Archive for 'Blog'

Twitter tormented by nettlesome computer program

Twitter tormented by nettlesome computer program

Unwelcome computer program disrupts the chatter on Twitter, adding to service’s growing pains

  • Monday April 13, 2009, 3:24 pm EDT

SAN FRANCISCO (AP) — A nettlesome computer program that tormented Twitter over the weekend is another reminder of the challenges facing the rapidly growing online communications service.

The mischievous program, known as a “worm,” targeted Twitter’s network with four different ...

Continue Reading →

Suprise! Crime is going up in a bad economy!

Report says online crime surging in recession

 

By Jason Szep

Reuters
Monday, March 30, 2009; 3:53 PM
 

BOSTON (Reuters) – Fraud on the Internet reported to U.S. authorities increased by 33 percent last year, rising for the first time in three years, and is surging this year as the recession ...
Continue Reading →

US Power Infrastructure at risk of an attack

WASHINGTON — Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials.

The spies came from China, Russia and other countries, these officials said, and were believed to be on a mission to navigate the U.S. electrical system and its controls. The intruders haven’t sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or ...

Continue Reading →

Brother can you spare $100,000,000?

File this under “It really is less expensive to prevent an attack then to pay for cleaning up an attack”

Pentagon spends $100 million to fix cyber attacks

WASHINGTON – The Pentagon spent more than $100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems, ...

Continue Reading →

The twits tweeting on Twitter..

So I know this post will be a very unpopular among many of my social marketing friends who feel that tweeter is the best thing since sliced bread.  I will admit while I find most technologies coming out today as fairly useful.  I could not find any useful purpose for twitter in my daily life.  Until Today….

Electronic Survellance

When you are trying to pull off an attack, any attack, the first thing you have to do is gain as much intelligence ...

Continue Reading →

Article exposes flaws in PCI-DSS

Payment Card Industry Swallows Its Own Tail

By Anthony M. Freed, Information-Security-Resources.com Financial Editor

PCI DSS, the self-regulatory set of guidelines that the payment card industry and retail merchants use to encourage financial information security, may well have entered it’s death throes Tuesday, as evidenced by revealing testimony during the House of Representative’s Committee on Homeland Security hearings.

Why the dire prognosis?

Anyone who ...

Continue Reading →

Senate Legislation Would Federalize Cybersecurity

Senate Legislation Would Federalize Cybersecurity
Rules for Private Networks Also Proposed

By Joby Warrick and Walter Pincus
Washington Post Staff Writers
Wednesday, April 1, 2009; A04

 

Key lawmakers are pushing to dramatically escalate U.S. defenses against cyberattacks, crafting proposals that would empower the government to set and enforce security standards for private industry for the first time.

The proposals, in Senate legislation that could be introduced as early as today, would broaden the focus of the government’s cybersecurity efforts to ...

Continue Reading →

Ghost in the Hack

Looks like the Chinese are still aggresively attacking anyone and everyone – Dave

 

Computer hackers based in China built up a network of compromised computers in the offices of the Dalai Lama and many other national government offices and organisations around the world, Canadian computer security researchers have revealed.

The network, nicknamed GhostNet, included over 1295 computers belonging to the Tibetan Government in Exile, embassies belonging to countries including India, South Korea and Germany, the Association of Southeast ...

Continue Reading →

Red Flag Delayed

In case you haven’t heard the FTC has delayed the deadline for implementation of the Red Flag Rules.  The deadline has been extended 6 months to May 1st 2009.  

The Red Flag rules require financial institutions and credit based corporations to develop and implement an identity theft prevention program.  

You can read more about the delay on the FTC website here http://www.ftc.gov/opa/2008/10/redflags.shtm

Parameter offers a great Security Awareness Training through our Hacker University.  Check out more information here.  http://www.parametersecurity.com/index.php/hacker-university

Continue Reading →

The Ancient Art of Cyber-Warfare Pt. 1

 

Over the weekend while listening to my Zune, an audio book of The Art of War started playing.  It had been awhile since I had actually listened to it, so I sat back grabbed a soda and let it played.  For those of you not familiar with this book let me give a brief overview.  Written sometime between 500 – 350 BCE the Ancient Art of War was written by the legendary Chinese General Sun Tzu.  Written as a military ...

Continue Reading →
Page 3 of 4 1234