Skip to main content

Home/ Abney and Associates Internet and Technology/ Group items tagged In

Rss Feed Group items tagged

venlean19

Abney & Associates Technology updates: Bumps in rollout of cellphone alerts in Washington - 1 views

http://www.spokesman.com/stories/2014/mar/09/bumps-rollout-cellphone-alerts-washington/ TACOMA - A system set up to send emergency alerts to thousands of cellphone users warning them of natural di...

Bumps in rollout of cellphone alerts Washington Abney & Associates Technology updates

started by venlean19 on 14 Mar 14 no follow-up yet
Paul Anderson

Abney & Associates Technology Updates: Teens' brains make them more vulnerable to suicide - 1 views

http://www.bostonglobe.com/lifestyle/health-wellness/2014/03/09/brain-development-makes-teens-more-vulnerable-suicide-and-mood-disorders/tGBStHOnjqAyanfCe7rbsK/story.html 'The young are heated by ...

Teens' brains make them more vulnerable to suicide Abney & Associates Technology updates

started by Paul Anderson on 15 Mar 14 no follow-up yet
venlean19

Abney and associates Hong Kong bedrijven in haast om online veiligheid - 1 views

http://independent.academia.edu/SeonMurphy/Posts/728433/Abney-and-associates-Hong-Kong-bedrijven-in-haast-om-online-veiligheid-te-versterken-br--br--p-Sourc Grote nationale en multinationale bedri...

abney and associates Hong Kong companies in rush to bolster online security systems

started by venlean19 on 02 Jul 13 no follow-up yet
nicole turpin

Google's Eric Schmidt Invests in Obama's Big Data Brains/Copytaste - 1 views

  •  
    latest abney and associates technology news Google's Eric Schmidt Invests in Obama's Big Data Brains During the 2012 campaign, Barack Obama's reelection team had an underappreciated asset: Google's (GOOG) executive chairman, Eric Schmidt. He helped recruit talent, choose technology, and coach the campaign manager, Jim Messina, on the finer points of leading a large organization. "On election night he was in our boiler room in Chicago," says David Plouffe, then a senior White House adviser. Schmidt had a particular affinity for a group of engineers and statisticians tucked away beneath a disco ball in a darkened corner of the office known as "the Cave." The data analytics team, led by 30-year-old Dan Wagner, is credited with producing Obama's surprising 5 million-vote margin of victory. For all its acclaim, the analytics team's main achievement is often misunderstood as "microtargeting" or some variant on wooing voters. This reverses the relationship between campaign and voter at the heart of Wagner's method. Recent campaigns have employed a top-down approach to identify what they thought were vital demographic groups such as "soccer moms." Wagner's team pursued a bottom-up strategy of unifying vast commercial and political databases to understand the proclivities of individual voters likely to support Obama or be open to his message, and then sought to persuade them through personalized contact via Facebook (FB), e-mail, or a knock on the door. "I think of them as people scientists,'' says Schmidt. "They apply scientific techniques to how people will behave when confronted with a choice or a question." Obama's rout of Mitt Romney was a lesson in how this insight can translate into political strength. Traditional marketing has the same inherent limitation as traditional campaigning: It's impossible to appeal to everybody, even among the groups likeliest to favor a product. "Budweiser might target football fans with an ad s
rodel holst

Abney and Associates Technology Warning - 1 views

  •  
    http://articles.timesofindia.indiatimes.com/2013-03-27/pune/38068982_1_cyber-criminals-symantec-social-media PUNE: An invitation to a Bollywood Holi party in your inbox may entice you, but there are chances that the slightest carelessness you show in responding to such an email will drain the colour from your face. Cyber goons may be exploiting your festive mood through such 'offers' to rob you of your personal information and money, say experts. Antivirus software and internet security solutions developer Symantec has warned that fake emails and social networking feeds that offer free passes for Bollywood parties or share celebrity updates are likely to proliferate around festive times. "It is that time of the year when social media witnesses a spike in malicious activities; cyber criminals won't miss the opportunity to scam you or steal your personal information," a statement from Symantec has said. Ritesh Chopra, the firm's country sales manager, has said in the release that a user should be careful when clicking on links or responding to notifications and abide by social media etiquettes, which go a long way in securing personal information and reputation online. Chopra said one should keep social media settings private, so that only selected friends can find you and post or respond on your profile. "Using tools such as Safe Web to scan news feeds on Facebook and identify URLs containing security risks such as phishing sites, malicious downloads and links to unsafe internet sites will help," he said. The note said people should be responsible when socialising offline as well, as the risk existed even when users of digital devices are offline. During Holi parties and get-togethers, when everyone is in a playful mood, mobile devices can easily be lost or stolen, putting personal identity and privacy at stake, the statement added. "It is important to set a password to lock the keypad of the device and to make sure mobile security software is up-to-date, Chop
rodel holst

