View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security
Big crime meets big data – Data and social media are being used against us in creative new ways.
Marc Goodman, consultant and cyber crime expert, explains how criminals and terrorists can put data, automation, and scalability to effective use. View full post on O’Reilly News and Commentary View full post on National Cyber Security
Big crime meets big data – Data and social media are being used against us in creative new ways.
Marc Goodman, consultant and cyber crime expert, explains how criminals and terrorists can put data, automation, and scalability to effective use. View full post on O’Reilly News and Commentary View full post on National Cyber Security
Big crime meets big data – Data and social media are being used against us in creative new ways.
Marc Goodman, consultant and cyber crime expert, explains how criminals and terrorists can put data, automation, and scalability to effective use. View full post on O’Reilly News and Commentary View full post on National Cyber Security
Under malware attack: Smart cards used by U.S. government agencies
Ryan Naraine is a journalist and social media enthusiast specializing in Internet and computer security issues. He is currently security evangelist at Kaspersky Lab, an anti-malware company with operations around the globe. He is taking a leadership role in developing the company’s online community initiative around secure content management technologies….
ProtectMyID: When you recycle used wrapping paper, be sure to not mix in any holiday bills or receipts—shred financial documents. #identitytheft
ProtectMyID: When you recycle used wrapping paper, be sure to not mix in any holiday bills or receipts—shred financial documents. #identitytheft View full post on Twitter / ProtectMyID View full post on National Cyber Security
Alleged cyber stalker used social media to threaten woman
A 24-year-old is accused of leaving graphic and threatening messages for a UCF student on YouTube and other social media sites. View full post on cyber stalking – Yahoo! News Search Results View full post on National Cyber Security
Belkasoft Forensic Software Used in INTERPOL Cybercrime Investigation Contest
Belkasoft computer forensic software was used in INTERPOL Cybercrime Summer School, helping investigators learn locating digital evidence on PCs. The company’s flagship product, Belkasoft Evidence Center, was the participants’ tool of choice for extracting instant messenger communications during the cybercrime investigation contest.(PRWEB) December 19, 2011 “We were happy to provide…
Google’s goo.gl URL Shortener Used for ‘Drive-by’ Malware Attacks
A new malware attack is luring victims by using web-based exploits to perform a ‘drive-by’ malware download under the guise of an electronic money transfer. Researchers at Solera Networks reported that the attackers make use of Google’s goo.gl link-shortening service to hide the location of the attack site. The attacks…
Are TASERs ‘overused’ or just plain used?
Event Date: Mon, 28 Nov 2011 16:30:15 GMTAuthor: Lt. Dan MarcouDepartments could require that every update of TASER training also includes an update of empty hand techniques — including transition exercises back and forth between each. View full post on Police Training View full post on National Cyber Security Gergory…