Blog Posts Tagged with "Law Enforcement"

296634767383f056e82787fcb3b94864

Reflections on Suits and Spooks DC

February 16, 2012 Added by:Jeffrey Carr

We should re-assess which attacks should be investigated and which should be let go. The FBI and US-CERT are overwhelmed with tracking everything from probes against government networks to DDoS attacks to targeted attacks against the Defense Industrial Base...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Difference Between Spreading Information and Enabling Crime

February 14, 2012 Added by:Rafal Los

Most people don't get prosecuted or charged for distributing or re-tweeting a link to an Anonymous pastebin dump. Where is the line drawn then, and why are some incidents bigger than others? The question ultimately goes to the contents of the cache of information...

Comments  (2)

68b48711426f3b082ab24e5746a66b36

FBI Bitten by Operational Security

February 13, 2012 Added by:Fergal Glynn

Employees forward confidential calendar events and messages to personal calendars and personal email accounts. This may make their jobs easier but it can put their companies at risk. A recent security incident involving the FBI can teach us something about corporate security...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

KPN Hack: Why was Customer Notification Delayed?

February 13, 2012 Added by:Pierluigi Paganini

The login credentials were stored in plain text in the repository that had been exposed, and that is absurd. This is a failure of the basic security procedures that should be recognized internationally, and is an offense for which there should be heavy penalties...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The Obama Administration’s Cybersecurity Proposal

February 13, 2012 Added by:Headlines

The President’s proposal would establish national standards, protect federal networks, and allow DHS to provide enhanced voluntary assistance to our private sector and state, local, tribal, and territorial government partners...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Department of Justice Misdirection on Cloud Computing

February 08, 2012 Added by:Electronic Frontier Foundation

The DOJ has been unequivocal that cloud users have no right to challenge government access to "non-content" information held by Cloud systems - their location, their contacts, their communications patterns and more. Lawyers call this the "third party problem"...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Symantec: Emails Part of Law Enforcement Sting Operation

February 07, 2012 Added by:Anthony M. Freed

"The e-mail string posted by YamaTough was actually between them and... law enforcement. YamaTough actually reached out to us, first, saying that if we provided them with money, they would not post any more source code. At that point... it was a clear cut case of extortion..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Secret Service Hits $250 Million Cell Phone Cloning Ring

February 07, 2012 Added by:Headlines

U.S. Secret Service’s New York Field Office recently investigated a sophisticated operation in which information from the cell phone accounts of tens of thousands of people is stolen to support a black market in international calling...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Intelligence Leaders Urge Congress to Act on Cyber Laws

February 06, 2012 Added by:Headlines

Among the greatest challenges in cyber security are knowing the perpetrator of a cyber attack in real time and finding capability gaps in the cyber supply chain – the entire set of key actors involved in the cyber infrastructure...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Game Theory, Anonymous Causality, and 2012

February 05, 2012 Added by:Infosec Island Admin

Over the last year we have seen an evolution within Anonymous and its various movements. The latest being the AntiSec movement, the more cohesive core of Anonymous, one that has a set group of leaders at its center, leaders with an agenda... Anarchy....

Comments  (4)

69dafe8b58066478aea48f3d0f384820

DDoS Attacks Against Government and Entertainment Websites Escalate

January 19, 2012 Added by:Headlines

Multiple websites appear to be under DDoS attack, including the DoJ's http://justice.gov, the Recording Industry Association of America's http://riaa.com, and music publisher Universal Music's http://universalmusic.com...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Exclusive: Interview With Hacker YamaTough

January 13, 2012 Added by:Anthony M. Freed

Update: “The Lords of Dharmaraja” claim to have released the source code for Symantec's Norton Utilities as was threatened earlier today. The alleged data dump has not been confirmed, and company officials have not yet released a statement. Exclusive interview with YamaTough here...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Illegal Movie Upload Yields Federal Prison Sentence

December 21, 2011 Added by:Headlines

“The federal prison sentence handed down in this case sends a strong message of deterrence to would-be Internet pirates. The Justice Department will pursue and prosecute persons who seek to steal the intellectual property of this nation..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Internet Architects Oppose SOPA and PIPA Legislation

December 19, 2011 Added by:Headlines

Eighty-three innovators, inventors and engineers signed the letter that specifically calls for Congress to reject the Stop Online Piracy Act (SOPA) and the PROTECT IP Act (PIPA) in an attempt to prevent government efforts to codify broad Internet censorship powers...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Top Seven Emerging Security Trends from 2011

December 15, 2011 Added by:Headlines

Issues gaining attention over the past year include the weakening of the digital certificate authorities, surges in malware targeting mobile devices, designer malware, and the rash of corporate network breaches - be they by hacktivists, nation-state supported hackers, or criminal syndicates...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Affiliate Arrested for 2010 DDoS Attack

December 14, 2011 Added by:Headlines

"According to the indictment, Poe used a favorite software tool of the Anonymous collective—a Low Orbit Ion Cannon, which is a computer program that is used to send extremely large numbers of “packets” or requests over a network in an attempt to overwhelm a target computer..."

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »