High Technology Crime
104 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by HTCIA
Scoop.it!

Clearsky detected Gholee malware

Clearsky detected Gholee malware | High Technology Crime | Scoop.it
Experts at Clearsky detected the Gholee virus which was likely developed by highly qualified factors, probably the Israel’s long-time nemesis Iran. (RT @thecyberwire: Trojan-dropper #Gholee distributed with Gaza phishbait.
more...
No comment yet.
Scooped by HTCIA
Scoop.it!

HTCIA International Conference & Training Expo » Offered Classes

HTCIA International Conference & Training Expo » Offered Classes | High Technology Crime | Scoop.it

Have you checked out #HTCIACON awesome class line-up yet? You wont find a line-up like this anywhere else!

HTCIA's insight:

Get informed, engage and participate in intimate classes that this year's premier conference for high technology crime and defenses. Register today while there is still room! 

more...
No comment yet.
Scooped by HTCIA
Scoop.it!

Can You Spot The 13 Security Flaws In This Photo?

Information security isn't limited to what you have online http://t.co/3LFrs2h1LT #privacy #security #data
HTCIA's insight:

Information Security isn't always high tech, check out this photo and see how many security flaws you can spot in an every day office setting. #infosec #privacy 

more...
No comment yet.
Scooped by HTCIA
Scoop.it!

Largest DDoS attack hit PopVote, Hong Kong Democracy voting site

Largest DDoS attack hit PopVote, Hong Kong Democracy voting site | High Technology Crime | Scoop.it
Largest DDoS attack hit PopVote, Hong Kong Democracy voting website. Experts at CloudFlare observed a three hundred gigabits per second DDoS attack.
HTCIA's insight:

300Gbps per second #DDoS attack hits PopVote, a Hong Kong democracy voting website. Worst attack of its kind in history! #cybercrime 

more...
No comment yet.
Scooped by HTCIA
Scoop.it!

U.S. disrupts major hacking, extortion ring; Russian charged

U.S. disrupts major hacking, extortion ring; Russian charged | High Technology Crime | Scoop.it
WASHINGTON (Reuters) - A U.S.-led international operation disrupted a crime ring that infected hundreds of thousands of PCs around the globe with malicious software used for stealing banking credentials (U.S.
more...
No comment yet.
Scooped by HTCIA
Scoop.it!

Digital Defense Unveils New Security Technology at Gartner Security & Risk ... - SYS-CON Media (press release)

Digital Defense Unveils New Security Technology at Gartner Security & Risk ... - SYS-CON Media (press release) | High Technology Crime | Scoop.it
Digital Defense Unveils New Security Technology at Gartner Security & Risk ...
SYS-CON Media (press release)
Digital Defense, Inc.
HTCIA's insight:

New Security VDR technology released: "...fills a typically overlooked gap in the information security space through the reconciliation and correlation of results from recurring security assessments from a variety of sources. " An independent review of the new technology shows promising performance and satisfaction results.  

more...
No comment yet.
Scooped by HTCIA
Scoop.it!

HTCIA International Conference & Training Expo

HTCIA International Conference & Training Expo | High Technology Crime | Scoop.it

Don't miss this year's conference in beautiful Austin, TX! "Over 95% of our 2013 conference attendees said they would attend again. Over 98% of attendees said they would recommend the conference to others. From interesting speakers and hands-on training, to a beautiful venue and exciting entertainment, we have a spectacular event for you."

HTCIA's insight:

Find out about all the  lectures, labs, and speakers you will get to learn from at this this year's Austin conference. Resigter today! #HTCIAcon 

more...
Courtney McGuire's comment, June 23, 2014 11:14 PM
This is awesome! What a great way to put the name out there.
Scooped by HTCIA
Scoop.it!

Hackers reverse-engineer NSA's leaked bugging devices - New Scientist

Hackers reverse-engineer NSA's leaked bugging devices - New Scientist | High Technology Crime | Scoop.it
Hackers reverse-engineer NSA's leaked bugging devices
New Scientist
RADIO hackers have reverse-engineered some of the wireless spying gadgets used by the US National Security Agency.
HTCIA's insight:

Work on rebuilding NSA bugs to be presented at this year's DefCon by  Michael Ossmann of Great Scott Gadgets. According to Ossmann, this will this lead to improvements in security by uncovering weaknesses in our systems.

more...
No comment yet.
Scooped by HTCIA
Scoop.it!

