Profile of Larry Greenemeier
News & Commentary Posts: 1064
Articles by Larry Greenemeier
posted in July 2007
Four men have pleaded guilty to using phony point-of-sale PIN-pad terminals to steal customers' data and passwords and then defraud stores.
The new threat comes from a number of newly registered Web sites that pretend to represent Italian organizations, but are really just vehicles for using malicious IFrames to spread malware.
A House committee hearing shows that the security dangers of file sharing over peer-to-peer networks is still a major problem.
The 13 months Yahoo will keep search data is shorter than the 18 months announced by Microsoft and Google.
Microsoft outlines incremental improvements to its privacy principles for its Live Search and online advertising services.
Don't expect to see a big crowd for EC-Council University home football games: The program's inaugural Master of Security Science class consists of only six students and all are taking their courses online.
Allied Cash's database administrator Christian Alvarez has been working to secure the company's new Web-based user interface in recent months.
Can cybercrooks successfully attack at will, and are those who report the details of these attacks causing more harm than good?
GE Healthcare already has rolled out encryption capabilities on 120,000 laptops as part of a five-pronged encryption strategy initiated in mid-2005.
The author of a new book, "Exploiting Online Games," says that cheaters are infesting online worlds like World of Warcraft and Second Life, and they could become a threat to mainstream business systems.
The No. 1 tactical security priority for U.S. companies in 2007, according to 37% of respondents, is creating and enhancing user awareness of policies. But this is down from 42% in 2006.
The biggest problem is the availability of tools that make it easy for the average person to launch spam campaigns, including those that employ phishing to steal personal information.
The South Florida bust resulted in the recovery of about 200,000 stolen credit card account numbers used in fraud losses roughly calculated to be more than $75 million.
The consortium will help federal government agencies develop IT networks and systems that more efficiently and securely share information.
The PDF image spam is just one of a litany of creative attempts to fool e-mail users into downloading malware or visiting phishing sites, says Symantec in its monthly spam report.
The Taiyuan University of Technology is testing software agents that crawl through any search engine looking for searched keyword results as well as any personal data that's been collected about the surfer.
Even if someone is the victim of identity theft, it's difficult to figure out how that person's sensitive personal information fell into the wrong hands, the agency said.
Experts say U.S. companies need to take the increasing use of cyberwarfare tactics and tools very seriously.
Al-jinan.org went undetected for more than four years, allowing users to use their own computers to launch denial-of-service attacks against anti-Islamic sites.
One organization suggests recent surges in Internet disruptions are a political play to influence December's elections in the Russian Federation.
U.S. businesses would be greatly impacted by any large-scale cyberattacks because most of that infrastructure is run by companies in the private sector.