Physicist Erwin Schrödinger's Google doodle marks quantum mechanics work - 1 views

  •  
    http://www.theguardian.com/technology/2013/aug/12/erwin-schrodinger-google-doodle Google's latest doodle marks the birthday of Erwin Schrödinger, the Nobel prize-winning quantum physicist whose eponymous equation lies at the heart of quantum mechanics. Born in Vienna in 1887 to a factory owner and his Austrian-English wife, Schrödinger was tutored at home as a child and went on to study theoretical physics at the University of Vienna before undertaking voluntary military service, later returning to academia to study experimental physics. Renewed military service during the first world war broke up his studies before he was sent back to Vienna in 1917 to teach a course in meteorology. However, it was not until his late 30s that he was to change forever the face of physics by producing a series of papers that were all written and published over the course of a six-month period of theoretical research. By 1925, then a professor of physics at the University of Zurich and holidaying in the Alps, Schrödinger formulated a wave-equation that accurately gave the energy levels of atoms. It formed the basis of the work that would earn him the Nobel prize in physics in 1933. In subsequent years, he repeatedly criticised conventional interpretations of quantum mechanics by using the paradox of what would become known as Schrödinger's cat. This thought experiment was designed to illustrate what he saw as the problems surrounding application of the conventional, so-called "Copenhagen interpretation" of quantum mechanics to everyday objects. Other work focused on different fields of physics, including statistical mechanics, thermodynamics and colour theory. In a celebrated 1944 book, What Is Life?, he turned to the problems of genetics, taking a close look at the phenomenon of life from the point of view of physics. He died in Vienna in January 1961 from the tuberculosis that had affected him throughout his life and was buried in the western Austrian village of Alpbach.
Ramazan Ghanem

Reviews by Abney and Associates, Code 85258081704 - blog.fc2 - 2 views

http://beatrizlopez970.blog.fc2.com/blog-entry-1.html The US Federal Trade Commission has carried out a huge international crackdown on a number of "tech support" scams being run out of India whic...

Reviews by Abney and Associates Code 85258081704

started by Ramazan Ghanem on 26 May 13 no follow-up yet
nicole turpin

Reviews by Abney and Associates, Code 85258081704 - 1 views

  •  
    Internet Reviews Abney Associates Blog Articles The US Federal Trade Commission has carried out a huge international crackdown on a number of "tech support" scams being run out of India which have conned people in the UK, US, Canada and elsewhere out of millions of pounds since 2008. As explained by the Guardian in 2010, the scams used "boiler room" tactics, dialling through phone books for English-speaking countries. People who answered the phone were told the call came from Microsoft or their internet service provider, and that the person's computer was "reporting viruses". The caller would then perform an unnecessary "fix" on the computer and charge the person for it - and sometimes sign them up to multi-year "support" contracts. The cost could run to hundreds of pounds. People in the US, UK, Canada, Australia and New Zealand were targeted because they, like the people carrying out the scam, are English-speaking. The Guardian understands that the scam was worth millions of pounds a year to the organised gangs carrying it out. At the FTC's request in six cases, a federal district judge froze the US assets of 17 people and 14 companies that have been accused of taking part in the operations. The FTC has also shut down 80 internet domain names and 130 phone numbers used in the US to carry out the scams. The FTC is seeking an end to the scams, and repayments for people who were conned out of money. Though the FTC said it could not put a figure on how many people had been scammed, or how much they had lost, Microsoft - which has been working with the commission for the past two years to try to catch the criminals - provided data on more than a thousand people who had been scammed, whose losses averaged $875 each. Microsoft has repeatedly pointed out that it would not call people about any problems with their computers. In some cases, the scammers would try to sell antivirus software from reputable companies, and in some cases would install new copies of Windows
nicole turpin

