blog trackingRealtime Web Statistics LEAD Archives | Page 3 Of 5 | Gregory D. Evans | Worlds No. 1 Security Consultant | Gregory D. Evans | Worlds No. 1 Security Consultant - Part 3

Posts Tagged ‘LEAD’

Playstation Network Hacker Exposed? | Anonymous provides lead info

Please Like and Favorite the Video. It helps. Thanks. It is rumored that the hacker responsible for the Playstation Network outage is also responsible for the recent attack on Square Enix. Anonymous exposes one of their own. Click here to read the related articles, — – — – — – — – — – — – — – — – — – — – — – — – — – — – — – — – — – — – — – CLICK HERE FOR A FREE NETFLIX TRIAL, COURTESY OF NGT: SUBSCRIBE FOR INDIVIDUAL GAME VIDEO NOTIFICATIONS: VISIT OUR WEBSITE FORUMS, GO TO: CHECK OUT OUR LIVE STREAMING SERVICE: SUBSCRIBE TO OUR FACEBOOK APP, GO TO: FOLLOW US ON FACEBOOK, GO TO: FOLLOW US ON TWITTER, GO TO: FOR AMAZING GAMEPLAY, GO TO: FOR NGT DIRECTOR VIDEOS, GO TO: FOR OUR RAW, LIVE STREAM FOOTAGE, GO TO:

View full post on National Cyber Security

Lead Network Security Engineer – TEKsystems – Las Vegas, Nevada

View full post on View network-security jobs —

View full post on National Cyber Security

Lead Network Security Engineer – TEKsystems – Las Vegas, Nevada

View full post on View network-security jobs —

View full post on National Cyber Security

Lead Network Security Engineer – TEKsystems – Las Vegas, Nevada

View full post on View network-security jobs —

View full post on National Cyber Security

J2EE lead expert in US-MA-boston

Company: Agile. Posted on May-16-12.
View full post on Latest Tech Jobs from Dev Bistro

View full post on National Cyber Security

Senior Programmer Analyst ?Technical Lead in US-CA-San Francisco

Company: Gymboree Corporation . Posted on May-10-12.
View full post on Latest Tech Jobs from Dev Bistro

View full post on National Cyber Security

Adobe CQ Architect / Lead in US-TN-Knoxville

Company: cannot be disclosed initially. Posted on May-07-12.
View full post on Latest Tech Jobs from Dev Bistro

View full post on National Cyber Security

Software Test Engineer (SDET) , Senior Lead

Location: Bellevue, WA, US
Job ID: 772561-65888
Division: Online Services Division

Who are we?
The Microsoft Ads Research Development group is looking for an experienced and talented Senior SDET Lead to help build the next generation of the Ads Delivery platform. Online Advertising is the fastest growing businesses on the Internet today and Microsoft is focused on growing its share in this market by providing a world-class online advertising platform across every exciting medium including Search (Bing), Mobile, Local, Video and Xbox. The Ad Platform organization is at the forefront of this vision, making it one of the most strategic and growing teams at Microsoft. With the addition of the Yahoo! partnership it has never been a better time to jump on the most exciting ride of your career. Our mission is to deliver right Ads at the right time and to drive up revenue of the OSD division and that of our partners

The Paid Search problem space encompasses some of the biggest most comprehensive problems in Computer Science (Machine Learning, Data Mining, BI, Large Scale Distributed Computing, Geographical Scale, Service Deployment and Management); Mathematics (Optimizations, Probability Theory); Economics Business (Auction Theory, Audience Intelligence, and Behavioral Targeting). To address this large problem space, we are building a world class team that continually delivers innovation through collaborative execution. You will do work in the top tier of Internet scale services where our engines deliver in the thousands of requests per second..

Skills Qualifications
We are looking for an experienced Senior Software Development Engineer in Test Lead (Sr. SDET Lead) who is excited to work with the best minds at Microsoft and have the energy plus passion to take on new challenges every day. As part of the Delivery team Front-Door team, you will be involved in the planning and execution of the latest online delivery technologies solutions and help us testing Ads Delivery Engine team’s, business critical areas like real time budgeting, publisher based ad delivery, real time fraud detection and advertiser protection, front end ad delivery etc. as we migrate them to our vNext Architecture. In Ad Center, we have thousands of servers and services running in cohesion on Auto Pilot (AP infrastructure) and so the emphasis on Performance, Scale and Quality is very high to ensure we are successful in ensuring that each and every code module is working with optimal performance to support 99.99% uptime and Ads delivery happens within SLA.;

Additionally you responsibilities include validating customer requirements and feedback in the product; and work closely with development, program managers and partners to ensure the product meets functional, quality, performance, scalability, privacy, security through tools, automation and breakthrough test technologies. The position does demand that the lead be able to understand the technical details of complex systems and can write both Object Oriented and .Net managed code with ease. Highly scalable systems and services knowledge is a definite plus however, it is not absolutely required to fill the requirements of this position. If you consider yourself as intellectually sharp, can pick up new concepts quickly, work well with people, good with coordination and organization, love to develop people, have excellent motivational and communication skills, we’d definitely love to talk to you.

