- Homepage: http://krebsonsecurity.com/
June 2012: "Still, Brian Krebs, a computer security authority who writes the blog Krebs On Security, insists these are not foolproof against sophisticated hackers. Mr. Krebs said the most effective way to guard against corporate account takeover was to dedicate one computer solely for online banking. Employees should never send e-mail or browse the Web from this machine."http://www.nytimes.com/2012/06/14/business/smallbusiness/protecting-business-accounts-from-hackers.html
Role Name Type Last Updated Employee/Freelancer/Contractor (past or present) Washington Post Source Aug 25, 2009
Articles and Resources
27 Articles and Resources. Go to: [Next 7]
Date Fairness.com Resource Read it at: Jun 13, 2012 Owners May Not Be Covered When Hackers Wipe Out A Business Bank Account
QUOTE: Computer security specialists say these crimes, called “corporate account takeovers,” have become increasingly common...most banks do not take responsibility for unauthorized debits from business accounts. Unless the owners have fraud insurance, they must shoulder the losses alone.
New York Times Apr 04, 2011 After Breach, Companies Warn of E-Mail Fraud
QUOTE: Millions of people were at increased risk of e-mail swindles after a giant security breach at an online marketing firm… And it could lead to a surge in phishing attacks — e-mails that purport to be from a legitimate business but are intended to steal information like account numbers or passwords.
New York Times Aug 25, 2009 Businesses Reluctant to Report Online Banking Fraud (Security Fix)
QUOTE: many victimized companies [of online banking fraud] are reluctant to come forward out of fear of retribution by their bank.
Washington Post Aug 18, 2009 Three Alleged Hackers Indicted in Large Identity-Theft Case
QUOTE: A federal grand jury has indicted three people on charges of hacking into the files of the credit and debit card processing giant Heartland Payment Systems last year in what the Justice Department is calling the largest identity-theft case ever prosecuted.
Washington Post Jul 30, 2009 File Sharing Leaks Sensitive Federal Data, Lawmakers Are Told
QUOTE: The information is often exposed inadvertently by people who download the technology to share music or other files, not realizing that the "peer-to-peer" software also makes the contents of their computers available to other users, experts said....Robert Boback said the use of such software is being exploited by foreign governments for espionage and other purposes.
Washington Post Jul 07, 2009 High Crimes Using Low-Tech Attacks
QUOTE: According to financial fraud experts, so-called "man-in-the-phone" attacks require little more than a telephone and old-fashioned con artistry.
Washington Post Nov 08, 2008 Extortion Used in Prescription Data Breach: FBI Investigating Threat Against Express Scripts Customers
QUOTE: One of the nation's largest processors of pharmacy prescriptions said this week that extortionists are threatening to disclose personal and medical information about millions of Americans if the company fails to meet payment demands.
Washington Post Oct 31, 2008 Virtual Heist Nets 500,000+ Bank, Credit Accounts
QUOTE: A single cyber crime group has stolen more than a half million bank, credit and debit card accounts over the past two-and-a-half years using one of the most advanced strains of computer spyware in existence
Washington Post Jul 09, 2008 Justice Breyer Is Among Victims in Data Breach Caused by File Sharing
QUOTE: Services such as LimeWire, which are known as peer-to-peer networks, link computers directly, allowing users to swap digital movies, music and files with other users without the need of a central Web site to manage the exchange. What users may not be aware of is that the software that facilitates file sharing may be configured to allow access to a portion, if not all, of a user's documents.
Washington Post Sep 24, 2007 Contractor Blamed in DHS Data Breaches
QUOTE: The FBI is investigating a major information technology firm with a $1.7 billion Department of Homeland Security contract after it allegedly failed to detect cyber break-ins traced to a Chinese-language Web site and then tried to cover up its deficiencies, according to congressional investigators. At the center of the probe is Unisys Corp...