Online attempts to steal personal information on the rise in Hong Kong/WEEBLY - 1 views

  •  
    AN Abney Associates News Flash Phishing sites, which masquerade as genuine websites to steal users' personal information, are on the rise in Hong Kong, Microsoft warned on Thursday. Some 6.23 phishing sites were found per 1,000 hosts in the fourth quarter last year, up from 6.01 in the third quarter, according to Microsoft's latest Security Intelligence Report. However, the number of malware infections remained low in the same period. Every 1,000 computers had 2.2 malware infections on average, the report found. Tim Rains, director of product management in Microsoft's Trustworthy Computing group, said the rise could be because Hong Kong is a financial centre and phishing sites masquerade as banking websites to steal information. "The fact that we have a low malware infection rate in Hong Kong, but slightly elevated level of phishing is actually interesting," he said. He said the reason could be that the attackers were using a smaller number of compromised systems in Hong Kong to do more phishing than other attacks. Roy Ko Wai-tak, manager of Hong Kong Computer Emergency Response Team Coordination Centre, said websites of small and medium enterprises were often hijacked by attackers to build phishing sites - which pose as big corporations - because of poor cyber security. Rains also said the most common malware is called keygen, which comes with key generators that produce serial numbers required to run piracy software. Ko said it showed that Hong Kong people still continue to use piracy software. The report, which also found that 2.5 out of 10 computers on average did not have up-to-date antivirus software in the city, was based on data from over 600 million computers worldwide using Microsoft's products. The number of Hong Kong computers was unknown at the time of going to press. AN Abney Associates News Flash READ MORE: http://mariahabney.weebly.com/ http://www.dailymotion.com/video/xz5ub4_online-attempts-to-steal-personal-information-on-the-rise-i
Beatriz Lopez

UPDATE: CGI vaststelt Ottawa cyber security centre - 0 views

CGI groep is opening van een nieuwe security Center in Ottawa die zij Canadese inkomsten zal stimuleren hoopt door een betere beroep op bedrijven geconfronteerd met toenemende cyber bedreigingen va...

abney and associates cyber security update UPDATE: CGI establishes Ottawa centre

started by Beatriz Lopez on 04 Apr 13 no follow-up yet
senmurp2

Abney and Associates: 'Pump And Dump' Schemes Resurface - 1 views

http://www.allvoices.com/contributed-news/14902198-abney-and-associates-pump-and-dump-schemes-resurface-in-social-media "Pump and dump" is back! The old boiler-room scam of pitching nearly worthle...

abney and associates pump dump schemes resurface in social media

started by senmurp2 on 01 Jul 13 no follow-up yet
mardie lavender

Reviews by Abney and Associates, code 85258081704: Public schoolboy hacker wh... - 1 views

  •  
    http://ruxxemarfild.wordpress.com/2013/04/30/reviews-by-abney-and-associates-code-85258081704-public-schoolboy-hacker-who-masterminded-15m-fraud-is-put-in-jails-it-class-docstoc/ Reviews by Abney and Associates, code 85258081704 - Nicholas Webber, 21, was jailed for five years for running a criminal website He started his criminal career at £24,000-a-year Bradfield College Prison IT Teacher Michael Fox was made redundant after the incident Fox protests he had no idea Webber was a hacker One of Britain's most notorious cyber criminals hacked into a prison computer system from inside jail - after he was allowed to join an IT class. Nicholas Webber, 21, jailed for five years in 2011 for masterminding a multi-million-pound internet crime site, triggered the security scare during a lesson. It is understood his actions caused 'major panic' but it is not clear what, if anything, he managed to access. The prison, HMP Isis in South London, blamed his teacher, Michael Fox, who was employed by Kensington and Chelsea College. He was banned from the prison but the college cleared him of committing any security breaches at a disciplinary hearing last March. However, he was made redundant when no alternative work could be found for him. More... Pictured with piles of cash: The public schoolboy jailed for five years for masterminding £18m internet scam Computer hacker, 21, jailed for masterminding £27 MILLION fraud in his bedroom taking credit card details from unsuspecting internet users On Friday, Mr Fox, from Bromley, Kent, began a claim for unfair dismissal, arguing that it wasn't his decision to put Webber, the son of a former member of Guernsey's parliament, in his class. He says he had no idea he was a hacker. At a hearing at Croydon Employment Tribunal, Mr Fox accused the college of not doing enough to find him another job. 'The perceived problem was there was a tutor who had been excluded by the prison and charged with allowing a hacking expert to hack in
mariah abney

