information

Thu
08
Oct
Dennis Faas's picture

FBI Reels in 100 Phishers in Huge Cybercrime Case

Amidst news that thousands of Hotmail, Gmail, and Yahoo accounts have been compromised in recent weeks, there's some good news for the good guys: over a hundred phishers have been brought to justice in a multinational investigation spanning half the ... globe. Phishing involves using a fake web page to dupe visitors into entering their sensitive information, including passwords or credit card data. The phisher can then use that information to steal identities and clear out bank accounts. Operation Phish Phry The United States' Federal Bureau of Investigation yesterday revealed that it had charged ... (view more)

Thu
10
Sep
Dennis Faas's picture

New 'Fan Check' Malware Infests Google, Yahoo Search

The latest case of malware infestation is once again targeting Facebook , this time masquerading as a virus removal kit designed to rid the computer world of a bogus "Fan Check" bug. Fan Check: Valid App, but 'Bug' is Bogus While the Fan Check "bug" ... does not really exist, Fan Check is in fact a valid Facebook application used on Facebook.com. The purpose of the Fan Check application is to rank friends based on how often they interact with your Facebook pages. (Source: facebook.com ). The new malware, however, is rather devious because it pretends to defend against a made-up virus, ... (view more)

Thu
30
Jul
Dennis Faas's picture

US Gov't Outraged over Leaked Fed Secrets via P2P

According to a recent report, extremely sensitive government data has appeared on peer-to-peer (P2P) file-sharing networks. The information is reported to include the precise locations of American nuclear silos and FBI surveillance photos. News of ... the leak came at the recent House Government Oversight ... (view more)

Fri
24
Jul
Dennis Faas's picture

Researchers: Power Sockets can Detect Keyboard Input

Researchers at security firm Inverse Path plan to demonstrate how standard power sockets (used in a home, for instance) can be used to eavesdrop on what is being typed onto a computer keyboard. They plan to make a presentation at the Black Hat ... Security conference taking place in Las Vegas from July 25-30 this year. The researchers found that poor electrical shielding on some keyboard cables can result in data being leaked into power circuits. Analyzing such information allowed the researchers to see what was being typed on a keyboard. So far, demonstrations of the attacks have worked at ... (view more)

Wed
22
Jul
Dennis Faas's picture

Microsoft Invests in Futuristic 2D Barcode Technology

Microsoft has expressed interest in further developing two-dimensional barcodes as part of their future corporate outlook. Two-dimensional barcodes are also called QR (quick response) codes and work like the ones found on product packaging. However, ... two-dimensional barcodes have the ability to store more data, including website information and email addresses. Scan with Your Cellphone Camera The whole process of using 2D barcodes is quite futuristic. People scan the barcode using their cellphone camera, which activates the phone's browser and directs them to a designated website linked to ... (view more)

Thu
16
Jul
Dennis Faas's picture

U.S. Gov't Still Trying to Push Flawed ID Schemes

When you can't get any states to participate in your flawed National ID scheme, what do you do? If you're the U.S. government, you change its name and try again. With the death of the REAL ID Act comes a replacement bill that poses many of the same ... threats, including what the Campaign for Liberty refers to as a federal grab for personal information. Now the act has been renamed and referred to as an enhanced or higher security driver's license. In reality, however, the only way to resolve the problem is to repeal it, not rename it. (Source: campaignforliberty.com ) After 9/11, the government ... (view more)

Tue
07
Jul
Dennis Faas's picture

Clear Shutdown Leaves More Than 250,000 IDs in Limbo

The company responsible for creating a database containing thousands of identities collected at U.S. airports has shut down. And so, the question remains: what happens to your personal information when a government-sponsored National ID scheme like ... 'Clear' suddenly shuts down? The fate of more than a quarter million people whose fingerprints, social security numbers, home addresses and other revealing personal information allegedly designed to help hasten traveler clearances at airports is hanging on that question, and even the government doesn't know the answer. (Source: yahoo.com ) Who ... (view more)

Thu
25
Jun
Dennis Faas's picture

Next-Gen Cell Spying: Like Straight out of a Movie

According to reports, the National Security Agency (NSA) has been busted once again for illegal surveillance. Worse yet, it seems the NSA has moved beyond wiretapping land lines to the wireless phone industry, too. (Source: nytimes ) Legal experts ... suggest that collaboration between the wireless phone industry and the NSA runs far deeper than originally thought. There are over 3,000 wireless companies operating in the U.S.; furthermore, the majority of industry-aided snooping is quietly handled by companies that most consumers have never heard of. (Source: cnet.com ) Major Networks Sold Data ... (view more)

Tue
12
May
Dennis Faas's picture

Hackers Breach 160k Med Records at UC Berkeley

Hackers have reportedly infiltrated restricted computer databases at the University of California Berkeley, putting the private data of 160,000 students, alumni, and others at risk. According to UC Berkeley, computer administrators determined that ... electronic databases in University Health Services had been breached by overseas criminals on April 21, 2009. UHS electronic medical records, including details of patients' diagnoses, treatments and therapies were not affected in this breach because they're stored on a separate system. (Source: http://datatheft.berkeley.edu ) Social Security Numbers ... (view more)

Thu
30
Apr
Dennis Faas's picture

Google Profile: Control How Others See You Via Google

Google has introduced a new feature called 'Google Profile', which lets users control how their information appears when someone else searches for that person's name via Google's products (such as the Google Search Engine). Using Google Profile, it ... is possible to create a personal page that links to your blog or other profiles and keep family and friends up to date with your contact information and pictures. (Source: google.com) Control Over What Others See According to Google, a profile is simply how you present yourself on Google products to other Google users. You control how you appear on ... (view more)

Pages

Subscribe to RSS - information