1600 Burrstone Road, Utica, NY 13502
(315) 792-3006

Tag: Cybersecurity

Zeus Money Mule Recruiting Scam Targets Job Seekers

(Threatpost) No one can say that hackers don’t have a sense of irony. In search of money mules, attackers behind a variant of the Zeus Trojan have configured the malware to activate when users visit careerbuilder[.]com with code that redirects victims to an advertisement for a mule-recruitment website. Researchers at Trusteer spotted the scheme in…
Read more

N.S.A. Chief Says Phone Logs Halted Terror Threats

WASHINGTON (NYTimes)— The director of the National Security Agency told Congress on Wednesday that “dozens” of terrorism threats had been halted by the agency’s huge database of the logs of nearly every domestic phone call made by Americans, while a senator briefed on the program disclosed that the telephone records are destroyed after five years.…
Read more

Getting to Know Kosova Hacker’s Security Crew plus an Exclusive Interview with Th3 Dir3ctorY

(Infosec Institute) by Jay Turla – As a security researcher and an information security enthusiast, I am always intrigued by underground hacker groups and that’s why I do some research about them. In this article, we will talk about Kosova Hacker’s Security in order to understand their ideals and the essence of their existence as…
Read more

Pirate Bay founder wanted for Danish hack

(Infosecurity Magazine) Gottfrid Svartholm, one of the original founders of The Pirate Bay and currently awaiting a verdict for the hack of Logica in Sweden, is now wanted for another hack in Denmark: this time on CSC. Softpedia yesterday reported on a potentially serious hack in Denmark last year. “The incidents are currently being investigated…
Read more

Was Microsoft’s takedown of Citadel effective?

(Naked Security) by James Wyke – As we mentioned last week, Microsoft recently fought back against more than 1,400 Citadel botnets by sinkholing their Command and Control (C&C) infrastructure. SophosLabs has been monitoring Citadel for some time, including individual botnets such as those targeting Canadian institutions, so I decided to take a closer look at…
Read more

The Case for Teaching Network Protocols to Computer Forensics Examiners: Part 1

(DFI News) Insights on the role of network forensics and how knowledge of computer communications and network protocols is emerging as a necessary skill for digital investigators. Most computer forensics experts are well-versed in basic computer hardware technology, operating systems, common software applications, and computer forensics tools. And while many have rudimentary knowledge about the…
Read more

Tech Insight: What You Need To Know To Be A Cyber Forensics Pro

(Dark Reading) Cyber forensics has become a hot topic in security — and a critical skill that many enterprises would like to hire. But exactly what skills and experience does a security pro need to become a forensics expert? The first set of skills is knowledge of IT technology and its relationship to the collection…
Read more

Guardian reporter delayed e-mailing NSA source because crypto is a pain

(Ars Technica) If you still haven’t gotten around to encrypting your e-mail, you have company. Glenn Greenwald, the civil liberties writer who recently exposed the National Security Agency’s vast data-collection programs, wasn’t quick to jump on the e-mail encryption wagon either. According to recent articles in The New York Times and The Huffington Post, Greenwald…
Read more

Ticketmaster warns phishers using tickets as bait

(The Register) Australian online ticketing service Tickemaster has been hit by a phishing raid that has defeated Spam filters. Several Reg readers report receiving multiple emails yesterday (Vulture South received nine), all purporting to report newly-purchased tickets…read full article

Users Warned About Father’s Day Spam Campaigns

(Softpedia) Father’s Day is just around the corner (June 16) and as many users are rushing to do some last minute shopping, scammers and spammers are taking advantage of the opportunity. Symantec has spotted several spam campaigns. Some of them advertise replica watches and shady products and services, while others lure users to fake surveys…
Read more