The US Internet Crime Complaint Center (IC3) today warned that a new drive-by variant of the malware known as Reveton is impersonating e-mail from the FBI and looking for your money.
Michael Cooney |
10 Aug |
Read more
Noting that the Federal Communications Commission's Radio Frequency exposure limits may not reflect the latest research, and testing requirements may not identify maximum exposure in all possible usage conditions, the Government Accountability Office today said the agency should reassess and possibly change its regulations regarding mobile phone radiation.
Michael Cooney |
08 Aug |
Read more
A little over a month after the FBI warned travelers of an uptick in data being stolen via hotel Internet connections, the Federal Trade Commission has filed a complaint against Wyndham Worldwide Corporation and three of its subsidiaries for alleged data security failures that led to three data breaches at Wyndham hotels in less than two years.
Michael Cooney |
27 Jun |
Read more
The Federal Trade Commission today said data broker Spokeo will pay $800,000 to settle FTC charges it sold personal information it gathered from social media and other Internet-based sites to employers and job recruiters without taking steps to protect consumers required under the Fair Credit Reporting Act.
Michael Cooney |
12 Jun |
Read more
The nasty Trojan known as Citadel malware, which is based on Zeus, has typically been used to extort money from online banking users, but a new variant is making the rounds that tries to get your money by saying you looked at child porn sites and must pay a violation fee to the U.S. Department of Justice.
Michael Cooney |
31 May |
Read more
The idea that <a href="http://www.aclu.org/blog/technology-and-liberty/facebook-twitter-and-dhs-which-one-these-things-not-others">any number of federal institutions are watching</a> your every move on social networks like Facebook, Twitter is unnerving at best. T<a href="http://www.networkworld.com/community/blog/dhs-looking-bolster-drone-security-surveillance-system">he Department of Homeland Security</a> is one of those agencies and today it testified before a House subcommittee to define and defend its role in social media monitoring.
Michael Cooney |
17 Feb |
Read more
A former <a href="http://www.networkworld.com/community/blog/does-irs-need-more-options-fight-identity-the">Internal Revenue Service</a> employee this week got 105 months in prison for pleading guilty to theft of government property and aggravated identity theft in a case where the guy tried to get away with nearly $8 million in fraudulent tax returns.
Michael Cooney |
11 Feb |
Read more
These days barely a day goes by where there isn’t some sort of network security breach or hack or malfunction of some sort. This year too we had the rise of groups such as Anonymous and Lulz that sought out attention for their activities. Here we take a look at the year in pictures of some of the key security problems that grabbed our attention.
Michael Cooney |
08 Dec |
Read more
What do Mars, the Terminator, an ostrich and hair-washing have to do with each other? Ask the robots
Michael Cooney |
18 Nov |
Read more
At a time when the cyberthreat level is at its peak, many federal agencies continue to struggle with IT security.
Michael Cooney |
05 Oct |
Read more
Personal privacy or the growing lack thereof was one of the hot <a href="http://www.networkworld.com/topics/security.html">security</a> buttons this week.
Michael Cooney |
24 Sep |
Read more
The Federal Trade Commission the week said it will hold a workshop that examines how burgeoning use of facial recognition technology impacts privacy and security.
Michael Cooney |
22 Sep |
Read more
A destructive attack from cyberspace "is coming, in my opinion. It is a question of time. What we don't know is how far out it is," and whether it will target commercial infrastructure, government networks or mobile platforms Army Gen. <a href="http://www.nsa.gov/about/leadership/bio_alexander.shtml">Keith Alexander</a> told attendees of the "<a href="http://www.crows.org/details/144-maneuvering-in-cyberspace-and-io.html">Maneuvering in Cyberspace</a>" symposium this week.
Michael Cooney |
15 Sep |
Read more
There is an urgent need for businesses and our government to develop high-level cyber-intelligence as a way to combat the unacceptable levels of <a href="https://images.magnetmail.net/images/clients/INSA/attach/INSA_CYBER_INTELLIGENCE_2011.pdf">online security threats</a> because the current "patch and pray" system won't cut it in the future.
Michael Cooney |
14 Sep |
Read more
As part of a look at the impact of identity theft and the Internal Revenue Service, watchdogs at the Government Accountability Office issued the IRS' top 10 list of identity theft information everyone should be aware of. Some of the information is obvious, perhaps, but overall even the basics of security were followed in many cases the impact of identity theft could be reduced.
Michael Cooney |
03 Jun |
Read more