• Cat Killer Sean Lynde MacKenzie moves to Cyber-Extortion, Cyber-Harassment

    Sean Lynde, who pled guilty in New York to criminal animal cruelty and cyber extortion, has now assumed the name “MacKenzie” and is expanding his cyber extortion activities. According to charges filed before the New York Supreme Court, Lynde is now purchasing Web site accounts using other people’s names, posting death threats and defamatory statements on these sites, and then trying to extort funds from the targets. Holding multiple drivers licenses, in multiple names, Lynde reflects how criminals increasingly use the Web to cyber extort businesses and individuals

  • Cat Killer Sean Lynde MacKenzie moves to Cyber-Extortion, Cyber-Harassment

    Sean Lynde, who pled guilty in New York to criminal animal cruelty and cyber extortion, has now assumed the name “MacKenzie” and is expanding his cyber extortion activities. According to charges filed before the New York Supreme Court, Lynde is now purchasing Web site accounts using other people’s names, posting death threats and defamatory statements on these sites, and then trying to extort funds from the targets. Holding multiple drivers licenses, in multiple names, Lynde reflects how criminals increasingly use the Web to cyber extort businesses and individuals

  • U.S. cyberstrikes against adversaries to require presidential authority

    Under a new administration policy, the president would have the authority to order a pre-emptive cyberattack against an adversary if the United States receives credible evidence of a major cyberattack being planned against the country from overseas. So far, the administration is known to have launched a sustained cyberattack only once – against Iran’s uranium enrichment facilities – in an operation code-named Olympic Games.

  • Facebook new search feature has cyber experts worried

    A new Facebook search feature has security experts concerned. They  are warning users of the site to strengthen their security settings to avoid embarrassment and to protect themselves from cybercriminals.

  • U.S. to adopt tougher stance toward China’s persistent cyberattacks

    The Obama administration let it be known that it is examining the adoption of a more assertive stance against China in response to a persistent cyber-espionage campaign waged by Chinese government hackers against U.S. companies and government agencies. The administration is preparing a new National Intelligence Estimate (NIE) which will detail the cyberthreat, particularly from China, as a growing economic problem.

  • Chinese hackers attack the New York Times

    Since 2008, Chinese government hackers have been targeting Western news organizations to identify and intimidate their Chinese sources and contacts, as well as to anticipate stories that could hurt the reputation of Chinese leaders. Chinese hackers have repeatedly infiltrated the computer systems of the New York Times over the last four months, following an investigation by the paper that revealed that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings. Security experts hired by the Times have determined that the attacks started from the same university computers used by the Chinese military to attack U.S. military contractors in the past.

  • Chinese hackers infiltrate Wall Street Journal’s computer systems

    Chinese hackers with government connections have infiltrated the computer systems of the Wall Street Journal, in the second such Chinese attack on a major U.S. media outlet. WSJ says the hackers were trying to monitor its coverage of Chinese affairs.

  • Pentagon to bolster U.S cyberwar capabilities

    The Department of Defense is planning an expansion of the U.S. Cyber Command, and the Pentagon plans on recruiting thousands of code crackers, online security professionals, and hackers in order to assemble the nation’s largest cyber army ever.

  • DoD to use connections to stay ahead of cyber threats

    The Department of Defense (DoD) maintains one of the largest computer networks in the world. The network follows DoD personnel across the globe collecting, transferring, and processing information in forms as diverse as data warehouses, in-the-field mobile devices, and mission computers on board F-18’s. New program looks at how information is connected and moves to uncover and prevent targeted attacks.

  • Grammar rules undermine security of long computer passwords

    When writing or speaking, good grammar helps people make themselves understood. When used to concoct a long computer password, however, grammar — good or bad — provides important hints that can help someone crack that password, researchers at Carnegie Mellon University have demonstrated by devising grammar-aware password cracker.

  • SSA 2013 will attract 600 exhibitors and more than 10,000 attendees

    Safety & Security Asia (SSA) 2013 is back for its 24th biennial presentation in Singapore on 7-9 May 2013 at Marina Bay Sands, Singapore. The Safety & Security Asia series is the most established event of Southeast Asia’s security market in the last twenty-four years, making it the a valuable platform for security technology companies to showcase their products and solutions to the region’s market, especially in the cyberspace arena. SSA 2013 will attract 600 exhibitors from thirty countries and more than 10,000 attendeesfrom forty countries.

  • Thwarting facial-recognition, photo-tagging software

    Information about when and where photographed subjects were when their pictures were taken is readily disclosed through photos taken, and the information is disclosed and distributed without their permission. The problem has become even worse due to the popularization of portable terminals with built-in cameras and developments in SNS and image search technologies. Japanese researchers offer a solution: goggles or glasses which, when equipped with near-infrared LED emitter. :

  • Personal genetic information vulnerable to hacking

    Using only a computer, an Internet connection, and publicly accessible online resources, a team of researchers has been able to identify nearly fifty individuals who had submitted personal genetic material as participants in genomic studies.

  • DHS: Industrial control systems subject to 200 attacks in 2012

    A DHS report released last week revealed that industrial control systems, which are used to monitor and control critical infrastructure facilities, were hit with 198 documented cyberattacks in 2012, and that many of these attacks were serious.

  • Promoting mistrust: thwarting spear phishing cyber threats

    Information security experts say that the most challenging threat facing corporate networks today is “spear phishing”; generic e-mails asking employees to open malicious attachments, provide confidential information, or follow links to infected Web sites have been around for a long time; what is new today is that the authors of these e-mails are now targeting their attacks using specific knowledge about employees and the organizations they work for; the inside knowledge used in these spear phishing attacks gains the trust of recipients