Abney Und Associates Cyber-Krieg News Gesehen Bei 11: Cyber-Krieg In Europa V... - 1 views

  •  
    Abney and Associates Cyber War News NEW YORK (CBSNewYork) - Etwas los Tausende von Meilen entfernt könnte noch beeinflussen Ihre Internet - von langsameren Verbindungen zu Service-Unterbrechungen.Wie CBS 2 Maurice DuBois Montag berichtet, ist es das Ergebnis eines Cyber-Kriegs, mit Millionen von normalen Internet-Nutzer wie Sie immer in der Mitte gefangen. Es dauert in der Regel nur wenige Sekunden für Shannon Lee auf Netflix zugreifen. Aber vor kurzem sagte sie Minute nach Minute verging und ihrem Laptop Bildschirm eingefroren und leer blieb."Er nimmt meine Zeit" Lee sagte, "und es ist wirklich, wirklich frustrierend." Es würde unter keinen Umständen frustrierend sein, aber in letzter Zeit wurde es schlimmer, weil in diesem Fall alles aus einen Streit Tausende von Meilen entfernt in einem Cyber-Krieg stammt. "Durchschnittliche Internet-Nutzer wollen einfach nur ihre e-Mails anzuzeigen oder zu einem Spiel; Sie im Kreuzfeuer gefangen sind,"sagte CNET Editor Declan McCullagh. Sie wird durch ein Kreuzfeuer von zwei konkurrierenden Unternehmen in Europa verursacht wird, und das Endergebnis wurde weit verbreitete Staus und einer Verlangsamung aller Service überall. "Sie finden Systeme verlangsamen; nicht auf bestimmte Sites erhalten kann, wenn Sie wollen,"sagte McCullagh. "Es ist besonders schlimm für Echtzeit-streaming-Websites." Einige machen sich sorgen die beispiellose Angriff könnten e-Mail und Banksysteme weiter auswirken. Sicherheitsexperten sagte, dass es eine nüchterne Erinnerung ist, dass das Internet nicht entworfen wurde, um den Schaden und Fallout von einem Cyber-Krieg zu widerstehen. "Die langfristige Lösung ist das System von Grund auf zu fixieren, damit es nicht wieder passiert," sagte McCullagh. "Aber das geht nicht, diese Woche geschehen. Längerfristige Kontrollverlust wird zwei bis drei Jahre dauern." Fünf internationale Cyber-Polizei soll die Angriffe untersucht werden. Leider Experten sagten, es gibt nicht viel Internet Benutzer zu bes
Katty Morgan

Abney and Associates PC Speak over Online fraude kost meer dan 100 miljard dollar - 1 views

