CyberCrime and CyberSecurity
14 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by STO STRATEGY from IT SEC TOOLS
Scoop.it!

Daily Cyber News 05/24/2014

Daily Cyber News 05/24/2014 | CyberCrime and CyberSecurity | Scoop.it
IT pro gets 4 years in prison for sabotaging ex-employer's system

“A former network engineer for oil and gas company EnerVest has been
sentenced to four years in federal prison after pleading guilty in
January to sabotaging the company’s systems badly enough to disrupt its
business operations for a month. Ricky Joe Mitchell of Charleston, West
Virginia, must also pay $428,000 in restitution and a $100,000 fine,
according to an announcement this week from U.S. Attorney Booth
Goodwin’s office. In June 2012, Mitchell found out he was going to be
fired from EnerVest and in response he decided to reset the company’s
servers to their original factory settings. He also disabled cooling
equipment for EnerVest’s systems and disabled a data-replication
process.”


http://www.esecurityplanet.com/network-security/network-engineer-gets-four-year-prison-sentence-for-attack-on-former-employer.html

Data Breach at American Institutes for Research Exposes 6,500 Employees'
Info

“About 6,500 current and former employees of the American Institutes
for Research (AIR) may have had unencrypted information – including
Social Security numbers and payment card information – compromised
after unauthorized access was gained to one of the organization’s
servers.
How many victims? About 6,500.
What type of personal information? Social Security numbers and payment
card information is among the unencrypted data that was compromised.
What happened? Unauthorized access was gained to an AIR server that
contained the information.
What was the response? AIR brought on a digital forensics firm to carry
out an investigation. All impacted employees are being notified and
offered a free year of credit monitoring services.
Details: AIR learned of the incident on May 12. Notification letters
are dated May 14. The breach impacted business systems, and student and
client information was not affected.
Quote: “At this point, we have no evidence that any information was
accessed or misused,” according to a notification letter from David
Myers, president and CEO of AIR”


http://blogs.edweek.org/edweek/DigitalEducation/2014/05/data_breach_at_major_k-12_rese.html

Visa, MasterCard renew push for chip cards

“Visa and MasterCard are renewing a push to speed the adoption of
microchips into U.S. credit and debit cards in the wake of recent
high-profile data breaches, including this week’s revelation that
hackers stole consumer data from eBay’s computer systems.
Card processing companies argue that a move away from the black
magnetic strips on the backs of credit cards would eliminate a
substantial amount of U.S. credit card fraud. They say it’s time to
offer U.S. consumers the greater protections microchips provide by
joining Canada, Mexico and most of Western Europe in using cards with
the more advanced technology.
Chips aren’t perfect, says Carolyn Balfany, MasterCard’s group head for
U.S. product delivery, but the extra barrier they present is one of the
reasons criminals often choose to target U.S.-issued cards, whose
magnetic strips are easy to replicate.”

http://news.yahoo.com/visa-mastercard-renew-push-chip-181248195.html

eBay, Security Experts Say Database Dump is Fake

“Security experts and eBay have confirmed that a recent user database
being advertised on Pastebin was not obtained as a result of the data
breach suffered by the online marketplace earlier this year.
On May 21, eBay admitted that its corporate network had been breached
sometime between late February and early March 2014. The attackers
compromised the login credentials of a small number of employees and
used the data to gain access to the details of eBay’s 145 million
customers. The breach was discovered only in early May.
While there’s no evidence that financial information has been
compromised, or that PayPal customers are impacted, the cybercriminals
have managed to gain access to names, email addresses, physical
addresses, phone numbers, dates of birth and encrypted passwords.
It’s uncertain who is behind the attack, but other cybercriminals and
scammers are already trying to profit from the incident. Experts have
reported seeing a higher number of PayPal and eBay phishing attacks,
and, a post on Pastebin was found offering to sell 145,312,663 eBay
customer records for 1.453 Bitcoin (around $750).”

http://www.securityweek.com/ebay-security-experts-say-database-dump-fake
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

Daily Cyber News

Daily Cyber News | CyberCrime and CyberSecurity | Scoop.it
China has denounced US charges against five of its army officers accused of
economic cyber-espionage.

Beijing says the US is also guilty of spying on other countries, including
China, and accuses the US of hypocrisy and "double standards".

China has summoned the US ambassador in Beijing over the incident. It says
relations will be damaged.

US prosecutors say the officers stole trade secrets and internal documents
from five companies and a labour union.

The BBC's John Sudworth in Shanghai says it is extremely unlikely that any
of the accused will ever be handed over to the US.
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

Daily Vulnerability News

Daily Vulnerability News | CyberCrime and CyberSecurity | Scoop.it
[remote] - AoA DVD Creator 2.6.2 - ActiveX Exploit
http://www.exploit-db.com/exploits/33432/

[remote] - AoA Audio Extractor Basic 2.3.7 - ActiveX Exploit
http://www.exploit-db.com/exploits/33431/

[webapps] - SafeNet Sentinel Protection Server 7.0 - 7.4 and Sentinel Keys
Server 1.0.3 - 1.0.4 Directory Traversal
http://www.exploit-db.com/exploits/33428/

[local] - CyberLink Power2Go Essential 9.0.1002.0 - Registry SEH/Unicode
Buffer Overflow
http://www.exploit-db.com/exploits/33426/

[remote] - AoA MP4 Converter 4.1.2 - ActiveX Exploit
http://www.exploit-db.com/exploits/33433

[webapps] - HP Release Control Authenticated XXE
http://www.exploit-db.com/exploits/33434/
more...
No comment yet.
Scooped by STO STRATEGY
Scoop.it!

Satoshi Nakamoto is (probably) Nick Szabo

Satoshi Nakamoto is (probably) Nick Szabo | CyberCrime and CyberSecurity | Scoop.it
 

I recently became interested in identifying the pseudonymous creator of
Bitcoin, Satoshi Nakamoto.
more...
No comment yet.