Sunday, October 28, 2012

Infosecurity - Consumer loyalty depends on privacy and data security, survey finds

Infosecurity - Consumer loyalty depends on privacy and data security, survey finds:

Consumers are taking privacy and security into account more often when making purchasing decisions, would consider leaving companies in the wake of a data breach incident, and measure corporate reputation based on these issues, according to a survey by public relations firm Edelman.

Wednesday, October 24, 2012

IRS policies help fuel tax refund fraud, officials say - CNN.com

IRS policies help fuel tax refund fraud, officials say - CNN.com:

"It's like the federal government is putting crack cocaine in candy machines," said Detective Craig Catlin of the North Miami Beach, Florida, Police Department. "It's that easy."

Tuesday, October 23, 2012

Chrome Web Store - PhishAri

Chrome Web Store - PhishAri:

PhishAri is a Twitter application which detects phishing tweets in realtime.

Paterva / Maltego

Paterva / Maltego:

Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates.

Monday, October 22, 2012

Presentations by CAIDA

Presentations by CAIDA:

Awesome collection of research: Presentations by CAIDA personnel and collaborators are available for download below (UCSD)

3 Tools to Scan the File System With Custom Malware Signatures

3 Tools to Scan the File System With Custom Malware Signatures:

ClamAV is a free antivirus engine. Its Unix version allows the user to create custom signatures for files based not only on their cryptographic hash, but also to fingerprint file sections, match specific byte sequences, use wildcards, and combine signatures according to Boolean rules.

yara-project - A malware identification and classification tool - Google Project Hosting

yara-project - A malware identification and classification tool - Google Project Hosting:

YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families

Google And Android To Move From Running Your Mobile Devices To Driving Your Cars? - Tapscape

Google And Android To Move From Running Your Mobile Devices To Driving Your Cars? - Tapscape:

Google isn’t just interested in dominating the information super highway by having a tight grip on the internet and the mobile device market via their Android devices. They also want to rule actual concrete-and-asphalt roads by filling them with Google driverless cars running on a combination of existing sensor technology and several homegrown platforms.

Many Android apps from Google Play security-challenged

Many Android apps from Google Play security-challenged:

German university researchers have found hundreds of popular Android apps in the Google Play market that leave 10s of millions of users vulnerable to attackers looking to steal banking credentials, credit card numbers and other personal information.

IRS pays billions in refunds to identity thieves - Aug. 2, 2012

IRS pays billions in refunds to identity thieves - Aug. 2, 2012:

IRS attributed the increase in tax fraud to a number of issues, including an increase in electronic filing, higher dollar amounts of refundable credits and a growing number of people using debit cards to receive refunds.

IRS pays billions in refunds to identity thieves - Aug. 2, 2012

IRS pays billions in refunds to identity thieves - Aug. 2, 2012:

It attributed the increase in tax fraud to a number of issues, including an increase in electronic filing, higher dollar amounts of refundable credits and a growing number of people using debit cards to receive refunds.

China cracks hacking syndicate | ZDNet

China cracks hacking syndicate | ZDNet:

Chinese police have detained a gang of hackers, certificate forgers, and personal data collectors, believed to be responsible for attacks on 185 government Web sites to manufacture and sell fake certificates ranging from medical care to financial services.

6 Ways to Add Twitter to Your WordPress Site

6 Ways to Add Twitter to Your WordPress Site:

This article will cover various ways to merge your Twitter presence with your website, and thus, maximize opportunities to relate to your web audience.

Sabu - The FBI's most valuable hacker — RT

Sabu - The FBI's most valuable hacker — RT:

In the nine months since the FBI busted the hacker known as Sabu for his roles with LulzSec and Anonymous, authorities say he worked all hours of the night to help them nab others within the group.

25% of Americans Were Victims of Security Breaches in Past Year

25% of Americans Were Victims of Security Breaches in Past Year:

One in four consumers in the United States had personal identification lost or stolen due to a data breach in the past year, a new study suggests.