Experience Required:
6+ years in C/C++/C# programming, with experience testing multi-tier client/server systems
6+ or more years of software development in test experience.
2+ years management experience including recruiting, goal setting, mentoring, and career management.
3+ years exp with server operating systems, experience writing queries for relational databases, a background in web server platforms or a proficiency in multi-threaded programming.
Shipped at least 1 product having been there the entire product cycle.
BS degree or higher required in Computer science or engineering field.



Click here to apply

Please mention that you saw the job on Wired

Article source:

View full post on National Cyber Security

Compromised WordPress sites lead to ‘Blackhole’

Computer users have been warned against a mass compromise of WordPress sites that may lead to infection by the Cridex malware, which can steal their banking data.

Trend Micro cited recent alerts that cybercriminals are behind a mass compromise of WordPress sites that lead to Cridex infection.

“To lure users to these compromised sites, the cybercriminals behind this employed spammed messages purporting to come from known legitimate sources such Better Business Bureau and LinkedIn, just to name a few. These spam use social engineering tactics to entice unsuspecting users to click the link found in the email,” it said in a blog post.

Clicking the links may lead prospective victims to a series of compromised WordPress sites, which ultimately point users to the Blackhole Exploit kit that targets vulnerabilities.

“Based on our analysis, this exploit results to the installation of WORM_CRIDEX.IC on the affected system. When executed, this worm connects to a remote site … to download its configuration files,” it said.

Microsoft defined the Cridex malware as one that may be delivered via spammed malware.

It said the malware “could spread to removable drives, steal local certificates, capture online banking credential entered via web browsers, download and execute files, and search and upload local files.”

Trend Micro said Cridex was also found to generate several random domains using domain generating algorithms (DGA).

“This is a well-known technique used by cybercriminals to evade law enforcement and to prevent botnets from being shut down. The malware also uses DGA to download its configuration file,” it said.

Presently, it said the exact behavior of the sample will depend on the configuration file.

“Based on static analysis, however, it is capable of executing a file, deleting a file/folder, and retrieving certificates in a certificate store. During our testing, we were unable to download the configuration file as this was no longer available,” it said. — TJD, GMA News

Article source:

View full post on National Cyber Security » Virus/Malware/Worms

FBI sting may lead to killer of Pa. Guard members

By Tom Infield The Philadelphia Inquirer

On Aug. 9, 2005, four Pennsylvania National Guard soldiers from the Philadelphia region were killed when an improvised bomb exploded on a dirt road near Beiji, Iraq.

Now, thanks to an FBI sting operation and the discovery of latent fingerprints on a six-year-old unexploded bomb, veterans of the stricken Guard unit hope that the Justice Department might have a lead on who set the blast.

An Iraqi citizen, arrested in Kentucky last year after entering the United States as a refugee, is on tape telling an informant that he planted bombs of the same type, in the same area, and in the same time period as the deadly strike against Alpha Company of the 1-111th Infantry.

No connection to the Alpha attack has been reported by the government, and Justice officials say they cannot comment. But investigators told Alpha veterans recently that they were looking into it; and the troops are thrilled at even a chance of closure.

The Iraqi citizen, Waad Ramadan Alwan, 31, is in federal custody after pleading guilty in December to rigging bombs against American troops in Iraq and also trying to ship weapons from the United States back to Iraq.

Federal agents handling the investigation apparently were unaware of any possible Alpha link until a couple of Alpha soldiers read about Alwan's guilty plea on the Internet and called the FBI's attention to the attack on their unit.

"I think there is an extremely high chance that this guy was part of a [terrorist] cell that was waging war against us when we were there," said Staff Sgt. Joshua Hedetniemi, a Guard recruiter who was one of the men to call investigators.

Hedetniemi said he and "some of the boys" will fly to Bowling Green, Ky., when Alwan is sentenced in October.

Retired Sgt. First Class Trenton Williams, once platoon sergeant for two of the men killed, said he still lives with the shock of what happened.

"When you're over there, you can't put a face on your enemy. It's so ambiguous; you don't know who is who," said Williams, who works at the Veterans Administration. "You would feel a lot better about it if you actually got the guys who did it."

Alpha Company, based in Northeast Philadelphia, lost a total of six soldiers while serving in Iraq in 2004 and 2005. The deaths occurred in a four-day period at the height of the insurgency.

On Aug. 9, 2005, Alpha was the quick-reaction force for Task Force Dragoon, an 800-man battalion at Forward Operating Base Summerall 110 miles north of Baghdad.

Sixteen soldiers and two civilian dog handlers were sent out to investigate reports of insurgents firing grenades at truck convoys on the main supply route.

The men, in four armored humvees, rolled into an ambush. The four killed were all in the same humvee, ripped apart by the explosion of three 155mm shells wired together and ignited by a cellphone signal.

