Headlines
Issues gaining attention over the past year include the weakening of the digital certificate authorities, surges in malware targeting mobile devices, designer malware, and the rash of corporate network breaches - be they by hacktivists, nation-state supported hackers, or criminal syndicates...
December 14, 2011 Added by:Headlines
"According to the indictment, Poe used a favorite software tool of the Anonymous collective—a Low Orbit Ion Cannon, which is a computer program that is used to send extremely large numbers of “packets” or requests over a network in an attempt to overwhelm a target computer..."
Making Sense of Split Tunneling ... Caring Match on 08-27-2014
Making Sense of Split Tunneling ... Marco Schmidt on 08-26-2014
Making Sense of Split Tunneling ... Caring Match on 08-26-2014