blog trackingRealtime Web Statistics LEAD Archives - Page 3 of 4 - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘LEAD’

Police warn posting photos of ex-lovers online can lead to jail

Police are going after vengeful ex-lovers who post nude photos and videos of their former love interests after a breakup, a trend that authorities expect will escalate with social media’s increasing popularity.

“You can’t unring a bell. That image is going to be out there forever,” said Brian Sinclair, the assistant Bergen County prosecutor who is chief of the computer crimes unit. “People … have to understand before they click ‘send’: By transmitting images of their former partner, they’re likely committing a crime.”

Before the Internet was so prevalent, spurned exes could send revealing photos by mail. However, hitting the “send” button not only makes it much easier for a raging ex to distribute a nude photo, it also has lifelong implications for the victim if the image is copied by others and proliferates elsewhere on the Internet.

The crime of transmitting images or videos without someone’s consent falls under the state’s invasion of privacy statute created in 2004, and violators can face between three and five years in prison, authorities said. The Passaic County Internet Crimes Task Force has handled 38 cases since the unit was created in 2003, Sheriff Richard Berdnik said. Bergen County has investigated about 12 cases in the past three years.

The statute prohibits the posting of an image of a person engaged in sexual contact or a photo of a person’s private parts without their permission. Consent to a nude image being taken does not imply consent to its distribution, experts say. The sharing of the photo or video with just one person is as much of a crime as posting it to the World Wide Web.

“It’s becoming more and more pronounced as technology increases,” said Detective Capt. Robert Weston, who oversees the Passaic County task force. “I think as more and more people utilize social networking sites to communicate with one another and display photographs of themselves, individuals have subsequently used those sites to engage in illegal behavior.”

It is unclear how many states have invasion of privacy statutes that pertain to posting explicit images online. However, many statutes on the books elsewhere could cover such a crime, including lewdness, disseminating obscene materials and indecent exposure, said Eugene O’Donnell, professor of law and police studies at John Jay College of Criminal Justice.

Invasion of privacy cases are likely to become a growing area of concern as the reach of technology expands, O’Donnell said. He believes that both the number of people posting private photos without the subject’s consent and the number of victims willing to report it will increase dramatically.

Women are primarily the victims, but many do not turn to police because they are embarrassed. When victims do seek help, they are mostly interested in getting the images taken down, and the spiteful ex-lovers are often surprised to find that it’s a crime.

Police urge victims to call as soon as they find an image.

Article source:

View full post on National Cyber Security » Virus/Malware/Worms

Lead Developer/Programmer / Confidential / San Francisco, CA

Confidential/San Francisco, CA (Soma)

We are a new startup, with ample funding and a legendary new product that needs help being built. You will be responsible for being on the founding team that codes thousands of lines of code to get the platform up and running through beta into a scalable viral must-have product in the web 2.0 industry. You will be a founding member, so you will have the opportunity for real equity, and a chance to be proud of a product that you created.

Candidate must be familiar with systems architecture, backend, frontend, and being a hacking/coding fiend to create a clean, useable, working product that you are proud of.
Salary is competitive and based on experience or if you can show up our pretty epic chief product architect in coding. Please submit your resume in the first email in either pdf or word format and outline why you are the best person for the job.

Please note, we are aware of the various backgrounds of an amazing programmer/systems architect, so don't feel dissuaded by the posted career level. If you've been coding as long as you can remember, know you're the best of the best, and can prove it, we want you. Our offices are centrally located in San Francisco, near South Beach.


Front end

Been playing with HTML/JS/CSS since high school or before

Fluent at Javascript

Thinks they can write apps that rival native in a modern browser

An eye for detail, no trouble quickly matching a photoshop mock pixel for pixel in HTML/CSS

Written or contributed to several sophisticated web apps with a server component

Understands the challenges facing modern web apps

A BS level understanding of computer science.

