Jeremy Hammond, former LulzSec member and alleged mastermind of the Stratfor hack, pled not guilty on Monday during a brief hearing at the US District Court in Manhattan, the Associated Press reported on Monday.
It was in December of 2011 that AntiSec supporters targeted Stratfor, walking away with 860,160 usernames (email addresses) and passwords, and 60,000 credit card records. Earlier this year, the FBI charged Jeremy Hammond with the Stratfor attack, slapping him with one count of computer hacking conspiracy, one count of computer hacking, and one count of conspiracy to commit access device fraud. Each count carries
Researchers at Trusteer have discovered a variant of Zeus with a P2P component that is targeting high profile sites such as Facebook, Google, Hotmail, and Yahoo in order to compromise debit and credit card data.
The attacks being carried out by the P2P version of Zeus use a basic form of social engineering. Depending on the service being targeted at the time, users are presented with offers for additional security measures and rebates.
In the case of Facebook, malware injects the necessary code so that an offer of 20% cash back is displayed. All the user has to do is link their Visa or MasterCard
Back in May of this year, Internet security firm Bitdefender launched an App and service designed to help iOS users get a grip on what the apps installed on their mobile devices may be up to.
Dubbed “Clueful” by Bucharest, Romania-based Bitdefender, the App tells owners of iOS devices which applications may be accessing more information than they need, and identifies potentially “misbehaving” apps, giving users an inside look at all the information app developers can gather about a user. In simple terms, Clueful identifies
The Department of Homeland Security has warned that encrypted traffic sent to and from RuggedCom network products can be decrypted by malicious attackers.
The vulnerability with the proof-of-concept code was publicly disclosed by security researcher Justin W. Clarke of Cylance, according to the ICS-CERT Alert (PDF) released Aug. 21 by the Industrial Control Systems Cyber Emergency Response Team. The key management issue is remotely exploitable
A couple of days ago, I received an e-mail from Iran. It was sent by an analyst from the Iranian Computer Emergency Response Team, and it was informing me about a piece of malware their team had found infecting a variety of Iranian computers. This turned out to be Flame: the malware that has now been front-page news worldwide.
When we went digging through our archive for related samples of malware, we were surprised to find that we already had samples of Flame, dating back to 2010 and 2011, that we were unaware we possessed. They had come through automated reporting mechanisms,
- BYOD into the Cloud: The Next Phase of Enterprise Mobility -
- Digital Disruption - E2 Conference Boston
- The Language of UX: Beyond Buzzwords -
- Get practical strategies to build a solid plan for profitability and success - Mobile Commerce World - Mobile Commerce World
- The E2 Social Business Leaders - E2 Conference Boston - E2 Conference Boston
- The Critical Importance of High Performance Data Integration for Big Data Analytics
- Mobile DevOps: Achieving continuous delivery with multiple front ends and complex backends in Banking, Financial Services, and Insurance
- Why is Information Governance So Important for Modern Analytics?
- Get Actionable Insight with Security Intelligence for Mainframe Environments
- Cloud Security: It’s Not Just for IT Anymore
This Week's Issue
Free Print SubscriptionSubscribe
Current Government Issue
- The Government CIO 25: These influential and accomplished government IT leaders are finding ways to be cost efficient and still innovate.
- Rethink Video Surveillance: It's not just about networked cameras anymore. New technology provides analytics, automation, facial recognition, real-time alerts and situational-awareness capabilities.
- Read the Current Issue