1. By continuing to use the site, you agree to the use of cookies .This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy.Find out more.
    Dismiss Notice
  2. Follow Casinomeister on Twitter | Facebook | YouTube | Casinomeister.us US Residents Click here! |  Svenska Svenska | 
Dismiss Notice

Poll:Best Screenshot of the Month?



Candidates Revealed...Cast your vote!.
Dismiss Notice
REGISTER NOW!! Why? Because you can't do diddly squat without having been registered!

At the moment you have limited access to view most discussions: you can't make contact with thousands of fellow players, affiliates, casino reps, and all sorts of other riff-raff.

Registration is fast, simple and absolutely free so please, join Casinomeister here!

news: Cyber Crime 2007

Discussion in 'The Attic' started by Mousey, Dec 20, 2007.

    Dec 20, 2007
  1. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    Let's be careful out there...

    You must register/login in order to see the link.
    In 2007, Online Fraud Got More Targeted and Sophisticated

    By Brian Krebs
    washingtonpost.com Staff Writer
    Thursday, December 20, 2007; 1:00 PM

    The year 2007 may go down in the annals of Internet crime as the year when organized cyber criminals finally got serious about their marketing strategies -- crafting cyber schemes that were significantly more sophisticated and stealthy.

    Security experts say criminals are increasingly trying to ensnare Internet users by lurking on familiar Web sites and using purloined data to craft scam e-mails that are more believable, and thus more likely to entice an unsuspecting user.

    "The attackers are...
     
  2. Dec 20, 2007
  3. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    You must register/login in order to see the link. By Thomas Claburn
    InformationWeek
    Wed Dec 19, 9:30 AM ET

    New Trojan software has been found picking the pockets of Google and its publishing partners, and potentially exposing Web surfers to more malware.

    BitDefender, a software security company based in Bucharest, Romania, on Tuesday said that it had detected a new Trojan (Trojan.Qhost.WU) that replaces Google AdSense text ads with ads from a different, potentially malicious provider.

    "This is a serious situation that damages users and Webmasters alike," said Attila-Mihaly Balazs, a BitDefender virus analyst, in a statement. "Users are affected because the advertisements and/or the linked sites may contain malicious code, which is a very likely situation, given that they are promoted using malware in the first place. Webmasters are affected because the Trojan takes away viewers and thus a possible money source from their Web sites."

    Google said in an...
     
  4. Dec 26, 2007
  5. silkprint

    silkprint Dormant account

    Occupation:
    Yup ...I work
    Location:
    Mass
    Thanks Mousey :)
     
  6. Jan 1, 2008
  7. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    You must register/login in order to see the link.Reported In 2007 By Thomas Claburn
    InformationWeek
    Mon Dec 31, 5:10 PM ET



    The number of publicly reported data breaches in the U.S. rose by more than 40% in 2007, compared to the previous year, according to statistics compiled by the Identity Theft Resource Center (ITRC), a consumer rights advocacy group.

    In its December 24 report, the ITRC said that there were publicly reported 443 breaches in the U.S. in 2007. In 2006, the ITRC identified 315 publicized breaches.

    Some 127 million data records were exposed during 2007. In 2006, nearly 20 million records were exposed. In 2005, there were 158 breaches reported involving about 65 million records.

    The ITRC will have to update its list to reflect breaches reported during the last seven days of the year, something organization founder Linda Foley said would happen next week.

    On Friday, the Tennessean.com reported that someone broke into a Davidson County election office over the Christmas holiday and stole laptops believed to contain the Social Security numbers and other personal information for more than 337,000 registered voters in the ....
     
  8. Jan 5, 2008
  9. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    You must register/login in order to see the link. By Thomas Claburn
    InformationWeek
    Fri Jan 4, 6:40 PM ET



    Sears' IT practices have come under fire from spyware researcher Benjamin Edelman, who alleges that Sears is installing online tracking software from ComScore without adequate consent and that Sears is exposing its customers' purchase histories in violation of its privacy policy.

    In two reports published this week, Edelman, an assistant professor at the Harvard Business School and noted spyware researcher, said that Sears' installation of online tracking software from ComScore falls short of the standards established by the Federal Trade Commission.

    "The FTC requires that software makers and distributors provide clear, prominent, unavoidable notice of the key terms," said Edelman in his Jan. 1 report. Sears Holding Co.'s "installation of comScore did nothing of the kind."

    Benjamin Googins, a researcher at security company...
     
    2 people like this.
  10. Jan 5, 2008
  11. RobWin

    RobWin closed account

    Occupation:
    Who knows?
    Location:
    A Vault!
    Thanks Mousey, those were great articles...:thumbsup:
     
    1 person likes this.
  12. Jan 5, 2008
  13. BingoT

    BingoT Nurses love to give shots webmeister

    Occupation:
    Nursing & Run Bus Trips
    Location:
    Hartford,Ct
    Mousey Great info in this thread.
    Thank You
    Tom
     
    1 person likes this.
  14. Jan 7, 2008
  15. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    This is from the little podunk town where I live.... People, PLEASE use your brains when in internet chat rooms and forums, or replying to stupid get rich quick emails, etc. My edits (for privacy) are in italics.