Strong knowledge of a backend language: Java, PHP, Python, etc…

An internship from a legit tech company…Google, Facebook, Microsoft, Yahoo, Amazon, etc…


A beast at PHP (or good enough to talk me out of using PHP), Java, and C++

Knows MySQL and understands databases in theory

Understands the backends of modern web apps

A BS in Comp Sci

Job experience from a legit tech company…Google, Facebook, Microsoft, Yahoo, Amazon, etc…

Experience with machine learning algorithms

Ready to build a website from scratch

Apply To Job

View full post on Wired Jobs

View full post on National Cyber Security

SI teen suicide may lead to cyber bullying law

Bronx Senator Jeff Klein is introducing a bill that would revise the state’s harassment laws to cover electronic bullying.

View full post on cyber stalking – Yahoo! News Search Results

View full post on National Cyber Security

WiFi, DDoS Vulnerabilities, Cyber-Attacks Lead Week’s Security News

Software security flaws dominated news headlines this week, as security experts discussed the implications of a vulnerability that was found in several Web application frameworks.

View full post on germany cyber attack – Yahoo! News Search Results

View full post on National Cyber Security

Cellphone-related fatal wrecks lead families to push for change

Take a look around the next time you’re at a stoplight. Chances are, you’ll see someone on a cellphone. These families are trying to convince drivers to put their phones away. The deaths of loved ones have turned them into advocates.

View full post on cellphone security – Yahoo! News Search Results

View full post on National Cyber Security

Principal Software Development Engineer, Lead

Location: Redmond, WA, US
Job ID: 747704-36268
Division: Corporate Research Development

The Technical Strategy and Incubation team is seeking a high achieving Principal Software Development Engineer Lead to lead the team in building a next generation UI/Graphics platform. This incubation team is chartered with pursuing strategic opportunities which are difficult to address incrementally with existing systems, such as UI responsiveness and security, rich applications that span devices, new web-centric programming models, and effective use of GPUs and many core.

The successful candidate is a Principal Software Development Engineer who is passionate about building next-generation technologies, enjoys startup environments, and loves to code. The candidate should have 5+ years’ management experience and 10+ years’ software engineering experience, ideally with experience in areas such as operating system or browser development.

Our team is a small hand-picked team of developers passionate about building real systems that extend the current thinking in Operating Systems and Platform technology. The Technical Strategy and Incubation team has the unique aspect of being outside of existing product groups, allowing us to pursue experimental ideas and solutions that may be impractical for existing products due to legacy demands and business commitments. This is a high visibility position with impact in the incubation, in the company, and in the overall market.

Because this is an incubation group, a candidate must have a high tolerance for uncertainty and changes in direction. Comfort with low-level systems development and expert proficiency in a C-like language are required. Additional desirable, but not mandatory, skills include familiarity with GPU programming and rendering techniques, numerical algorithms and geometry, asynchronous programming models, data parallelism, concurrency, data synchronization, data-driven UI frameworks, and real-time collaboration.



Click here to apply
Please mention that you saw the job on Wired

Article source:

View full post on National Cyber Security



Major firm in Montvale, New Jersey is seeking a SAP Security Lead for a long term contract to hire opportunity. The ideal candidate will be responsible for planning and executing security tasks related to maintenance of SAP systems that the firm manages for various divisions that include ECC, Business Warehouse (BW), Supply Chain Planning (SCM), Enhanced Warehouse Management (EWM), eCommerce and Solution Manager. The selected candidate will be lead the Security team that includes on-site and off-shore personnel and support both Production Environments and Project Initiatives.

The candidate may be required to work flexible hours, including weekends and holidays to perform tasks off-hours if required, and willing to participate in 24/7 duty coverage.

Specific responsibilities will include:

Create, maintain and enforce Security standards and procedures

Supervise work of and provide guidance to on- and off-shore SAP Security Analysts

Administer SAP GRC tools (formerly known as Virsa)

Perform SOD analysis on user ID’s and roles

Maintain Risks, Rules and Mitigating Controls

Interact with off-shore and near shore support teams: Basis, development, application production support, business liaison.

