Pinterest is getting lots of media attention lately. Spammers are also starting to exploit the social-media “pinup” site to make quick money. We have found that there are already lots of ready-to-use tools that make it easy for anyone to start Pinterest scams without much difficulty or technical skill. These…
InfosecIsland: Turn Compliance Beliefs Into Action: Impact Tone at the Bottom http://t.co/BdNUCdFH
InfosecIsland: Turn Compliance Beliefs Into Action: Impact Tone at the Bottom http://t.co/BdNUCdFH View full post on Twitter / InfosecIsland View full post on National Cyber Security
FBI wants backdoors into VoIP, video, social networks and email
Wiretaps increasingly are becoming old school as technology bypasses the eavesdropping technology. Now, says the FBI, it needs access to more current technologies, like VoIP and email, and it’s very interested in getting access to social networks. The FBI wants backdoors–methods of bypassing normal security and encryption–into Facebook, Google+ Hangouts,…
Celeb hacker Christopher Chaney says getting into emails was easy
Christopher Chaney, “The Man Who Hacked Hollywood,” told GQ how easy it was to get into famous celebrities’ private email accounts. Chaney, who leaked naked photos of Scarlett Johansson and read the personal emails of Christina … View full post on National Cyber Security » Computer Hacking
Officer’s book gives view into lives of law enforcement
By Nok-Noi Ricker Bangor Daily News| SOUTH PORTLAND, Maine — He argued with his supervisor and got disciplined, made friends with drug dealers in order to get news from the street, and he isn't afraid to tell you that one night he returned home from a grueling night of investigating…
Breaking Into MI6 Anti-Terror Hotline Attack Was ‘Easy’
A hacker who claims to be behind the release of highly-sensitive telephone conversations on Scotland Yard's anti-terrorist hotline has said the alleged attack was "easy"…. View full post on hacking tools – Yahoo! News Search Results View full post on National Cyber Security
Forensic snoops: It doesn’t take a Genius to break into an iPhone
Cop tools easily bypass 4-digit passcodes Analysis Forensic tools against smartphones allow basic 4-digit phone passcodes to be bypassed in minutes.… View full post on computer forensic – Yahoo! News Search Results View full post on National Cyber Security
Twitter hauls spammers into court
Twitter has taken its fight against on-line spam to the courthouse, filing suit last Thursday in the US District Court in San Francisco. Here’s a summary, plus some tips for you to do your bit to help cut down Twitter spam. View full post on Naked Security – Sophos View…
Middle East could collapse into full conflict if international talks fail next week
Goodspeed Analysis: Such a scenario — played out and predicted increasingly by war game strategists — looms large as the decade-long diplomatic confrontation with Iran appears to be drawing to an end View full post on germany cyber attack – Yahoo! News Search Results View full post on National Cyber…
Ice IX Trojan tricks Facebook users into exposing credit card details
A new configuration of the Ice IX malware is tricking its victims into exposing their credit card details when they try to access their Facebook accounts, according to security firm Trusteer. The new Ice IX variant displays a web form inside a browser pop-up window when users log into Facebook….