     
  16. Jan 8, 2008
  17. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    Uh-ohhh!

    You must register/login in order to see the link.
    By Thomas Claburn
    InformationWeek
    Mon Jan 7, 6:50 PM ET



    Geeks.com, a Web site that still displays a banner from McAfee's ScanAlert certifying that it is "Hacker Safe," on Friday sent a letter to customers saying that it was hacked last month.

    "Genica dba Geeks.com ('Genica') recently discovered on December 5, 2007 that customer information, including Visa credit card information, may have been compromised," said a letter posted on The Consumerist from Jerry L. Harken, Genica's chief of security, to an undisclosed number Geeks.com customers. "In particular, it is possible that an unauthorized person may be in possession of your name, address, telephone number, e-mail address, credit card number, expiration date, and card verification number. We are still investigating the details ...
     
  18. Jan 11, 2008
  19. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    Phony iPhone Upgrade Hides Malware

    You must register/login in order to see the link.
    By Thomas Claburn
    InformationWeek
    Wed Jan 9, 6:45 PM ET



    Your Apple iPhone could be infected with potentially malicious Trojan software because of a fake upgrade download, computer security officials with US-CERT warned Wednesday.

    "This Trojan claims to be a tool used to prepare the device for an upgrade to firmware version 1.1.3," the US-CERT advisory said. "When a user installs the Trojan, other application components are altered. If the Trojan is uninstalled, the affected applications may also be removed."

    The Trojan appears to be timed to exploit rumors that began in early December about new features in an upcoming iPhone firmware upgrade. Various online news sites and blogs cited a report published by CNET France that claimed an imminent iPhone update would feature a disk mode, for using the iPhone as a portable flash drive, and a voice recording mode.

    Malware authors now regularly craft attacks that play off current news and events. The Storm worm, for example...
     
  20. Jan 15, 2008
  21. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    random js toolkit New Hack Attacks

    You must register/login in order to see the link.
    Richard Koman, newsfactor.com
    Mon Jan 14, 4:38 PM ET



    The security firm Finjan says it has discovered a major new type of malware that has infected more than 10,000 Web sites in December alone. Deemed "random js toolkit," it is a Trojan that infects end users' PCs and sends data from the infected machine to the "master" hacker. It can be used to steal passwords, documents and other sensitive information.

    The malware dynamically creates and changes JavaScript code every time it is accessed, Finjan said. Thus, traditional anti-malware programs can't identify it.

    Finjan CTO Yuval Ben-Itzhak said in a release, "Signaturing a dynamic script is not effective. Signaturing the exploiting code itself is also not effective, since these exploits are changing continually to stay ahead of current zero-day threats and available patches. Keeping an up-to-date list of 'highly-trusted-doubtful' domains serves only as a limited defense against this attack vector."

    Dynamic Embedding

    "What's needed to counter this exploit is dynamic code inspection technology that can detect and block an attack in real time," Ben-Itzhak said. "This technology doesn't depend ...
     
  22. Jan 18, 2008
  23. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    Data lost on 650,000 credit card holders

    You must register/login in order to see the link.
    By DAVID KOENIG, AP Business Writer
    54 minutes ago



    PLANO, Texas - Personal information on about 650,000 customers of J.C. Penney and up to 100 other retailers could be compromised after a computer tape went missing.

    GE Money, which handles credit card operations for Penney and many other retailers, said Thursday night that the missing information includes Social Security numbers for about 150,000 people.

    The information was on a backup computer tape that was discovered missing last October. It was being stored at a warehouse run by Iron Mountain Inc., a data storage company, and was never checked out but can't be found either, said Richard C. Jones, a spokesman for GE Money, part of General Electric Capital Corp.

    Jones said there was ...
     
  24. Jan 18, 2008
  25. lojo

    lojo Banned User - repetitive violations of <a href="ht

    Occupation:
    Tradesman
    Location:
    USA
    Glenn Beck in an interview last night with penn gillette (i know, but I like to keep the enemy close :)) mentioned a republican bill or motion that would allow h-secur. to parse every thing on the internet... is this just legal or normalization of omnivore, or is it a clear and present danger?

    Anyone know about this cyber-criminal enterprise that may possibly be visited upon us? (its in response to china cyber-attacks, supposedly)
     
  26. Jan 24, 2008
  27. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    Charter cable empties 14,000 e-mail accounts

    You must register/login in order to see the link.

    By JIM SALTER, AP Business Writer
    28 minutes ago



    ST. LOUIS - Charter Communications officials believe a software error during routine maintenance caused the company to delete the contents of 14,000 customer e-mail accounts.