Organize and manage security tasks for on-going projects

Debug security authorization issues

Provide regular status reports to various levels of management

Required Skills for this position will include:

Minimum 5-7 years of experience administering SAP Security various modules, including JAVA

Knowledge of SAP GRC tools

Has participated in a minimum three full life cycle SAP implementations

Excellent verbal and written communication skills

Experience in estimating and managing projects

Experience in production support

Preferred Skills/Qualifications:

Knowledge of Sarbanes-Oxley best practices

Working knowledge of SharePoint, experience in creating complex presentations and advanced spreadsheets

Article source:

View full post on National Cyber Security

Mac Malware, DoS Tools, Cyber-War Lead Week’s Security News

Mac malware dominated the news this week, as security researchers uncovered a new Trojan capable of hijacking Mac OS X systems and launching denial-of-service attacks on another server, downloading additional malware on the infected system and providing attackers with remote access on to the computer.
The Tsunami Trojan was a version of an older backdoor Trojan for the Linux operating system. While Windows Trojans have been re-packaged for the Mac before, Tsunami is likely the first to come over from the Linux world. The malware has already been mutating, with hackers adding new capabilities. There are versions attacking both 64-bit and 32-bit Intel x86 and PowerPC Mac computers.

A new denial of service attack tool targeting SSL servers was released this week. The THC-SSL-DOS tool exploits known issues with how SSL connections work to make it possible to launch denial-of-service attacks against a server over a plain residential DSL connection and a laptop.

As a general rule, for a denial of service attack to be effective, attackers either needed a lot of bandwidth, typically more than would be available on a DSL line, or a lot of computers to make up for the narrow network pipe. Since the THS-SSL-DOS tool attempts to establish a large number of SSL connections with the target server, it winds up eventually consuming all the system resources and making it unavailable, according to the developers, a German hacking outfit called The Hackers Choice (THC).

Brian Krebs, a security writer and principal analyst for Krebs on Security, said the type of malware used to attack RSA Security earlier in the year may have also hit more than 700 other organizations. These organizations weren’t attacked with technology stolen from RSA Security, but rather faced malware attacks using similar command-and-control infrastructure used by the malicious Excel spreadsheet that penetrated RSA’s systems.

Affected organizations included technology and non-technology companies. Even though internet service providers were included in the list posted on Krebs on Security, it was more likely that one of the subscribers had been hit and not the provider’s networks, according to Krebs.

Mitsubishi Heavy Industries has acknowledged there was a possibility that when cyber-attackers had infected more than 80 computers and servers, breached its networks, and copied data from one server to another, that some of that data may have left the company. Japan’s largest defense contractor remained mum about what may have been leaked.

The Japanese government had other cyber-worries to deal with, as reports emerged of systems belonging to members of Parliament and dozens of Japanese embassies abroad being infected with unknown malware over the summer.
Security experts warn that cyber-attackers can target United States critical infrastructure and cause a lot of damage. Department of Homeland Security Janet Napolitano said attackers were already attacking critical financial systems, transportation and other sensitive areas at an event in Washington, D.C. this week. It was important that Congressional lawmakers pass cyber-security legislation, she said.

Napolitano’s speech came a few days after BusinessWeek revealed the contents of a draft report by a Congressional commission which claimed that malicious perpetrators had interfered with two United States satellites four times over the past few years. While the U.S. China Economic and Security Review Commission report fell just short of directly accusing the Chinese government for backing the attackers, the commission said the tactics were consistent with strategies outlined in published Chinese military writings.

Article source:

View full post on National Cyber Security » Virus/Malware/Worms

How fast fingerprinting of OLE2 files can lead to efficient malware detection

SophosLabs experts present research describing how heuristics can help anti-virus products discern between benign and malicious OLE2 files.How fast fingerprinting of OLE2 files can lead to efficient malware detection, Blog, malware, LEAD, files, Fast, Fingerprinting, OLE2, efficient, detection

View full post on Naked Security – Sophos

View full post on National Cyber Security

ProtectMyID: RT @healthinfosec: RT @healthinfosec Verizon: Lax Credit Card Security Will Lead to More Breaches

ProtectMyID: RT @healthinfosec: RT @healthinfosec Verizon: Lax Credit Card Security Will Lead to More Breaches

View full post on Twitter / ProtectMyID

View full post on National Cyber Security

Page 3 of 4«1234»

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?

Find Out More, Click Here!