Warbiking!
SOPHOS REVEALS LONDON'S WIFI SECURITY ISSUES WITH 'WARBIKING' EXPERIMENT - 27 percent of nearly 107,000 wireless hotspots found to have poor, or no security Complete security leader Sophos today...
View ArticlePonemon statistics 2012 on cost of cybercrime
At the American Enterprise Institute (AEI) event "Cybersecurity and American power," Gen. K.B. Alexander, director of the National Security Agency (NSA) and chief at the Central Security Service (CSS),...
View ArticleThe need for sharing in sexual child abuse cases
Stronger together In the global fight against sexual child abuse, it is essential that information is shared. By sharing actionable intelligence on visual evidence between law enforcement and NGOs...
View ArticleTrojans for the Bundestag – German PD acquired Finfisher
In December of last year, the German public prosecutors' office had declared that there was no legal basis for the use of the so-called "Bundestrojaner" spyware, which was used to spy on German...
View ArticleDigital Destroys Physical
Shimomura (San Diego National Lab) and others have shown the digital can destroy the physical. This means any user is a potential enemy, not just non-citizens. And, it means there is long recovery time...
View ArticleFuture Citizen Crime
Excluding the major crimes, most crime has a punishment in terms of money and/or locking you out of your home (jail time). ID methods---so effective--replace the above with locking you out of the...
View ArticlePayDay Loan Cyber Scam
WARNING: Cybercriminal “Payday Loan” Scam Sometimes we are impressed by the sophistication of cybercriminal's products, such as the crimeware and the malware they develop in order to achieve their...
View ArticleSymantec data leak, too many doubts on the assumption of extort
The story is familiar to all, the Source Code, the Source code of property of Symantec company has been stolen and it has been object of negotiation between the group of hacker responsible of the crime...
View ArticleGPS Spoofing, old threat and new problems
For several years are known vulnerabilities of GPS systems, but the wide use of these technology in today's society need a continuous reassessment of the risks we are exposed.The first report in which...
View ArticleThe Cybercrime Handbook for Community Corrections
I am pleased to be able to announce that my book, The Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century is now out. In the early 1990s, professionals began to...
View ArticleCrimcast Pod: Cybercrime and Corrections
In this Crimcast podcast, I discuss my new book, The Cybercrime Handbook for Community Corrections: Managing Offender Risk in the 21st Century. It explores such topics as how probation officers can...
View ArticleVISA & MASTERCARD breach raises Security doubts on standard com
The Krebs on Security blog reported that there has been a security breach at Global Payments that “may involve more than 10 million compromised card numbers.” We are facing with a massive breach that...
View ArticleCyber terrorism, cyber attacks against al Qaeda 2.0
The encounter with terrorism technology, widely defined cyber terrorism, is one of the main threats for each country. Wrongly, we tend to associate a terrorist act to a physical event as an explosion,...
View ArticleMedicaid incident. How much cost a data breach?
The Utah Department of Technology Services (DTS) has announced that the Utah Department of Health (UDOH) was victim of an hack. On Monday the server that hosts Medicaid was hacked, the news of the...
View ArticleAnonymous,from OpTrialAtHome to the streets,is time for changin
Another Saturday, another round, as announced today the group Anonymous has targeted government sites to protest against British government policy. Nothing new over last week, same goals, same mode of...
View ArticleCyber threats in mobile environment
Today I desire to share with you the results of a study of Trend Micro security firm focused on mobile threat incidents related to the first quarter of 2012. The large diffusion of mobile devices and...
View ArticleThe Unknowns, hacker's revenge in the name of security
It's happened, another group of hacker named The Unknowns has hacked several organizations, , including NASA and the U.S. Air Force, and posted evidence of their actions. The complete list has been...
View ArticleWho is attacking WikiLeaks and The Pirate Bay? The private reve
Who is attacking WikiLeaks and The Pirate Bay? WikiLeaks and BitTorrent file-sharing site Pirate Bay were hit by a series of DDoS attacks during last weeks. An alleged hacker with the Twitter account...
View ArticleDDoS attack against 123-reg, the Chinese paranoia
The UK’s companies 123-reg, the biggest domain provider, was hit this week by a “massive” DDoS attack that caused interruption of the services provided. The company hosts three million domain names...
View ArticleSixteen Months of Cyber Attacks in Italy
Sixteen Months of Cyber Attacks in Italy Tomorrow, during the 2012 Security Summit, Edition of Rome, the June Update of the 2012 Italian Report on ICT Security will be unleashed. The collected sample...
View Article