Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 117

Feb 20, 2016

Cybercrime bill faces First Amendment questions

Posted by in categories: cybercrime/malcode, government, internet

Rep. David Lifferth, R-Eagle Mountain, has introduced legislation to increase punishment for those who engage in Internet crimes. HB225, Cybercrime Amendments, specifically targets crimes known as “doxing” and “swatting.” The bill has been assigned to be heard by a House committee.

Doxing is the act of releasing personal information about a person publicly online. Oftentimes, these releases are accompanied by intimidating threats toward the targets of doxing. Releasing personal information online while encouraging others to commit crimes against the victim is understandably dangerous. However, issues have been raised concerning First Amendment rights.

Originally, HB225 included criminal charges against those who release personal information with the intent to “annoy, offend, and frighten.” Lifferth is removing these phrases particularly as they don’t necessarily indicate malicious intent. Critics have expressed that HB225 would be a violation of freedom of speech.

Read more

Feb 19, 2016

Tactics to Protect Against Most Common Cyber Attacks

Posted by in categories: business, cybercrime/malcode, energy, mobile phones, quantum physics, robotics/AI

This is a good baseline around common known issues — the real problem is cyber terrorists (as I call them) learns from each attack they instigate and like an artist, they constantly are fine tuning their own skill. So, the attacker’s approach and execution may be done one way, and by the next attack they can easily have changed their whole attack model completely which makes it very cumbersome for experts to trace at times. If we believe this is bad now; wait until AI is more widely available and adopted. Or, Quantum ends up in the hands of these guys.


Cybercrimes in today’s technologically advanced society have become much more sophisticated and progressive. We can thank mobility for the ease of extended access to our personal data, as with every use of our mobile phones, laptops or tablets in public areas we further increase our risk and vulnerability. As business owners, online shoppers, students, employees and even house wives, we remain at high risk for intrusion of our virtual systems. In this digital day in age, our personal data is used everywhere from when we make an online banking transaction to buying a new shirt at the mall, and even working on a project at the local coffee shop. It is hardly responsible to think that your information is safe anywhere.

Continue reading “Tactics to Protect Against Most Common Cyber Attacks” »

Feb 19, 2016

Don’t Miss Out on This Cyber Security Stock

Posted by in categories: cybercrime/malcode, security

Unless you haven’t been in touch with the real world lately; it truly would be hard not to recognize that real investment opportunities exist in cyber security technology space.


Don’t Miss Out on This Cyber Security Stock, Stocks: CYBR, FEYE, PANW, CSCO, release date: Feb 19, 2016.

Read more

Feb 19, 2016

Russia steps up Syria cyber assault

Posted by in categories: cybercrime/malcode, military

Russia’s cyber war in Syria.


Russia is mounting a far-reaching cyber espionage campaign against Syrian opposition groups and NGOs, as Moscow seeks to influence the flow of information on the country’s humanitarian crisis and obscure the full extent of its military operations.

Read more

Feb 19, 2016

Navy Wants to Unplug From Some Networks to Stay Ahead of Cyberattacks

Posted by in categories: cybercrime/malcode, internet, military, transportation

US Navy fighting the real war that is ramping up by unpluging from certain networks. Well, that is an option; but also very limiting to “sneaker net” information file transfers. Definitely not uncommon across other areas of government.


SAN DIEGO — For the Navy, the best defense against a high-tech enemy may be a low-tech strategy.

After decades of building equipment, aircraft and ships designed to communicate with each other and back to shore, the Navy is now looking to “selectively disconnect” its systems to minimize vulnerability to cyberattacks, said Rear Adm. Lorin Selby, commander of the Naval Surface Warfare Center.

Continue reading “Navy Wants to Unplug From Some Networks to Stay Ahead of Cyberattacks” »

Feb 19, 2016

Cyber fraud held in Guwahati

Posted by in categories: business, cybercrime/malcode, transportation

HYDERABAD: Telangana police and Assam police nabbed an online fraudster in Guwahati on Thursday, even as the culprit tried to open fire at the police party.

A team of Cyberabad Cyber wing police had been camping in Guwahati for the last two days to nab one Vipul, wanted in a Rs 76-lakh online fraud case. He would send emails promising to get contracts in corporate companies, but after collecting money he would cheat the aspirants. The Cyberabad police party called Vipul on the pretext of some business deal to trap him. Crime wing officials and Assam police were waiting in a car for Vipul, who arrived in a Scorpio car.

However, Vipul got alert after seeing the police party and sped away from the location. On seeing the culprit slipping from the location, police chased his car.

Read more

Feb 18, 2016

Can Wearable Technology Threaten the Cyber Security of Your Business?

Posted by in categories: business, cybercrime/malcode, security, wearables

Better ditch the watch and shirt.

Wearables invite Cyber Security Risks in the office.


Smart wearable technology has a future-is-now feel to it. Unfortunately, it also has a your-data-is-vulnerable feel as well. Here’s how smart wearables are putting your company’s cyber security at risk.

Read more

Feb 18, 2016

Obama wants to spend $19 billion on cyber security

Posted by in categories: business, cybercrime/malcode, employment, health, quantum physics

One thing that will remain with tech for many years is jobs in cyber security — even with the layer of security that Quantum technology brings in the next 10 years; there is always a migration and retirement state that can (depending on the business and systems involved) could go on for years after Quantum platforms and networks are installed.


Then in December, aided and abetted by a Republican-controlled Congress, he eradicated those minor restrictions and replaced mindless austerity with clueless profligacy.

It proposes lifting the limits entirely from 2018. “It adheres to last year’s bipartisan budget agreement, it drives down the deficit, and includes smart savigs on health care, immigration and tax reform”.

Continue reading “Obama wants to spend $19 billion on cyber security” »

Feb 18, 2016

Cyber Threat Information Sharing Guidelines Released

Posted by in categories: cybercrime/malcode, law

Finally; it’s a start at least.


This week, the Federal government took the first steps toward implementation of the The Cybersecurity Information Sharing Act (CISA), enacted into law last December. CISA aims to encourage sharing of cyber threat indicators and defensive measures among private companies and between the private sector and the Federal government by providing liability protection for sharing such information in accordance with the Act. The DHS Federal Register notice was published this morning here.

As required by the Act, the government has released four pieces of guidance designed to assist companies and Federal agencies with respect to sharing, receiving and handling cyber threat information.

Read more

Feb 18, 2016

Cryptowall has been a cash bonanza for criminals, failure for cops

Posted by in category: cybercrime/malcode

Though dubbed the most successful malware in history Cryptowall can be stopped.

Read more