Monday, October 31, 2011
Saturday, October 29, 2011
Social media company admits to massive lapse in security
At least 760 companies' networks were compromised by the same breach that affected security firm RSA, elevating concern over data security.
Friday, October 28, 2011
According to the original indictment, filed in January 2011 by the Israel State Attorney's office, Eskin was contacted in 2007 by a Russian citizen, Alexei Drobashenko, who asked him to gather information about Michael Cherney in order to use it in a smear campaign.
A married couple was arrested in the German town Michelbach, suspected of stealing secrets from German car manufacturers, after it emerged one of them worked in the auto industry for the past 20 years.
“intelligence service sources say the man, named only as Andreas A., had worked for Faurecia, one of Germany’s top car part manufacturers which supplies major companies including Volkswagen, Renault, Toyota and Ford,” where he is thought to have engaged in “industrial espionage.”
RAYMOND, NH -- An employee at a New Hampshire high school is accused of looking for trouble. Police said he used a hidden camera to violate a secretary’s privacy.
The apparent victim said she caught him in the act.
The 27-year-old computer technician, Daniel Malo, was arrested for allegedly shooting video of a female colleague from under her desk at Raymond High School.
According to the police report, Malo admitted he has a “boot fetish.”
“I think that’s totally wrong, a boot fetish?” said Jessica Harris, a concerned citizen.
Police said Malo was called to the school guidance office to fix a woman’s computer. Malo allegedly took his digital camera out of his pocket and placed it on the floor shooting video in “movie mode.”
Police said the woman was wearing a skirt with knee high boots and asked Malo, “Is that a camera?”
Malo allegedly said it was.
There was no comment from a woman that opened the door at Dan Malo’s Manchester home.
Raymond residents that read about the arrest on the town’s website were appalled.
“Oh wow, that’s crazy,” one resident said.
“No, he shouldn’t be around children or anything like that, especially women,” added Jessica Harris.
The alleged victim was sad to be concerned and upset.
School officials said they met with the woman and assured her she was safe, they also said that no students were involved.
Sunday, October 23, 2011
Kexue Huang, a scientist and native of China, pleaded guilty last week in a federal court to swiping millions of dollars worth of trade secrets from Dow Chemical Co. and Cargill Inc. for other people doing research in Germany and China.
A federal jury last month ordered South Korea's Kolon Industries to pay DuPont Co. $920 million for stealing trade secrets regarding synthetic fibers used in such products as Kevlar body armor. A former DuPont engineer hired by Kolon, Michael Mitchell of Virginia, was sentenced in March last year to 18 months in prison for theft of trade secrets for passing on key DuPont data to Kolon.
And area technology companies are likely fooling themselves if they think they're not in the cross-hairs of such spy efforts, according to the Federal Bureau of Investigation. "If you haven't been a victim yet, it's because you have been and you don't know it, or you will be," Barry W. Couch, a special agent with FBI's Buffalo division, told a conference room full of area optics industry executives last week. "Don't be blindsided."
Chili's Sydor Optics played host as the FBI spent a handful of hours talking about counterintelligence and economic espionage issues, with handouts and a video presentation all revolving around the message that companies are under siege by foreign economic competitors, often with explicit help from foreign governments.
Optics in particular "is a targeted industry," said FBI special agent Chad Kaestle. Other frequently targeted technologies include sensors, aeronautics and marine systems.
Wednesday, October 19, 2011
Anonymous is eyeing industrial control systems for future attacks, says the U.S. Department of Homeland Security, but its members have yet to demonstrate a capability to inflict damage to these systems.
"The information available on Anonymous suggests they currently have a limited ability to conduct attacks targeting ICS," says in thesecurity bulletin recently compiled by DHS' National Cybersecurity and Communications Integration Center. "However, experienced and skilled members of Anonymous in hacking could be able to develop capabilities to gain access and trespass on control system networks very quickly."
Aware that vulnerabilities in industrial control systems are plentiful, the DHS warns that common penetration testing software already uses control system exploits and packet inspection tools now support industrial protocols, so they can be taken advantage of for mounting attacks.
"In addition, there are control systems that are currently accessible directly from the Internet and easy to locate through internet search engine tools and applications," says the DHS experts. "These systems could be easily located and accessed with minimal skills in order to trespass, carry out nefarious activities, or conduct reconnaissance activities to be used in future operations."
Anonymous has still not targeted industrial control systems, but the DHS expects them to start in the near future as the collective has already made it known that its members should be targeting energy companies that don't seem to make an effort towards a "greener" production.
