New data from Trustwave SpiderLabs shows how law enforcement agencies worldwide are getting better at catching cybercriminals — but it’s still a major chase Law Enforcement Ups Its Game In Cybercrime – Dark Reading.
40 percent of small and medium-sized businesses have suffered a security breach due to unsafe web surfing, and nearly one-third still do not have a policy to govern the use of social networking sites,
Because there are so many background check websites on the web, information can often be gathered from each website revealing information about you that you may want to keep private. Here’s a list of opt-out and removal links.
The Department of Commerce’s Internet Policy Task Force released a proposal Wednesday calling for a voluntary code of conduct for companies that do business online.
The Report, titled Cybersecurity, Innovation and the Internet Economy, calls for a private-public partnership to promote best security practices and implement existing security methods into companies that are, for whatever reason, lagging in their IT security efforts. Read More…
(Shared from website)
Thanks to a provision slipped into a 2004 spending bill, higher education institutions must offer educational programs about the Constitution on Constitution Day (Sept. 17) in order to remain eligible for Title IV funding.
More information about Title IV and Funding of higher education (Constitution Day)
Information on TTC Shelbyville’s website.
More and more frequently these days, we hear about successful attacks perpetrated by the cybercriminals against the clients of financial organizations. More often than not, these malware-based attacks follow a well-trodden path: the search for a suitable victim and the infection of their computer, the theft of their online banking login credentials, followed by the subsequent withdrawal of the victim’s funds.
One recent classic example comes from the Zbot-toolkit family , which is also known as ZeuS.
This is a malicious tool designed to steal the very data mentioned above – users’ login credentials for online banking accounts. ZeuS was very active throughout the whole of 2009 and continues to pose a considerable threat, seemingly laughing in the face of IT security professionals who have on many occasions attempted to shut down ZeuS botnets.
Crimeware: A new round of confrontation begins& – Securelist. (via ShareThis)
Apparently a website was up for hackers (mostly from Pakistan) that traded or sold code to hack websites and sell credit cards. A vigilante hacked the website and posted the users and their hashed passwords for law enforcement. While law enforcement discourages vigilantes, this type of help could be a welcome form of help. More Information can be found here.
JDAFTS is a forensics toolkit that allows you to conduct a forensics investigation…of sorts. Only professionals should conduct these investigations but this tool lets an internal investigation take place.
This webste offers an excellent database to see if you are at risk for data or identity theft or if your information was sold. Link Your information is verified to see if you are at RISK. You will receive two passwords that MUST be written down to see details.
Students and industry always ask me if it is illegal to connect to a wireless network that is unsecure. As early as 2005 (ST. PETERSBURG, Fla. (AP)) an individual was chared with a 3rd degree felony for connecting to a wireless network. Given that fact, states like Tennessee have passed or proposed bills making it a crime to do so. Burleson Consulting also believes that it is possible that the home owner could be sued (for negligence) if they leave their wireless unsecure and their network are used maliciously.
With a hardcore DA or sympathetic jury, you could possibly be charged for connecting to a ‘hot spot’ that is marked customers only or a jury could award a vicitim of hacking (judgement against you) if you left your wireless open.
As ridiculous as all of this sounds, there are some rules that will save you. Secure your wireless network and change the administrator’s password. Only connect to a wi-fi hotspot as a customer even if you have to buy a cup of coffee or a small soda.