    ADVERTISEMENT

    There is no way to retrieve the messages, photos and other attachments that were erased from inboxes and archive folders across the country on Monday, said Anita Lamont, a spokeswoman for the suburban St. Louis-based company.

    "We really are sincerely sorry for having had this happen and do apologize to all those folks who were affected by the error," Lamont said Thursday when the company announced the gaff.

    Charter, one of the nation's largest ...
     
    1 person likes this.
  28. Jan 25, 2008
  29. lojo

    lojo Banned User - repetitive violations of <a href="ht

    Occupation:
    Tradesman
    Location:
    USA
    I hope yahoo and google have redundant archives:eek2:
     
  30. Jan 25, 2008
  31. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    Best Buy Sold Infected Digital Picture Frames

    You must register/login in order to see the link.
    By Thomas Claburn
    InformationWeek
    Thu Jan 24, 5:30 PM ET



    Insignia pulled a line of 10.4-inch digital picture frames from Best Buy stores and its Web sites this week after learning some had been infected with a computer virus during the manufacturing process.

    "Once informed, we immediately pulled all units of this product from stores and retail Web sites as a precautionary measure to protect our customers," explains a statement on the Insignia Web site. "This product has been discontinued, and no additional inventory will be sold. Please note that no other Insignia digital picture frame products are affected by this issue."

    Best Buy on Saturday said that a limited number of 10.4-inch digital picture frames sold under its Insignia brand were infected with a computer virus during the manufacturing processes. The statement says that some of the infected units (model number NS-DPF-10A) were sold...
     
  32. Feb 9, 2008
  33. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    You must register/login in order to see the link.
    Robert McMillan
    Thu Feb 7, 7:12 PM ET



    San Francisco - The Web site for Indian antivirus vendor AvSoft Technologies has been hacked and is being used to install malicious software on visitors' computers, security researchers said Thursday.


    The download section of AvSoft's S-cop Web site hosts the malicious code, according to Roger Thompson, chief research officer with security vendor AVG. "They let one of their pages get hit by an iFrame injection," he said. "It shows that anyone can be a victim.... It's hard to protect Web servers properly."

    The technique used on the site has been seen in thousands of similar hacks over the past few months. The attackers open an invisible iFrame Window within the victim's browser, which redirects the client to another server. That server, in turn, launches attack code that attempts to install malicious software on the victim's computer.

    The malicious software is a variant of the Virut virus family.

    The iFrame pages are commonly used...
     
  34. Feb 9, 2008
  35. winbig

    winbig Keep winning this amount.

    Occupation:
    Bum
    Location:
    Pennsylvania
    Another great reason to use Firefox. It's not vulnerable to this attack. :D
     
  36. Feb 13, 2008
  37. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    You must register/login in order to see the link.
    By JORDAN ROBERTSON, AP Technology Writer
    27 minutes ago

    SAN FRANCISCO - They're called "servers that lie."


    Mendacious machines controlled by hackers that reroute Internet traffic from infected computers to fraudulent Web sites are increasingly being used to launch attacks, according to a paper published this week by researchers with the Georgia Institute of Technology and Google Inc.

    The paper estimates roughly 68,000 servers on the Internet are returning malicious Domain Name System results, which means people with compromised computers are sometimes being directed to the wrong Web sites and often have no idea.

    The peer-reviewed paper, which offers one of the broadest measurements yet of the number of rogue DNS servers, was presented at the Internet Society's Network and Distributed System Security Symposium in San Diego.

    The fraud works like this: When a user with an affected computer tries to go to, for example, Google's Web site, they are redirected to a spoof site loaded with malicious code or to a wall of ads whose profits flow back to the hackers.

    The hackers who hijack DNS queries are looking to steal personal information, from e-mail login credentials to credit data, and take over infected machines.

    The spoof sites run ...
     
  38. Feb 14, 2008
  39. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    You must register/login in order to see the link.
    By Thomas Claburn
    InformationWeek
    Tue Feb 12, 6:30 PM ET



    Just in time for Valentine's Day, Google on Tuesday released the results of a survey showing that young people are embracing e-mail to send love letters. Coincidentally, the FBI warned on Tuesday that cybercriminals are embracing e-mail to send fake love letters.


    "The survey affirmed that e-mail is an increasingly important part of our most intimate and personal interactions, and that younger people are leading the charge: they are more likely to use e-mail for everything from sending love letters to ending relationships," said Google group product marketing manager Jen Grant in a blog post.

    But the FBI advises caution. "If you unexpectedly receive a Valentine's Day e-card, be careful," the agency said. "It may not be from a secret admirer, but instead might contain the Storm Worm virus."

    Security software vendor Trend Micro issued a similar warning on Monday. "As we had already forecast last month, Storm is already sending their Valentine greetings this week," said security researcher David Sancho in a blog post. "The owners of this powerful botnet are doing as much as possible to [sustain the number of compromised machines at their disposal]. This includes...
     

Share This Page