Twitter user says vacation tweets led to burglary
By Elinor Mills
Twitter user's tweets revealed he was out of town. Did that tip off a burglar?
Here's either a cautionary tale or an example of social-media paranoia. An Arizona man believes that his Twitter messages about going out of town led to a burglary at his ...
T-Mobile investigates possible security breach
By Marguerite Reardon
Updated at 2:30 p.m. PST with security source comment.
T-Mobile USA is looking into claims that a hacker has broken into its data bases and stolen customer and company information.
Someone anonymously posted the claims on the security mailing list Full Disclosure on Saturday. In that post, the ...
T-Mobile Investigating Claims It Was Breached
Online post offers sensitive data from wireless provider to the "highest bidder"
Tech Insight: How To Choose An Integrated Security Services Provider
New report guides enterprises in selecting a security service provider
Black Hat Founder Jeff Moss Appointed to Homeland Security Advisory Council
In Vulnerability Research
Jeff Moss, founder of the Black Hat and DefCon security conferences, was named to the Department of Homeland Security Advisory Council June 5.
Bill aims to speed frequent fliers through security
The TSA reauthorization legislation passed by the House has a provision that would strengthen the Registered Traveler program, a business group says.
Is Apple's iPhone 3GS Enterprise Ready?
The 3.0 software and iPhone 3GS offer incremental improvements for corporate deployments, but experts note some key elements are still missing.
Black Hat Founder Tapped To Advise Homeland Security
The fact that a former hacker will be palling around with other HSAC members shows that the government is casting a wide net for perspectives on cybersecurity.
Black Hat Founder Tapped To Advise Homeland Security
The fact that a former hacker will be palling around with other HSAC members shows that the government is casting a wide net for perspectives on cybersecurity.
Alleged T-Mobile Data Offered To Highest Bidder
A note offering the data for sale says that the company's databases, confidential documents, and financial documents were stolen.
China To Require Filtering Software On PCs
Starting July 1, PC makers will have to install pornography-blocking app Green Dam Youth Escort on all computers sold in China.
Air Force Names Cyberwarfare Commander
The 24th Air Force, which will likely be based at Lackland Air Force Base in Texas, will focus exclusively on cyberwarfare as part of the larger Air Force Space Command.
Federal CIO Kundra Looks Forward To Data.Gov 2.0
The upgrades to the site, which will be available in a few months, will feature new ways to find and use data, including the ability to tag data sets.
Homeland Security Names New Cybersecurity Officials
Philip Reitinger, who worked in cybersecurity for Microsoft and fought cybercrime for the Department of Justice, will help to coordinate cybersecurity efforts across the government.
Google Executive To Become Federal Deputy CTO
Andrew McLaughlin will find that he isn't the only ex-Google employee serving the Obama administration.
Obama Announces White House Cybersecurity Position
Names that have been bandied about include acting White House cybersecurity chief Melissa Hathaway and Microsoft VP Scott Charney.
White House Launching Transparency Blog
In a nod to openness and citizen participation in government, the Obama administration also will open White House blogs to public comments.
Obama Should Scrap Cybersecurity Czar, Analyst Says
Gartner expert says president's plan to protect nation's computing infrastructure won't work.
Anti-U.S. Hackers Infiltrate Army Servers
Exclusive: Defense Department investigators subpoena records from Google, Microsoft, and Yahoo in connection with ongoing probe.
Department Of The Interior Can't Locate Many PCs
The federal agency can't locate 20% of its computers and, because it has no encryption requirements, the missing PCs could be vulnerable to data theft or loss.
Obama, White House To Oversee Cybersecurity Leadership
The national security staff will include new positions for addressing cybersecurity, information sharing on terrorism, border security, and preparedness and response.
President Clinton Data On Hard Drive Lost By National Archives
The drive contains snapshots of the hard drives of departing administration officials, information that had been stored on 113 4-mm tape cartridges.
YouTube Launches U.S. Government Portal
The channel aggregates videos from the White House, CDC, NASA, and other federal agencies using a player that complies with government privacy regulations.
Poll: Companies still worried about open-source security
Businesses in North America and Europe remain broadly worried about the security of open-source software, according to new data from Forrester Research.
Spam drops 15 percent after FTC Pricewert takedown
The U.S. Federal Trade Commission's recent takedown of an Internet service provider thought to be a safe haven for spammers has reduced spam volumes, but only by a little.
Remove Sensitive Data Before You Sell an Old PC
Brian Ellis wants to know the best way to secure an old PC for a new owner.
Social Engineering: The Fine Art of BS, Face to Face
Social engineering expert Chris Nickerson reveals what criminals are looking for when it comes vulnerabilities in building security.
Social Engineering: 5 Security Holes at the Office
If you think the biggest threat to your sensitive information lies in network security, think again. Once a criminal is inside a building, there are limitless possibilities to what that person can access or damage. Take a look at your building's security. How easy is it to get inside?
T-Mobile investigates alleged data breach
T-Mobile is investigating a claim that a massive amount of internal data has been stolen from the telecommunication operator's servers, a company spokesman said Monday.