Friday, October 14, 2011
Did you open your BlackBerry Wednesday or even Thursday morning and find – nothing? No new e-mails, or tweets. No new text messages. Just blackness and that familiar screen saver photo of your child, spouse or dog? Welcome to the world of cyber-terrorism vulnerability.
The mysterious, world-wide virus that crippled BlackBerrys this week and spread like the plague – more on that threat later – across crossing oceans and five continents may spell financial catastrophe for the struggling Research In Motion aka RIM, whose stock shares have lost 60 percent of their value since the start of the year.
An RIM spokesman has said that the outage was caused by what Security Week called “a core switch failure within RIM’s infrastructure,” and not by a deliberate disabling attack. But the outage highlights the threat that determined cyber-warriors could pose to the nation’s communications systems if they target them.
For over a decade cyber-experts have urged the U.S. to upgrade critical infrastructure to protect vital dams, power plants, and communications systems from cyber-crime or cyber-attacks from rival countries. But the country remains complacent and highly vulnerable, as the BlackBerry outage shows.
During a recent cyber-security summit in New York, numerous experts warned that cyber-attacks could not only cause billions of dollars in damage to such vital systems, but endanger national security.
Read more: http://nation.foxnews.com/blackberry-outage/2011/10/13/welcome-world-cyber-terror-vulnerability#ixzz1amzsvuvp
Thursday, October 13, 2011
Federal authorities have arrested and charged a 35-year old Florida man for allegedly hacking dozens of Hollywood celebrities, including breaking into Scarlett Johansson’s phone and leaking nude pictures of her to the internet.
Florida Man Arrested in “Operation Hackerazzi” for Targeting Celebrities with Computer Intrusion, Wiretapping, and Identity Theft
Friday, October 7, 2011
Doubts custodian’s assurances. Fears possible extortion of military employees whose personal medical data was taken.
Wednesday, October 5, 2011
Law enforcement and military officials are increasingly using secret devices sometimes called “stingrays” to locate people via their cellphones, even when the phones aren’t in use, the Wall Street Journal reported recently. But finding people isn’t all that this type of gear can do.
Today, corporates are looking at social media like Twitter, LinkedIn and Facebook to broaden their online outreach. In a session at INTEROP Mumbai 2011, Abilash Sonwane, Senior-VP, Elitecore Technologies, talked about how social media networks are the next frontier of corporate espionage
Around 13 percent of corporate losses occur due to corporate espionage, as per a recent KPMG report. The number is less as most of the companies usually don’t admit it. In a session at INTEROP Mumbai 2011, Abilash Sonwane, Senior-VP, Elitecore Technologies, talked about how social media networks are the next frontier of corporate espionage.
Today, corporates are looking at social media like Twitter, LinkedIn and Facebook to broaden their online outreach. As per Nielsen Online study, social networking is now officially more popular then e-mail. Considering the popularity of social media among corporates, Elitecore Technologies did a research on 20 companies to find out how social media can be used for corporate espionage.
To conduct the research, Elitecore selected companies that were active on social media from a mix of industries and geographies. The company found out that though on one hand social media can enable an enterprise to enhance its relationship with customers, on the other hand it can adversely affect a company’s reputation.
Tuesday, October 4, 2011
Despite efforts to improve, GAO report says most government agencies are at risk of security attack.
Sunday, October 2, 2011
Saturday, October 1, 2011
“We expect it is very substantial — substantial in monetary terms, substantial in security terms,” said James N. Miller, principal deputy undersecretary of defense for policy. “The nation has a substantial interest in protecting intellectual property.”
The Pentagon’s request for an estimate went to the National Intelligence Council, which produces National Intelligence Estimates (NIEs), said Deputy Secretary of Defense William J. Lynn, adding that its report will likely be classified when the assessment is complete.
Security specialists say that hackers, many thought to be operating on behalf of communist China, are stealing vast quantities of proprietary data from U.S. defense, energy and other firms every year, compromising the nation’s security and economic advantage.
“It is a massive transfer of wealth,” said Phyllis Schneck, chief technology officer for public-sector business at computer security firm McAfee Inc.“Things that would have created money and jobs for one company in one country are instead creating them for other companies in another country.”
Illinois police officers have to be the most smug cops in the nation knowing they have the power to arrest citizens on felony charges for recording them in public while they themselves have every right to record citizens.
That smugness is very evident in the latest case to emerge from the Land of Lincoln.
Watch the below video, and read more here...