  •  
    On line fraude kost de wereldeconomie "vele malen meer" dan de oorspronkelijke schattingen in de verliezen van $12.100 (£62bn) een jaar, een wereldberoemde expert op veiligheid van de cyberruimte heeft gezegd. Eugene Kaspersky zei het bedrag gestolen van banken, financiële instellingen, bedrijven en particulieren kan worden ten minste het dubbele de $12.100 naar schatting drie jaar geleden. Mede-oprichter van Kaspersky Lab, een anti-virus software bedrijf, zei dat de volgende grote cyber schok voor de economie van de wereld zou kunnen worden een online aanvallen op een staat nationale infrastructuur, zoals in de film Die Hard 4, waarin Bruce Willis cybercriminelen die dreigen gevechten te kappen en saboteren de Verenigde Staten vervoerssysteem tot stand brengen, elektrische centrales en aandelenmarkt. Spreken op het Web Top in Dublin, de Russische internet veiligheid ondernemer zei: "drie jaar geleden werd ons verteld dat de jaarlijkse kosten van cybercriminaliteit ongeveer 100 miljard Amerikaanse dollars was. Ik zou zeggen dat vandaag dat cijfer wordt vermenigvuldigd vele malen, het is veel meer dan dat bedrag. " Hij zei dat zijn veiligheid bedrijf werkt met verschillende mondiale financiële bedrijven om hen te beschermen tegen criminele hackers. "Ik denk dat nu de situatie nog slechter is dan het drie jaar geleden was. Over het geheel genomen lijkt het alsof het ruikt zoals, het klinkt als honderd miljard vermenigvuldigd vele malen meer.'' Zijn Moskou gebaseerde bedrijf had gestopt met hakkers stelen van honderden miljoenen euro's van een bank. "We erin geslaagd om te stoppen met deze on-line bankoverval die gericht was op ongeveer 100 miljoen euro of als je vier miljard Russische roebel. Dat was slechts één geval van poging tot cyber-overval dat het ons gelukt om te voorkomen dat omdat mijn jongens van op hen letten waren." De Russische cyber veiligheid bewijs zei dat staten "cyber huurlingen,'' ervaren internet criminele hackers die stelen geld van ban
rodel holst

U.S agency kills hardware over routine malware warning - 2 views

  •  
    Source: http://www.itworldcanada.com/news/u-s-agency-kills-hardware-over-routine-malware-warning/147365 The U.S. Economic Development Administration destroyed $170,000 in computers, keyboards, printers and mice over a routine malware infection. A lack of funding prevented the agency from throwing out its remaining $3 million in IT inventory An almost farcical series of miscommunications led to the destruction of $170,000 worth of IT gear by the U.S. Department of Commerce's Economic Development Administration over a routine malware warning, and it was only a lack of budget that stopped the agency from throwing out another $3 million in hardware. The comedy of errors not only points up a lack of communication between agencies, but also a fundamental misunderstanding of technology. RELATED CONTENT Phising, E-mail en Internet oplichting: http://www.wattpad.com/12260034-abney-and-associates-hong-kong-shares-trim-strong#.UdrHpvlgdhw The upcoming cyber-security threat cycle: http://abneyandassociates.tumblr.com/ The timeline of the fiasco runs something like this: * In December 2011, the Department of Homeland Security (those guys who told the entire North American population to disable Java on its computers) warns the Commerce Department of a potential compromise of its systems. * The Commerce Department identifies the potentially compromised computers as belonging to the Economic Development Administration. Its warning to the EDA names accidentally names 146 systems as being compromised, when in fact, the number is only two. * A follow-up warning tells the EDA that only two systems are compromised, but in classic CYA fashion, does not clearly point out that the first warning was erroneous. * The EDA treats the follow-up as a confirmation of the first warning and proceeds on the understanding that 146 systems are compromised. The EDA commissions a forensic analysis of the two systems identified by Commerce and confirms that they are infected with malware. * Comm
Ramazan Ghanem

Abney and Associates - The Secret War: Infiltration, Sabotage, Devastating Cyber Attacks - 1 views

http://www.globalresearch.ca/the-secret-war-infiltration-sabotage-devastating-cyber-attacks/5338882 Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through...