Pittsburgh police cybersquad leads way in fighting cybercrime - Police News

Pittsburgh police cybersquad leads way in fighting cybercrime - Police News | High Technology Crime | Scoop.it
Pittsburgh police cybersquad leads way in fighting cybercrime Police News PITTSBURGH — Picture hundreds of thousands of computers, secretly enslaved to a distant puppet master who orders them to snatch funds, up to seven figures, from their owners'...
HTCIA's insight:

The US is going after hackers outside the US. Pittsburgh is quickly becoming the hub for fighting international high tech crime

more...
No comment yet.
Scooped by HTCIA
Scoop.it!

MMR Announces 13 Health Information Technology Patents -- Portfolio Includes ... - MarketWatch

MMR Announces 13 Health Information Technology Patents -- Portfolio Includes ... - MarketWatch | High Technology Crime | Scoop.it
MMR Announces 13 Health Information Technology Patents -- Portfolio Includes ...
MarketWatch
MMR will now have a total of 36 patents including 13 domestic health information technology (HIT) patents, seven foreign HIT patents, and 16 biotech patents.
HTCIA's insight:

As health systems continue to keep pace with advancing technologies, patient records are becoming digitized. This opens a new job market for support analysts of medical record software providers. And also greater risk for information theft and violation of privacy. 

more...
Courtney McGuire's comment, June 17, 2014 5:57 PM
There's a plus side to this- obviously the new job markets for those still looking, but the risk of violation of privacy and theft concerns me. I'd hope no one suffered through that just yet,
Scooped by HTCIA
Scoop.it!

Digital 'spring cleaning' tips help prevent cyber crime - Howard University The District Chronicles

Digital 'spring cleaning' tips help prevent cyber crime - Howard University The District Chronicles | High Technology Crime | Scoop.it
Digital 'spring cleaning' tips help prevent cyber crime
Howard University The District Chronicles
(BPT) - Every day, more than 1 million people become victims of cyber crime, according to the 2013 Norton Cyber Crime Report.
HTCIA's insight:

Quick important tips to keep your information safe! #cybersecurity #infosec

more...
No comment yet.
Scooped by HTCIA
Scoop.it!

FCC unveils 'new regulatory paradigm' for defeating hackers - Washington Post (blog)

FCC unveils 'new regulatory paradigm' for defeating hackers - Washington Post (blog) | High Technology Crime | Scoop.it
Reuters FCC unveils 'new regulatory paradigm' for defeating hackers Washington Post (blog) On Thursday, the agency sought to take the lead again, unveiling a new regulatory model aimed at helping phone companies and other telecommunications firms...
HTCIA's insight:

Government agencies are stepping up their cyber security collaboration game. "Broadband providers must work collaboratively with government and across various sectors to develop sound industry practices," said Comcast senior vice president Myrna Soto.  

more...
Courtney McGuire's comment, June 17, 2014 5:59 PM
I love this. Those hackers need to be defeated. I do not understand how they sleep at night knowing they hacked someone elses' personal information. Reminded me when my brother had my ssn to give his job for some reason, and he left it in his car that got robbed into and the worry that those robbers stole my number had me on the phone trying to prevent any future fraud of me. This is reassuring.
Scooped by HTCIA
Scoop.it!

P.F. Chang's Investigating Whether It Was Hit by Hackers - Bloomberg

NBC Montana
P.F. Chang's Investigating Whether It Was Hit by Hackers Bloomberg Brian Krebs, an independent journalist who investigates hacker attacks, reported yesterday that thousands of newly stolen credit and debit cards went up for sale on an...
HTCIA's insight:

Retail stores, food chains, you name it, no enterprise is 100% safe from information theft and hacking. Stay informed and on top of the threats as they emerge. #cybercrime #infosec 

more...
No comment yet.
Scooped by HTCIA
Scoop.it!

Hackonomics: Cybercrime's cost to business - ZDNet

Hackonomics: Cybercrime's cost to business - ZDNet | High Technology Crime | Scoop.it
Hackonomics: Cybercrime's cost to business
ZDNet
They say "crime pays" -- but we can be certain the paychecks for cybercrime come right out of the pockets of every business with a digital footprint. ...
HTCIA's insight:

Identity theft and credit card information are only 2 of the ways cyber crime costs. Some of the biggest losses come out of the pockets of large companies that aren't properly protected against cyber threats! 
#Infosec 

more...
Michele Torbik's comment, June 27, 2014 2:10 PM
It was interesting to learn that cyber crimes go far beyond credit card theft. I know fist hand that credit card theft is not fun to deal with, I had my card information stolen somewhere in California... and never have been there!
Scooped by HTCIA
Scoop.it!