They were Pfc. Nathaniel DeTample, 19, of Morrisville, a student at Shippensburg University; Spec. Gennaro Pellegrini, 31, a Philadelphia police officer; Spec. Francis J. Straub Jr., 24, of Philadelphia, an employee of United Parcel Service; and Spec. John Kulick, 35, of Harleysville, a full-time firefighter in Whitpain and the father of a 9-year-old girl.

Two other Alpha soldiers, Spec. Kurt E. Krout, 43, of Spinnerstown, and Sgt. Brahim J. Jeffcoat, 25, of Philadelphia, had been killed three days earlier in a blast near Samarra. That attack was 60 miles from Beiji, outside of Task Force Dragoon's area of operations.

Kimberly DeTample, Nathaniel's mother, said even hearing word of the Alwan investigation caused her emotional pain. But she said she'd be glad for any resolution to the mystery of her son's death.

"I just assumed they would never figure out who did it. It's just one of those things in a war that happens," she said.

Alwan's name — and that of an alleged coconspirator, Mohanad Shareef Hammadi, 25 — surfaced publicly when the Justice Department announced their arrest last May. Hammadi awaits trial.

Calling it a breakthrough against terrorism, the government revealed that agents had been recording Alwan and Hammadi for months as they plotted with an FBI informant to ship cash and weapons — including Stinger missiles, C4 explosives, and grenade launchers — to extremists in Iraq.

The scheme was an FBI setup. The government said no weapons or cash went abroad.

In the course of the investigation, Alwan was heard telling the informant that he had worked at the power plant in Beiji — Alpha's patrol area — and belonged to an insurgent group that planted bombs almost daily.

"Alwan later explained that he was very good with a sniper rifle and that his 'lunch and dinner' would be an American," FBI Special Agent Richard Glenn said in a court affidavit.

(Retired Capt. Anthony Callum, commander of Alpha Company, said he remembers only one member of Task Force Dragoon being killed by a sniper.)

The Department of Homeland Security has not explained how Alwan or Hammadi got into the United States as refugees in 2009.

Officials said in December that, since the inception of an Iraqi refugee program in 2007, more than 62,000 Iraqis had been admitted. Many were translators who had worked with American forces.

The Justice Department has reported no other discovered extremists among the admitted refugees, but Homeland Security promised Congress it would do a tighter job of screening.

Daniel Cosgrove, a Homeland Security spokesman, said he was barred by law from discussing the status of any particular refugee, and could make no comment on Alwan or Hammadi.

Court-appointed lawyers for the pair did not return calls seeking comment.

Alwan's statements to the informant about his insurgent activities in Iraq were backed up when the FBI found physical evidence of that.

Records show that after his arrest, the FBI matched his fingerprints to an unexploded bomb made of artillery shells that was found with wires sticking up from the ground near the Alpha Company base on Sept. 1, 2005, three weeks after the fatal Alpha attack.

The defused explosive had sat with thousands of other bombs and bomb parts at an FBI lab in Quantico, Va. After Alwan came under investigation, officials ordered all of the pieces to be dusted for fingerprints.

Two of Alwan's showed up on a cordless telephone rigged as a triggering device.

Hammadi, whom Alwan recruited into the United States-to-Iraq exporting scheme, also allegedly told the FBI informant that he had a history as an Iraq insurgent.

Alwan, at one point, described Hammadi as a younger relative from al-Siniyah.

Al-Siniyah — or as-Siniyah, as it was known to U.S. troops — was the exact location of Forward Operating Base Summerall.

Edward Greene, an Alpha veteran, said he felt as if he'd been hit by a train when he learned of the close proximity — in time, place, and bomb method — between the attack on his unit and the activities Alwan already had admitted.

The former Army specialist, a truck driver in South Jersey, said, "I was amazed."

Copyright 2012 Philadelphia Newspapers, LLC

View full post on PoliceOne Daily News

View full post on National Cyber Security

Page 3 of 5«12345»

My Twitter

  • Cyber Security News Today is out! @gregorydevans #hacker
    about 8 hours ago
  • RT @GregoryDEvans: #galaxylife #samsung4life Website/IP may be hackable #hacked, #WGH, #USA, #hackerproof https://t…
    about 14 hours ago
  • RT @GregoryDEvans: Longmont’s ‘topless barber’ returns to court in September
    about 14 hours ago
  • RT @GregoryDEvans: Website/IP may be hackable #hacked, #WGH, #USA, #hackerproof
    about 15 hours ago
  • RT @GregoryDEvans: Website/IP may be hackable #hacked, #WGH, #USA, #hackerproof #security #…
    about 15 hours ago By Gregory D. Evans

Hacker For Hire By Gregory Evans

Gregory D. Evans On Facebook

Parent Securty By Gregory D. Evans

National Cyber Security By Gregory D. Evans

Dating Scams By Gregory Evans