Washington Post Jul 12, 2007 Site Plans to Sell Hacks to Highest Bidder
QUOTE: A Swiss Internet start-up is raising the ire and eyebrows of the computer security community with the launch of an online auction house where software vulnerabilities are sold to the highest bidder.
Washington Post May 16, 2007 'Rogue' Internet Pharmacies Fueling Rx Abuse, Panel Told
QUOTE: A sharp increase in the number of online pharmacies offering highly controlled drugs without requiring a prescription is feeding a similar rise in the abuse of powerful pharmaceuticals in the United States, particularly among teens, witnesses told a Senate panel Wednesday.
Washington Post May 01, 2007 U.S.: Online Payment Network Abetted Fraud, Child Pornography
QUOTE: At the heart of the government's case are allegations that E-Gold executives turned a blind eye to illegal activity on its networks, activity that allegedly ranged from the transfer of proceeds garnered from pyramid and investment scams to credit-card fraud and payments for child pornography materials.
Washington Post Mar 14, 2007 Cyber-Criminals Getting Bolder
QUOTE: Online crime is easier, in part because tools for carrying out attacks are readily available and harder to purge from computers. Moreover, for consumers like Hoyler, there is often no surefire way to know how or what information has been stolen. Notifying individual victims is time-intensive and expensive, and law enforcement agencies and credit bureaus say it's not their job.
Washington Post Jan 25, 2007 Substitute Teacher Faces Jail Time Over Spyware
QUOTE: A 40-year-old former substitute teacher from Connecticut is facing prison time following her conviction for endangering students by exposing them to pornographic material displayed on a classroom computer....The defense claimed the graphic images were pop-up ads generated by spyware already present on the computer prior to the teacher's arrival.
Washington Post Jul 12, 2006 Top Cyber Security Post Still Unfilled After a Year
QUOTE: One year after the Department of Homeland Security created a high-level post for coordinating U.S. government efforts to deal with attacks on the nation's critical technological infrastructure, the agency still has not identified a candidate for the job...[some candidates--Ed.] were apparently knocked out of the running for political or professional considerations.
Washington Post Jun 16, 2006 Rapid Response Is Best Defense Against ID Theft
QUOTE: It may have already happened to you: A letter arrives in the mailbox from your bank or alma mater, stating that a hacker break-in or lost laptop may have compromised sensitive data on thousands of people, and that you may be among the unlucky ones. What to do?
Washington Post May 17, 2006 In the Fight Against Spam E-Mail, Goliath Wins Again
QUOTE: The spammer also sent another message: Cease operations or Blue Security customers will soon find themselves targeted with virus-filled attacks.
Washington Post Apr 30, 2006 The Web's Million-Dollar Typos
QUOTE: Google Inc., which runs the largest ad network on the Internet, is making millions of dollars a year by filling otherwise unused Web sites with ads. In many instances, these ad-filled pages appear when users mistype an Internet address, such as "BistBuy.com." This new form of advertising is turning into a booming business that some say is cluttering the Internet and could be violating trademark rules.
Washington Post Nov 02, 2005 Study of Sony Anti-Piracy Software Triggers Uproar: File-Hiding Technique Alarms Security Researchers; Developer Offers Patch
QUOTE: Privacy and security experts charged that the technology built into many of Sony's music CDs since March is unnecessarily invasive and exposes users to threats from hackers and virus writers.
27 Articles and Resources. Go to: [Next 7]
- Arts & Humanities
- Businesses & Organizations
- Computers & Information Technology
- Family & Friends & Interpersonal
- Government & Politics / History
- Health & Medicine
- Law & Justice
- Media & Journalism
- Personal Finance & Career
- Philosophy & Religion
- Recreation & Entertainment
- Science & Technology
- Social Sciences & Groups
- Arctic / Antarctic / Greenland
- Central America / Caribbean
- Eurasia / Central Asia
- Middle East
- North America
- Oceania / AustralAsia
- South America
- About Fairness.com
- Contact Us
- Conditions of Service
- Fair Use Notice
- Advisory Board
Not a current user? Sign up!