Officials say Chinese spies have targeted every sector of the U.S. economy - Rock Center with Brian Williams

Officials say Chinese spies have targeted every sector of the U.S. economy - Rock Center with Brian Williams:

The Chinese are playing dirty in the international spy game, according to current and former intelligence officials at the highest levels of government.

China busts 700 cybercriminal gangs | ZDNet

China busts 700 cybercriminal gangs | ZDNet:

A country-wide Web policing campaign led by China's Ministry of Public Security has dealt a blow to 700 cybercriminal gangs in the country.

U.K. to probe Huawei, BT relationship over security concerns | ZDNet

U.K. to probe Huawei, BT relationship over security concerns | ZDNet:

The relationship between embattled Chinese telecoms equipment maker Huawei, and the U.K.'s largest telecoms company British Telecom (BT) will be investigated by the U.K. Parliament's intelligence and security committee.

Common WordPress Malware Infections — Smashing WordPress

Common WordPress Malware Infections — Smashing WordPress:

WordPress security is serious business. Exploits of vulnerabilities in WordPress’ architecture have led to mass compromises of servers through cross-site contamination.

Friday, October 19, 2012

Ranking America

Ranking America: "According to UNICEF, 23.1% of American children under the age of seventeen live in poverty, which makes the United States rank second out of thirty-five economically advanced countries ranked in that category. Romania ranks first, with 25.5% of children living in poverty."

'via Blog this'

Billing Records Mixed with Recyclables Causes Breach - HDM Latest News Article

Billing Records Mixed with Recyclables Causes Breach - HDM Latest News Article:

A mix-up by a janitorial services firm has resulted in a major data breach at a 19-member radiology group practice in Springfield, Mo.

Snooping Gets Employees Fired at Akron General - HDM Latest News Article

Snooping Gets Employees Fired at Akron General - HDM Latest News Article:

Akron General Medical Center in Ohio has terminated a “few” employees for snooping in the electronic health records system following the shooting death

Wednesday, October 17, 2012

Respondents were asked if they kept PII in a secure location

Demographics-Study.pdf (application/pdf Object)

http://www.laresinstitute.com/wp-content/uploads/2011/09/Demographics-Study.pdf

Respondents were asked if they kept PII in a secure location in their home, and overall 76% did,
and 24% did not, and interestingly, people with no college degree were more likely to keep their
information in a secure location than those that had a college or post-graduate degree.

Follow-Up Test: 1999 BMW 323i Sport

Follow-Up Test: 1999 BMW 323i Sport

The new 3 Series upholds the BMW tradition of stellar handling and makes a strong argument for the inherent balance of a finely tuned rear-drive car.

Sunday, October 14, 2012

House Is Gone but the Debt Lives On - WSJ.com

House Is Gone but the Debt Lives On - WSJ.com:

The result was a foreclosure hangover that homeowners rarely anticipate but increasingly face: a "deficiency judgment."

Tuesday, October 9, 2012

www.nqmobilefamily.com

www.nqmobilefamily.com:

'via Blog this'

Successful cyberattacks driving up cost of cybercrime, study finds

Successful cyberattacks driving up cost of cybercrime, study finds

Cyberattacks on organizations have more than doubled over a three-year period, driving up the costs associated with fallout from the attacks, according to a new study conducted by the Ponemon Institute.

Cyber crime costs UK organisations Q2.1m a year

Cyber crime costs UK organisations Q2.1m a year:

Cyber crime costs UK organisations an average of Q2.1m a year each, according to the 2012 Cost of Cyber Crime study by the Ponemon Institute.

New Research Shows Cybercrime Costs Have Increased Nearly 40 Percent - HotHardware

New Research Shows Cybercrime Costs Have Increased Nearly 40 Percent - HotHardware:

The third-annual Cost of Cyber Crime Study shows the occurrence of cyberattacks has more than doubled since 2010. The cost of the attacks has increased by nearly 40 percent over the same three year period.