Supply Chain Risk Management Now a Priority for Most Businesses - Supply Chain 24/7

Supply Chain Risk Management Now a Priority for Most Businesses - Supply Chain 24/7 | High Technology Crime | Scoop.it
Information technology, costs and pricing factors, and the global economy viewed as top sources of supply chain risk by corporate executives, but only elite leaders generate a return on their investments in excess of 100 Percent, Accenture research...
HTCIA's insight:
Companies exceeding 100% ROI in risk management did the following three things: 
1. Make risk management a priority2. Centralize their responsibility for risk management3. Invest in risk manag. w/ a focus on end to end supply chain analytics.
more...
Michele Torbik's comment, June 27, 2014 2:12 PM
very interesting to see a chain for business. It was enlightening to learn that there is a method to their madness.
Scooped by HTCIA
Scoop.it!

A third of boards remain in the dark on cyber defence status | Information Age

A third of boards remain in the dark on cyber defence status | Information Age | High Technology Crime | Scoop.it
‘Cyber resilience’ increasingly overtaking ‘cyber security’ as companies’ prevailing defensive objective (A third of boards remain in the dark on cyber defense status http://t.co/Hsy3NElkLa)...
HTCIA's insight:

Senior Execs. don't know their company's cyber defenses, 29% of respondents in an international survey believe "fear of retribution could be discouraging the IT departmental from fully disclosing details of cyber breaches..."

more...
No comment yet.
Scooped by HTCIA
Scoop.it!

The Widening Extent of Cyber Crime | Internet Security Directory

The Widening Extent of Cyber Crime | Internet Security Directory | High Technology Crime | Scoop.it
Cyber Wars (2013): Cyber crime is testing our security measures to the limit. And now there's a new target: our banks.
HTCIA's insight:

Big Banks are the new cyber crime target, are your savings safe? 

more...
Roger Smith's curator insight, June 26, 2014 7:27 PM

A little bit of an eye opener on what the cyber criminals are now targeting

Scooped by HTCIA
Scoop.it!

Triumfant Unveils Mac Agent at Gartner Security & Risk Management Summit - Virtual-Strategy Magazine (press release)

Triumfant Unveils Mac Agent at Gartner Security & Risk Management Summit - Virtual-Strategy Magazine (press release) | High Technology Crime | Scoop.it
Triumfant Unveils Mac Agent at Gartner Security & Risk Management Summit Virtual-Strategy Magazine (press release) NATIONAL HARBOR, MD -- (Marketwired) -- 06/23/14 -- Gartner Security & Risk Management Summit -- Triumfant, provider of intelligent,...
HTCIA's insight:

Triumfant announces support of Mac (OS) Operating System. Know the breakthroughs in high technology, know how best to defend yourself and your organization against threats. 

more...
No comment yet.
Scooped by HTCIA
Scoop.it!

Information Security: Social Engineering (06:08) Introduction to Computers

Our last video in the Information Security lesson covers my favorite topic, social engineering. In this video we look at: Dumpster Diving, Shoulder Surfing, Tailgating, and Spam & Phishing....
HTCIA's insight:

Social engineering can be used to target people who are susceptible to scams. Know the tactics they use, protect yourself, and stay ahead of hackers. 

more...
No comment yet.
Scooped by HTCIA
Scoop.it!

'Good Guy' Hackers Are Cracking Codes for Change—and Profit - TakePart

'Good Guy' Hackers Are Cracking Codes for Change—and Profit - TakePart | High Technology Crime | Scoop.it
TakePart 'Good Guy' Hackers Are Cracking Codes for Change—and Profit TakePart Their efforts are helping to create a new generation of "white-hat hackers"—young cyber-warriors trained to use their highly advanced computer knowledge for good, maybe...
HTCIA's insight:

The goal of the 'white hat hacker' is to use techniques bad guys use for good, to protect against cyber security incidents before they happen. They try to catch things computer programmers might miss. 

more...
Michele Torbik's comment, June 19, 2014 4:56 PM
That is super cool and innovative that such skills are being used for a good cause. It makes me think of the tv show criminal minds and how Garcia was a bad hacker turned good and now works for the good guys.
LADY ARIES's comment, June 23, 2014 2:23 PM
I enjoy the idea of turning good into bad. I feel that may be the best way to go. A lot of people may stay out of prison if they utilize their skills for better!!
Scooped by HTCIA
Scoop.it!

