“people have become more conscious of the danger of having their computer commandeered for nefarious purposes and have taken steps (such as the use of anti-virus software or being more careful about sites visited) to prevent its occurrence.”
Source: Cyber-security’s dirty little secret: It’s not as bad as you think • The Register
Thanks to the Register
“The Industrialization of Hacking has created a faster, more effective, and more efficient sector profiting from attacks to our IT infrastructure. By monetizing malware with cryptocurrency these professional, entrepreneurial, and resourceful hackers have created cybercriminal business models that share many similarities with legitimate businesses. They have a revenue stream, a budget, market researchers, a global pool of developers, QA analysts and testing, help desk support, and even guarantees.”
Source: Addressing the Challenges Cybercrime-as-a-Service Serves Up | SecurityWeek.Com
Thanks to SecurityWeek
“We are our faces, in a way we are not our Twitter profiles, social-security numbers, or even legal names. Although vast amounts of data are collected about most Internet users, they’re tied to what are essentially bureaucratic identifiers, like browser cookies or email addresses. Almost everything that represents me online is ultimately a jumble of numbers and letters, and nearly all of it—with some cost or sacrifice—can be changed. Even victims of fraud or domestic violence can apply to the government for a new social-security number. A face, though—that’s different. We’re stuck with our faces. It’s prohibitively expensive to change them beyond recognition, if it’s even possible. Facial recognition and other biometrics bind data about us to us like nothing else. And, once corporate metadata can recognize and glom onto our bodies—in all their “everlasting sameness”—we can never escape that link.”
Source: How Good Is Facial Recognition Technology, Really—and How Should We Regulate It? – The Atlantic
“The alleged criminals and their accomplices are said to have used the notorious banking trojans to steal money from online bank accounts both within the European Union as well as from other financial institutions elsewhere in the world, laundering the proceeds through money-mule networks along the way. Last week’s operation brings the total number of arrests up to 60 since the investigation first began, with 34 of those being related to a money laundering operation that was recently busted by Dutch law enforcement authorities.”
Source: Zeus and SpyEye crime syndicate taken down by Europol | Naked Security
Thanks to Naked Security
The head of US intelligence said Thursday that China is ‘the leading suspect’ in a massive data breach of Washington’s government personnel files, but that an investigation is ongoing.
Source: US spy chief says China ‘leading suspect’ in hack
Thanks to Phys.org
To think that we’ve come to a time in history when civilians have become targets.
Source: Are you a legitimate military target? | CSO Online
Thanks to CSO Online
“30 minutes or less to a better security program. Online webinars and training from US Department of Defense – Defense Security Service.”
Thanks to the DOD
As if we thought there was an end in sight, yet another hack. As long as expect to use a free service “The Internet” the benefits of exploiting the service for gain or giggles will continue unabated.
Army’s Public Website Hacked by Unknown Intruders – NBC News.
Thanks to NBC News
“We simply cannot allow our policymakers to use secret trade negotiations to make digital policy for the 21st century,” said Maira Sutton, global policy analyst at the Electronic Frontier Foundation. “Leaks of the TPP agreement have revealed time and time again that this opaque process has led to provisions that undermine our rights to free speech, privacy, and innovation online. The TPP is a huge threat to the Internet and its users. Full stop.”
via Hundreds of Tech Companies to Congress: TPP and Fast Track Harms Digital Innovation and Users’ Rights | Electronic Frontier Foundation.
Thanks to Electronic Freedom Foundation
I guess the data didn’t “stay in Vegas”. Another of the continuing saga of online security and privacy breaches that have become part of the cyber landscape.
And don’t expect NFC generated access systems like those used in the iPhone and other smartphones to protect you. Te Hard Rock problem is caused by flaws in the eCommerce infrastructure security of the hotel, not your payment system, card or device.
Hard Rock Hotel and Casino warns of potential payment card hack | PCWorld.
Thanks to PCWorld