October 02, 2012 Added by:Michelle Drolet
It’s becoming more and more common for workers to store work-related documents on devices they bring to and from work each day. While this can be convenient--employees can access important documents at home or on the road--it also creates greater security risks for businesses...
September 26, 2012 Added by:Will Tarkington
The method I used for this particular tactic was to monitor the conversational rhythm. Then inject into it and take it over allowing me to guide the conversation. The skill set that allows you to walk into a conversation and take it over can’t be understated...
September 18, 2012 Added by:Jason Clark
Today’s phishing attacks are slow-and-low for evasion, highly targeted and look legitimate. Malware is increasingly delivered via an embedded URL which might not be live until days after the email is sent. Many of the CSOs also received variants of spear-phishing via SMS during the meeting...
September 06, 2012 Added by:Pierluigi Paganini
With 556 million of victims per year, 2 of 3 adults have been victims of online crime in their lifetime, with a total economic loss of 110 Billion and an average cost per victim of $197. The trend demonstrates the need to put in place a massive awareness campaign...
August 21, 2012 Added by:Headlines
Four men were arrested for their roles in an identity theft scheme involving the theft of credit card numbers used to fraudulently purchase fuel at gas stations in order to be sold, distributed, or otherwise used by the defendants in order to obtain criminal proceeds...
August 17, 2012
Jeff Bardin, a Principal at Treadstone 71 LLC, shared a variety of open source tools that businesses and consumers can use can for “espionage, competitive intelligence, and intellectual property” purposes. Check out this video to find out more about these tools and what they can do...
August 07, 2012 Added by:Headlines
In addition to creating and disseminating fake coupons, Henderson also wrote tutorials and created templates he posted online and that provided instructions for creating counterfeit coupons using their own computers. Henderson’s scheme caused retailers and manufacturers to lose approximately $900,000....
August 03, 2012 Added by:Pierluigi Paganini
There are bots creating a significant number of fake profiles, which are managed by machines capable of interacting with each other and with real users, thus changing the "sentiment" and "conversation" on a large-scale, as well as altering the social graph to preclude meaningful correlations of data...
August 01, 2012 Added by:Infosec Island Admin
What I came out with, after many slides of numbers, was “nope not really”, which I pretty much had thought before. There are just too many variables to this type of venture and you would need to have a trained psychoanalyst to talk to the individual to determine whether or not they are a true psychopath...
July 31, 2012 Added by:ʞɔopuooq ʇuıɐs
I have done my best to ignore rantings, trying not to feed the trolls, but Emick recently upped her campaign against me and created a blog post berating my methods. One of my valued supporters, @render64, has read Emick's blog and kindly used intelligent analysis in order to expose what’s really going on here...
July 25, 2012 Added by:Infosec Island Admin
It seems to me that more and more we are being collectively mined not only for our habits, but now our emotions as well as our psychological makeups. All of this could potentially be collated from numerous sources. I doubt we will ever be able to contextualize the human psyche just from internet datum…
July 13, 2012 Added by:Headlines
"The FBI announced three more arrests arising from Operation Card Shop, an international operation aimed at sophisticated, highly organized cyber criminals involved in buying and selling stolen identities, exploited credit cards, counterfeit documents, and sophisticated hacking tools..."
July 11, 2012 Added by:ʞɔopuooq ʇuıɐs
About the twitter ‘takeover’. I have to say that was clever. Even though my account wasn’t actually breached per se. The folks behind this latest attempt found an auto-RSS/Email to tweet script that uses the Twitter API and worked out a way to post to my account without actually having any physical access. Kudos...
July 07, 2012 Added by:Robert Siciliano
“Dumps” are batches of stolen credit card numbers. This example of a criminal’s sales pitch for stolen dumps came to me through a comment on a blog post I wrote about credit card security. Go figure. If you scan the following message line by line, you’ll see there’s a great deal of thought put into the pitch...
July 03, 2012 Added by:Headlines
Osarhieme Uyi Obaygbona, 32, of Atlanta, Georgia, was convicted last week of conspiracy to commit wire fraud, conspiracy to commit identity theft, and conspiracy to gain unauthorized access to protected computers. Phishing attacks use fraudulent web pages that mimic the legitimate web pages...
June 25, 2012 Added by:Joel Harding
We’ve been saying for years that the human element is the weakest link in cybersecurity. Kevin Mitnick (out of prison now and doing well) was an extremely talented hacker but what set him apart was his research into potential victims and then having the audacity to social engineer them...
Good Security Starts at Home... jlukeadan jlukeadan on 04-23-2014
Join Trend Micro & SecurityWeek in Belle... Barbara Daft on 04-23-2014
Mobile Security: Tips for Using Personal Dev... jlukeadan jlukeadan on 04-23-2014