10 things you didn't know about cyberwarfare
Imagine a situation where a powerful country wants to annex its small neighbor, so it launches a week-long campaign of cyberattacks aimed at disrupting the financial, energy, telecom and media systems of its neighbor's biggest ally. A week later, the aggressor launches a full-scale cyberwar on its neighbor that includes air and naval defenses. With its ally's defenses weakened, the neighbor agrees to become a province of the aggressor in less than a week.
Verisign urges careful check of cloud security
SAS 70 - the auditing standard used by CPAs to evaluate the processing of transactions - is emerging as one of the key ways to evaluate cloud service provider security.
LxLabs boss found hanged after vuln wipes websites
Sensational development in VAserv megahack
The boss of Indian software firm LxLabs was found dead in a suspected suicide on Monday.…
Apple security is 'struggling,' researcher says
Laments lack of 'formal security program'
A well-known security consultant says Apple is struggling to effectively protect its users against malware and other online threats and suggests executives improve by adopting a secure development lifecycle to design its growing roster of products.…
Webhost hack wipes out data for 100,000 sites
Vaserv suspects zero-day virtualization vuln
A large internet service provider said data for as many as 100,000 websites was destroyed by attackers who targeted a zero-day vulnerability in a widely-used virtualization application.…
DOS attacks threaten mobile network security
Falling down
New types of denial of service attacks threatened the security of mobile data networks, a senior telecoms security researcher warned last week.…
Last.fm phish strikes a bum note
Crooks tune in to net unwary
Fraudsters have launched an attack which aims to trick Last.fm users into handing over their login credentials.…
Merrick Bank vs. Savvis Could Affect "Liability Dynamic" (June 3, 2009)
The lawsuit brought by Merrick Bank against Savvis raised important issues about compliance and liability.......
Judge Grants FTC Request for Temporary Restraining Order to Shut Down ISP (June 4, 2009)
A federal judge has issued a restraining order that shut down an Internet service provider (ISP) suspected of hosting spammers and other cyber criminals.......
Government Agencies Will Work with ICANN to Secure Internet (June 4, 2009)
The US Department of Commerce's National Telecommunications and Information Administration and the National Institute of Standards and Technology (NIST) will ask ICANN (The Internet Corporation for Assigned Names and Numbers) for help in deploying DNSSEC "at the authoritative root zone of the Internet" by the end of the year.......
NIST Releases Final Draft of Recommended Security Controls Document (June 4, 2009)
NIST has released the final public draft of Special Publication 800-53, Revision 3: Recommended Security Controls for Federal Information Systems and Organizations.......
DHS Names Three Cyber Security Officials (June 2, 2009)
While President Obama has yet to name the first White House Cyber Security Coordinator, DHS Secretary Janet Napolitano has named Philip Reitinger to be director of the National Cybersecurity Center (NCSC).......
Nominee Says DHS Will Retain Cyber Security Role (June 2 & 3, 2009)
Rand Beers, the nominee for Undersecretary of DHS's NPPD, said he was told by deputy national security adviser John Brennan that the yet-to-be-named cyber security coordinator will not diminish DHS's central role in federal cyber security operations.......
Microsoft and Adobe to Release Security Updates Next Week (June 4, 2009)
Microsoft will issue 10 security bulletins on Tuesday, June 9.......
RIM Issues Fix for BlackBerry PDF Vulnerability (June 3 & 4, 2009)
Research in Motion (RIM) has issued a patch for the Blackberry to address a vulnerability described in a security warning last week.......
Virginia Notifying Those Affected by Prescription Database Breach (June 4, 2009)
The state of Virginia is notifying 530,000 people by mail that their Social Security numbers (SSNs) may have been compromised in a computer security breach.......
Aviva Acknowledges Data Security Breach (June 3, 2009)
Insurance company Aviva, formerly known as Norwich Union, has notified the New Hampshire Attorney General of a breach that exposed sensitive customer information.......
Trojans Found Embedded in ATMs (June 3 & 4, 2009)
Researchers have found a group of Trojan horse programs that have been embedded in automatic teller machines (ATMs) in Eastern Europe.......
Phishers Target Outlook Users (June 3, 2009)
Reports are emerging of a phishing attack that targets Microsoft Outlook users.......
Sears Settles FTC Complaint Regarding Customer Internet Data Collection (June 4, 2009)
Sears has settled charges brought by the US Federal Trade Commission (FTC) regarding the company's failure to accurately describe the amount of information gathered by tracking software.......
Chinese Censors Blocking Tiananmen Anniversary Coverage (June 2, 2009)
Censors in China are apparently blocking access to Twitter, Flickr, Hotmail and Microsoft's live.......
3FN.net ISP shutdown interrupts spam campaigns
By Robert Westervelt
The shutdown of 3FN.net disrupted the Cutwail Botnet and may have reduced global spam volumes by 15%. But spam levels are expected to increase to pre-shutdown levels, experts say.