The real cybersecurity workforce challenge: Hiring the 'best of the best' hackers - FedScoop

The real cybersecurity workforce challenge: Hiring the 'best of the best' hackers - FedScoop | High Technology Crime | Scoop.it
FedScoop The real cybersecurity workforce challenge: Hiring the 'best of the best' hackers FedScoop But a new study released today suggests the real cybersecurity workforce challenge is hiring and retaining the top 1 percent of the talent pool —...
HTCIA's insight:

New study suggests lack of qualified cybersecurity professionals could be a threat to National Security. Government cybersecurity jobs don't pay enough to retain the best of the best. Qualified individuals tend to go for high paying private sector opportunities. 

more...
Michele Torbik's comment, June 19, 2014 4:58 PM
This is very true, I believe that if you can't beat them join them, well in this case let them join good forces to improve security.
Scooped by HTCIA
Scoop.it!

Hackers ransom Domino's Pizza customer data (including favourite toppings) for €30,000

Hackers ransom Domino's Pizza customer data (including favourite toppings) for €30,000 | High Technology Crime | Scoop.it
Hackers who compromised the servers of Domino’s Pizza have demanded a ransom of €30,000 or they will publish the records of more than 600,000 customers – including their favourite toppings.
HTCIA's insight:

European countries targeted in information breach. Hackers demand ransom be paid by TONIGHT or they will release sensitive customer info! #cybercrime 

more...
Courtney McGuire's comment, June 17, 2014 5:56 PM
So scary! You never know what people are capable of, it's easier said than done.
Scooped by HTCIA
Scoop.it!

The repugnant Section 66A of India's Information Technology Act - Index On Censorship

The repugnant Section 66A of India's Information Technology Act - Index On Censorship | High Technology Crime | Scoop.it
The repugnant Section 66A of India's Information Technology Act
Index On Censorship
The repugnant Section 66A of India's Information Technology Act.
HTCIA's insight:

Extreme measures of social media censorship being taken in India. What could this mean for the rest of the world? #InfoTech #BigBrother 

more...
No comment yet.
Scooped by HTCIA
Scoop.it!

Conviction of cybercriminals remains a challenge, says information security ... - Zawya (registration)

Conviction of cybercriminals remains a challenge, says information security ... - Zawya (registration) | High Technology Crime | Scoop.it
Zawya (registration)
Conviction of cybercriminals remains a challenge, says information security ...
HTCIA's insight:

Catching cyber criminals isn't the issue, it's putting them away that is. 

"We are able to find these guys but are unable to get them convicted," Hypponen said as he identified some of the most serious malwares that these criminals use. Including: Banking Trojans, Ransom Trojans, Credit Card Key Loggers, BitCoin Miners, DDoS Botnets & Clickfraud

more...
Michele Torbik's comment, June 13, 2014 12:28 AM
It is scary to think that cyber criminals are at large worldwide, yet it is difficult to charge them for their crimes. Just think of the amount of criminal out there committing crimes but not doing the time. I find it interesting that although crime is such a sensitive and important issue, yet there are so many crime shows out there depicting crime.
Courtney McGuire's comment, June 13, 2014 12:54 AM
I immediately thought of the craigslist killer. It's sad to think that people are that mentally sick to get enjoyment out of ruining innocent individual lives. It seems as though no matter how much they try and prevent, crime still happens and it's not a matter of them not doing their job, it's a matter of preventing it from happening again. Not everyone is perfect.
Scooped by HTCIA
Scoop.it!

Feedly says criminal hackers demanded money to stop attack - SiliconBeat

Feedly says criminal hackers demanded money to stop attack - SiliconBeat | High Technology Crime | Scoop.it
Fast Company Feedly says criminal hackers demanded money to stop attack SiliconBeat A group of criminal hackers tried to extort money from Feedly, the online RSS reader that millions of people use to keep up with their favorite blogs, according to...
HTCIA's insight:

DDoS attacks used against popular RSS reader. There is no frontier of the web that hackers won't go after! #cybersecurity 

more...
No comment yet.