Tag Archives: cybercrime

Cyber Summit – Memphis, TN June 2017

The Tennessee Department of Safety & Homeland Security, The Tennessee Fusion Center and Central Service Association are proud to once again bring together individuals from education, government and industry to share in the latest information, strategies, best practices and innovative solutions … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Education, Hacking, help desk, Information Technology, internet security;, Microsoft, Microsoft Windows, Microsoft Windows 10, Mobile Computing, Networking, ransomware, Technology, Windows, Windows 10, Windows Security, Windows Server, Wireless | Tagged , , , , , , | Leave a comment

HACKMAGEDDON – An excellent website to view breaches and cyber attacks

HACKMAGEDDON is an excellent website where you can view breaches, security and other information.

Rate this:

Posted in Technology | Tagged , , , , | Leave a comment

Cyber Threat Maps

Here’s a few cyber threat maps showing attacks live. FireEye https://www.fireeye.com/cyber-map/threat-map.html Kaspersky https://cybermap.kaspersky.com/ Norse http://map.ipviking.com/ Arbor Networks DDoS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16446&view=map Honeynet.org Anubisnetworks http://globe.cyberfeed.net/ Security Wizardry http://www.securitywizardry.com/radar.htm Alien Vault https://www.alienvault.com/open-threat-exchange/dashboard#/threats/top FSecure http://worldmap3.f-secure.com/ TrendMicro http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html Global Spam (Trend) http://www.sicherheitstacho.eu/ Akamai http://www.akamai.com/html/technology/dataviz1.html Global … Continue reading

Rate this:

Posted in Computer Security, Hacking, Information Technology, internet security; | Tagged , , , , , , , , | 2 Comments

National Cyber Security Awareness Month 2014

Become a company or organization that helps bring Cyber Security Awareness to users. TCAT Shelbyville has been listed as a champion for years and promotes cyber security awareness to higher education and end users. List of all champions Activities you … Continue reading

Rate this:

Posted in Technology | Tagged , , , , | Leave a comment

Ever wonder how much cybercrime pays?

Paul’s Internet Security Blog references a Networkworld article that gives the approximate pay for criminals who participate in cybercrime.  Go over and see just how much money is given to the lower end criminals.   The question is how much … Continue reading

Rate this:

Posted in Technology | Tagged , , , | Leave a comment

Russia’s Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals | DFI News

Russia’s Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals | DFI News. It’s early February in Cancun, Mexico. A group of 60 or so financial analysts, reporters, diplomats, and cybersecurity specialists shake off the previous night’s tequila and file … Continue reading

Rate this:

Posted in Computers | Tagged , , | Leave a comment

Law Enforcement Ups Its Game In Cybercrime – Dark Reading

New data from Trustwave SpiderLabs shows how law enforcement agencies worldwide are getting better at catching cybercriminals — but it’s still a major chase Law Enforcement Ups Its Game In Cybercrime – Dark Reading.

Rate this:

Posted in Computers | Tagged , , , | Leave a comment

China Not The U.S.’s Only Cyber-Adversary – Dark Reading

China long has been the focus of U.S. authorities and security researchers as a major source of cyberespionage against the U.S., but potential new evidence of targeted attacks by India against the U.S. demonstrates just how widespread cyberspying might be.China … Continue reading

Rate this:

Posted in Computers | Tagged , , | Leave a comment

Photos of Fake Checks – Fraud

Here’s an example of fake checks that may come to you through responding to emails, online auctions or just out of the blue…don’t cash these type of checks if you receive them…examples of phishing are listed in previous posts. If … Continue reading

Rate this:

Posted in Hacking, Information Technology, Internet, Law, Networking, Organizations, Technology | Tagged , , , , , , , , , , | 1 Comment

EC-Council Featured in CNN-The Wolf Blitzer Show

EC-Council Featured in CNN | The Wolf Blitzer Show    Aug 4, 2011 | Albuquerque, NM – Jay Bavisi, president of EC-Council, was earlier interviewed by CNN, to comment on the massive cyber spying incident which targeted agencies and groups in … Continue reading

Rate this:

Posted in Computer Security, Computers, Hacking, Information Technology, Law, Organizations, Technology | Tagged , , , , , | Leave a comment

U.S. Says Cybercrime a Major National Security Threat

A new report from the National Security Council warns that international cybercrime has reached the upper echelon of threats of to the security of the United States and is responsible for as much as $1 billion in losses in just … Continue reading

Rate this:

Posted in Computers, Information Technology, Internet, Technology | Tagged , , , , | Leave a comment

Free Forensics Tool for Computers

Here’s a free forensics tool for computers.  Link  Raptor makes an image of your PC or MAC regardless of the OS. Read the information from CNET on this amazing tool.  CNET article

Rate this:

Posted in Computers | Tagged , , , , , , , , | Leave a comment

Law Enforcement can use COFEE for Cybercrime

Computer Online Forensic Evidence Extractor (COFEE) by Microsoft Link

Rate this:

Posted in Computers | Tagged , , , , , , , | Leave a comment

Bill Mullin’s Personal Perspective on Cybercrime

I have written several articles for newspapers, web articles and more on Cybercrime and How to Protect Yourself online.  Bill gives an informative view of this growing threat.  Excellent. Link to Bill’s Blog and Article

Rate this:

Posted in Computers | Tagged , | Leave a comment

Test Your Webserver – SQL Injection

Here’s a software we use to check some of our servers.  Link

Rate this:

Posted in Technology | Tagged , , , , | Leave a comment

Hacking Statistics and Defacements

Zone-H has been around for years.   They offer a look at defacements and hacks and divide the information into statistical information about the hackers, servers and sites.  Check it out.  Link  (See the defacements here) List of hacked companies – … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , , , , | 1 Comment

Forensics Tool Kit

JDAFTS is a forensics toolkit that allows you to conduct a forensics investigation…of sorts.  Only professionals should conduct these investigations but this tool lets an internal investigation take place. Link

Rate this:

Posted in Technology | Tagged , , , , | Leave a comment

Cyber Attacks are Real

Everyday, Mike and I check logs, backups and go through our little routine.   Just several days ago we had an FTP server get hit for 10 hours.  We could have stopped it but we looked at their methodology and are … Continue reading

Rate this:

Posted in Technology | Tagged , , , | Leave a comment

Kaspersky may have been hacked with SQL Injection

News is spreading across the web that Kaspersky the internet security company may have been hacked.  Some sites are showing the actual hack (?) . HackersBlog What are SQL Injections and How you can help protect yourself.  Link

Rate this:

Posted in Technology | Tagged , , , , , , | Leave a comment

SSL Hack and MD5 – 30% of Online Transactions Not Safe

DarkReading has a good article on SSL hacks and the older MD5 technology.  Their article and research shows 30% of sites with SSL technology still use the MD5 technology.   To reassure the world, we use SHA-1 and 1024 bit … Continue reading

Rate this:

Posted in Technology | Tagged , , , , , , | Leave a comment