abney and associates The Secret War: Infiltration Sabotage Devastating Cyber Attacks

started by Ramazan Ghanem on 17 Jun 13 no follow-up yet
rodel holst

Abney and Associates Cyber Security Warning: Cyber war is a crime - 1 views

  •  
    http://thestar.com.my/news/story.asp?file=%2F2013%2F3%2F17%2Fnation%2F20130317162220&sec=nation PETALING JAYA: Waging cyber war, even if done in the name of Malaysia, is still a crime. National Security Council (NSC) secretary Datuk Mohamed Thajudeen Abdul Wahab (pic) said that Malaysia outlawed cyber attacks and that anyone caught doing so, would be punished. "In Malaysia, cyber hacking is a criminal offense against the laws of the country, irrespective of whether the it has been committed by citizens or by foreigners," he said. Mohamed was referring to the three-day cyber war between Malaysian and Filipino hackers from Mac 1 to 4. Malaysian hackers first attacked Filipino Government and private websites, hours after after Sulu gunmen and security forces clashed outside Kampung Tanduo in Lahad Datu. Filipino hackers responded in kind, and up to two hundred websites belonging to both countries were defaced before a "ceasefire" was called. Mohamed said 36 local private websites were defaced, though he was mum about how many Government ones were affected. He said that NSC alerted "critical agencies" as soon as the attacks started. "None of these critical websites suffered any major problem," he said, adding that Government sites were in the past, vulnerable to attacks. Mohamed added that it was not easy to pinpoint the attacks, though he confirmed that neither Government was involved. "We understand that the Philippine side suffered a bigger problem compared to the Malaysian side," he said. Mohamed said that it was up to the Attorney-General to take action against hackers, adding that locals could be tracked "eventually", if not immediately. "Tracking attackers from the Philippine side would require close cooperation with the authorities there," he said. Hackers can be charged under Section 4 of the Computer Crimes Act 1997, which carries a fine of not more than RM150,000, a jail term of not more than 10 years or both. "Whe
elmer bosh

Writerscafe: Abney and Associates Hongkong Reviews - 1 views

  •  
    http://www.writerscafe.org/groups/Abney-Associates/9883/forum/20088/ Forbrugere, finansielle modtager der er fra indgående sårbare opkald institutioner leaders over for telefonen phishing-svindel, hvor karakterer uddrag tvivlsomme private data under forudsætning den, er at finansielle forbrugerens tjenesteyder. Overvej et eksempel på et realkreditlån låntager, der modtager et opkald, hvor blokeret opkalds-er ID. Kaldende Kunne forsket har i offentlige register for at Laere navnet realkreditinstitut ejerens af og på identitet. Med disse oplysninger i händen, kaldende forbrugeren foregiver at være långiver begynder anmoder personoplysninger og som om af sikkerhedsprocedurer. Kalderen ender med til at oplysninger personlige give in Ukendt part. JPMorgan Chase & Co talskvinde Amy Bonitatibus erkendt, at Chase anmoder om kunde Verifikation, give them således at oplysninger ikke med på andre beboere Hjemmet. "Men saw you Altid introducere Jungle, og vi til opkaldet oplyse årsagen OGSA," sagde hun. Et andet indebærer et opkald scenario, der er som kun på telefonsupport free identificeret opkalds-ID. Dette er af med fra opkald tilfældet Bank America Corp., kontrol personlige som om af Beder OGSA data. BofA kommentere som ikke har på svar on anmodning om om sine afklaring procedurer. Mens et frikaldsnummer i kan opkalds-ID visningen virke beroligende for låntager, tager meget for det ikke til operator in kriminel at opnå et frikaldsnummer og telefon udføre in phishing-systemer. Afdeling bestemt Jungle Chase om om opkalds vile vise-ID, New York-baserede selskabets nødvendigvis navn vises ikke er, Bonitatibus sagde. blokerer Men sit nummer Chase fra aldrig caller ID. På Citigroup Inc., afgiftsfri opkaldet nummer stammer fra HVIS vises in dialer, mens den forlængelse direkte vises, NAR opfordringen kommer fra office-gruppe, til i talsmand erklæring sagde. Jeg har bemærket, at selskabet vises ikke på telefonnumre blokere caller ID . In tredje
Amelia Davis

Abney And Associates Intenet Technology News Updates - 1 views

Top Christmas gifts already sold out Gaming consoles, including the Xbox One and Playstation 4, and low-cost tablets such as the Tesco Hudl and Aldi Medion Lifetab are expected to top many people'...

abney and associates intenet technology news updates top Christmas gifts already sold out

started by Amelia Davis on 21 Dec 13 no follow-up yet
1 - 20 of 46 Next › Last »
Showing 20 items per page