background preloader

InfoSec

Facebook Twitter

US Army Computer Crimes Detectives Deliver Digital Justice. January 08, 2013 By: Colby Hauser No other environment within the modern era has evolved as rapidly and as exponentially as the Internet. Traversing this virtual jungle, a global community of users takes advantage of almost unlimited access to news, information and services by the simple click of a mouse or a tap on a Smartphone. In today’s digital age time waits for no one, unfortunately neither does crime. Throughout the world legions of cyber predators’ hunt, stalk, plot, and attack unsuspecting systems, networks and users in an effort to advance their criminal enterprise. And yet another apex predator inhabits this world, the US Army Criminal Investigation Command’s (CID) Computer Crimes Investigative Unit (CCIU), turning the tables on those would-be predators to where the hunters now have become the hunted. “Our investigations have led to arrests of Soldiers, civilians and foreign nationals throughout the world who were engaged in cybercrime directed at the US Army,” Andrews said.

Force-download. IBM Advances Security Intelligence to Help Organizations Combat Increasing Threats. ARMONK, N.Y., Feb. 22, 2012 /PRNewswire/ -- IBM (NYSE: IBM) today unveiled new capabilities planned for its security intelligence platform designed to combine deep analytics with real-time data feeds from hundreds of different sources to give organizations, for the first time, the ability to help proactively protect themselves from increasingly sophisticated and complex security threats and attacks using a single platform. Organizations today are struggling to defend themselves against an onslaught of ever-evolving data breaches, such as theft of customer and employee information, credit card data and corporate intellectual property. To date, many corporations have been unable to create a security defense system because they have cobbled together technologies that don't integrate in an intelligent and automated fashion.

This patchwork approach has created loopholes that hackers can exploit. Major breakthroughs planned in the security platform include: Threat Intelligence Broad Coverage. 2012 Cyber Security Predictions from the Websense Security Labs. Posted: 17 Nov 2011 09:33 AM | Patrik Runald | With all of the crazy 2011 security breaches, exploits and notorious hacks, what can we expect for 2012?

Last year’s Websense Security Labs predictions were very accurate, so these predictions should provide very useful guidance for security professionals. Here are the highlights; the full report can be downloaded here. 1. Your social media identity may prove more valuable to cybercriminals than your credit cards. Bad guys will actively buy and sell social media credentials in online forums.

Trust is the basis of social networking, so if a bad guy compromises your social media log-ins, there is a good chance they can manipulate your friends. 2. We’ve already seen one APT attack that used the chat functionality of a compromised social network account to get to the right user. 3. 1,000+ different mobile device attacks coming to a smartphone or tablet near you. 4. 5. 6. 7.

My speech to the IAAC | Ben Hammersley's Dangerous Precedent.

Risk

Physical Attacks and Losses. Russian Hackers Make Millions Breaching ATMs. Reputation Attacks. Privacy & Data Breaches. Privacy Theater: Why Social Networks Only Pretend To Protect You. Editor’s note: The following guest post was written by Rohit Khare, the co-founder of Angstro. Building his latest project, social address book Knx.to, gives him a deep familiarity with the privacy policies of all the major social networks. I’d be wishing everyone a happier New Year if it were easier to mail out greeting cards to friends on Facebook and colleagues on LinkedIn. I’d like to use knx.to, our free, real-time social address book, but their ‘privacy’ policies prevent us from downloading contact information, even for my own friends. At least those Terms of Service (ToS) that force us to copy addresses and phone numbers one-by-one also prevent scoundrels from stealing our identity; reselling our friends to marketers; and linking our life online to the real world.

Wrong. Industrial-Scale Identity Theft I realize that I’m using the incendiary terms “identity theft” and “stole,” even though I would agree that users voluntarily consented to type their passwords into RockYou’s forms. C5_APT_SKHack.

Malware

DoS + Downtime. Cycle-Saver. How-to on securing PDF documents | InfoSecPodcast.com.