Twitter to Target Fake Pages
Twitter is experimenting with a service to verify the authenticity of accounts of high-profile users. The move comes after the microblogging service was sued by St. Louis Cardinals Manager Tony La Russa, saying someone posted comments under his name on a fake Twitter page.
- Twitter officials are working on a way to verify users of the microblogging service are who they say they are. In a blog post, Twitter co-founder Biz Stone said the company is experimenting in summer 2009 with a beta preview of a service it is calling, quot;Verified Accounts. quot; Details abo...
T-Mobile Continues to Investigate Hacker Data Breach Claims
Officials at T-Mobile are still investigating claims of a security breach made in a message on the Full Disclosure mailing list. In the message, hackers claimed to have breached T-Mobile's network and stolen customer and company data.
- T-Mobile is still investigating a claim that hackers swiped a large amount of data from the company's servers. On June 6, a message was posted on the Full disclosure mailing list in which attackers claimed to have hacked T-Mobile and stolen information. In the message, the alleged hackers ...
Unshrinking Shortened Web Links
In Safety Tips
Social networking are contributing to an explosion in the number of services that help people convert long URLs into tiny Web links. URL shrinking services are especially useful on sites that place a premium on brevity -- such as Twitter, which limits tweets to 140 characters. But few online communities have made it easy for users to tell where the shortened links will take them, a reality that could be advantageous to phishers and other cyber crooks. When I first began researching this subject, I was amazed to learn how many URL shortening services are available today (at least 90). Also, the lack of a built-in or standardized approach to URL shortening services within individual social networking sites adds complexity to the problem. For example, many Twitter users shorten long Web links with bit.ly, but Twitter users are just as likely to see Tweets with links shortened by the services
T-Mobile Investigating Data Breach Claims
In Misc.
Wireless phone giant T-Mobile said today it is investigating claims that hackers have broken in and stolen customer data and company proprietary information. On Saturday, June 6, someone anonymously posted to the Full Disclosure security mailing list claims that a broad range of internal T-Mobile data had been compromised and was being put up for sale to the highest bidder. "We have everything, their databases, confidental [sic] documents, scripts and programs from their servers, financial documents up to 2009. We already contacted with their competitors and they didn't show interest in buying their data - probably because the mails got to the wrong people - so now we are offering them for the highest bidder."
Brief: Data shows Grumblar still threatens
Data shows Grumblar still threatens
Counterintelligence Options for Digital Security
By Richard Bejtlich
As a follow-up to my post Digital Situational Awareness Methods, I wanted to expand on the idea of conducting counterintelligence operations, strictly within the digital security realm. I focus almost exclusively on counter-criminal operations, as opposed to actions against nation-states or individuals.
Spam Drops 15 Percent After FTC Pricewert Takedown (PC World)
In technology
PC World - The U.S. Federal Trade Commission's recent takedown of an Internet service provider thought to be a safe haven for spammers has reduced spam volumes, but only by a little.
Cisco Security Center: IntelliShield Cyber Risk Report
June 1-7, 2009
Report Highlight: Social Networking Facilitating Freedom of Speech
Universal 'Rubik's Cube' Could Become Pentagon Shapeshifter
By Noah Shachtman
Even by the standards of the Pentagon fringe science arm, this project sounds far-out: “” that can be ordered to “self-assemble or alter their shape, perform a function and then disassemble themselves.” But researchers back by Darpa are actually making progress on this incredible goal, Henry Kenyon at Signal magazine reports.
Troubleshoot Your Internet Connection
Your Internet service provider tells you that your service should provide "up to" 8 Mbps downstream. But then a Web-based speed tester tells you you're getting...
-- Aurora Report says ok haven’t changed things up in a while so here is a new feature I am going to try out. The following section is dedicated to the results of a Google Alert. Please comment as to whether this is helpful and more concise or on any other portions of this blog that you feel could be improved.
Google News Alert for: cybersecurity | information security | computer security
T-Mobile investigates possible security breach | ||
Black Hat Founder Tapped To Advise Homeland Security | ||
iPhone OS 3.0 adopts some BlackBerry-like security | ||
Clinton orders review of State Department security after arrests | ||
Browser security and privacy tips | ||
Information Security Veteran Joins Evolve IP | ||
Do 'I'm on vacation' posts pose security concerns? | ||
Cyber security review: Nine ideas on what it means to you | ||
China Requires Censorship Software on New PCs | ||
LogLogic Named a “Leader” in Magic Quadrant for Security ... |
Google Blogs Alert for: cybersecurity | information security | computer security
T-Mobile investigates possible security breach : News : Security ... |
Napolitano Swears in Hacker on Homeland Security Advisory Council ... |
Safeguard Business Unit Provides Security Services to Whitestone ... |
AVIRA Press Center - Avira presents updated security solutions at ... |
National Journal Online -- National Security Experts -- How Can ... |
Google Web Alert for: cybersecurity | information security | computer security
20% of IT Managers Admit to Cheating Information Security Resources |
No comments:
Post a Comment