Skip to main content

Home/ IB ITGS/ Group items tagged security

Rss Feed Group items tagged

Zaheen Ahmad

Hackers Break Into Police Computer | Australian Federal Police - 1 views

  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • ...15 more annotations...
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
  • Security consultants say police appear to have been using the computer as a honeypot to collect information on members of the forum but the scheme came undone after the officers forgot to set a password.
    • Salman Rushdi
       
      Security: Security consultants are involved therefore it is a security issue.
  • accessed both police evidence and intelligence about federal police systems such as its IP addresses.
    • Salman Rushdi
       
      IT SYS APPS: When they have access to police evidenceit includes images and recordings.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • The hacker wrote 'I couldn't stop laughing' on seeing that the federal police's server was running Windows, which is known among hacker communities for being insecure.
  • me came undone after the officers forgot to set a password. Last Wednesday, federal po
  • These included shots of files containing fake IDs and stolen credit card numbers, as well as the federal police's server information.
    • Salman Rushdi
       
      Politics: Govt information and files has been hacked. Against the law.
  • We can operate in a covert activity here fairly seamlessly with no harm to our members with continual and actual significant penetration,
  • the administrator of an underground hacking forum, r00t-y0u.org, which had about 5000 members.
  • These dipshits are using an automatic digital forensics and incident response tool,
Shih-Chen Chiu

Wallet of the future? Your mobile phone - CNN.com - 0 views

  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
  • Some analysts say that within five years, mobile phones in the United States will be able to make electronic payments, open doors, access subways, clip coupons and possibly act as another form of identification.
    • Shih-Chen Chiu
       
      social& ethical issue -people and machines ITsystems in a social context -Applications -Integrated Systems Areas of impact -Business & employment -Scoence & the enviornment
  • ...4 more annotations...
  • And technology that turns phones into credit cards and IDs poses several potential problems.
    • Shih-Chen Chiu
       
      social & ethical issues -security -authenticity -integrity -control
  • In the late 1990s and early 2000s, banks and cell phone makers started conducting trials with U.S. customers. Limited groups of people were given the ability to scan their phones to make payments, enter stadiums and access public transit.
    • Shih-Chen Chiu
       
      areas of impact -business & employment
  • If phones replace wallets, would-be thieves will see every person walking down the street talking on his or her phone as a target for robbery, said Lillie Coney, associate director of the Electronic Privacy Information Center.
    • Shih-Chen Chiu
       
      social & ethical issues -security
  • Eye scans and fingerprints would make phone IDs and payments more secure, Brown said. The ID technology might work like a corporate security badge, which pulls up personal information when scanned.
    • Shih-Chen Chiu
       
      social & ethical issues -reliability -security -integrity -privacy IT systems in a social context hardware integrated systems
anonymous

TLS (Transport Layer Security) - (Wikipedia) - 0 views

  •  
    An overview of TTS (transport layer security) and it has changed from the orginal one, SSL (Secure Sockets Layer). TLS is the standard track protocol, that was based on the earlier SSL specifications developed by Netscape corporation
Chalana Perera

Exploiting Browser Information & Privacy - 0 views

  • easy it was to exploit security loopholes
    • Chalana Perera
       
      Easy exploitation leads to a lot of negative consequences and areas of impact include all sorts of education online, banking and financial reserves, businesses and mainstream market affairs, governmental and nongovernmental work and damage to personal information and biological/health data. This also harms intellectual property and ideas can be stolen online far easier than usual... reliability & security....
  • redirect traffic
    • Chalana Perera
       
      Redirecting internet connection or regular user traffic could lead to a backlog of information on the web and a loss of personal details and this again as huge areas of impact including security, reliability and extended impact on finances and personal details & anonymity....this also affects systems in the social context with networks being hacked and codes and enscriptions being changed..
  • access and steal any information exchanged
    • Chalana Perera
       
      Stealing information can also connect to software and the usage/creation tools of software and other application....communication systems are also greatly affected such as wire tapping systems
anonymous

Anti-Spam - (Security Focus) - 2 views

  •  
    Security overview of Spam, how to filter it and how to reduce it.
Maliha Rahman

loosing money through ebay - 0 views

  • But as these businesses have grown and gained popularity, security issues have also surfaced. Fears over identity theft, account theft, phishing (typically sending out fake e-mails that copy the appearance of trustworthy Web sites in order to dupe unsuspecting customers into giving out sensitive information) or buying faulty or broken products have always been a problem for eBay.
    • Maliha Rahman
       
      Fake, old, broken and unworthy products are sold on this site, making it an unreliable source.
    • Maliha Rahman
       
      (SOCIAL, Security) People sell items for twice the price and can also steal money from the credit cards issued on this site, in other words theft of identity and account which highly insecure and can also violate privacy.
  • the online auction site eBay.com is the perfect place to find a treasure trove of hard-to-find products and collectibles.
    • Maliha Rahman
       
      A communication system through which people purchase needed products and collectibles. (internet website)
  • One of a bidder's worst nightmares is spending lots of money on an item, only to receive the wrong product or nothing at all.
    • Maliha Rahman
       
      (Impact, Business) Ebay is mainly a site where people do their social/personal business, for example biding and buying clothes and shoes. This can be a great rip of because no one knows how good their purchasing item is. it causes a big loss in their own business
Chalana Perera

Large-scale Credit Card Fraud - 0 views

  • identity theft
    • Chalana Perera
       
      SOCIAL --> Privacy, Control & Security
  • internet and telephone transactions
    • Chalana Perera
       
      concerns/impacts networking systems but also social issues regarding privacy, loss of information and security & anonymity.
  • payment systems of retailers, including the 7-Eleven chain.
  • ...7 more annotations...
  • This is a fairly common way that fraudsters try to gain access to consumers' card details.
  • Once they find a weakness, they insert a specially designed code into the network that allows them to access card details.
  • "a pretty standard way" for fraudsters to try to access personal data.
  • any victim of fraud would "always be refunded in full".
  • corporate victims included Heartland Payment Systems - a card payment processor - convenience store 7-Eleven and Hannaford Brothers, a supermarket chain, t
  • ckers, is already in custody on separate charges of hacking into the computer systems
  • that online, telephone and mail order fraud were on the increase, along with fraud committed abroad
  •  
    Great article Chalana. :)
laila-hass

Cyber War - 60 Minutes - CBS News - 0 views

  •  
    Great video regarding all security aspects of technology, power grid dangers, hacking into Pentagon, etc
Elvira Russ

Effective Ways for Detecting Phishing S - 0 views

  •  
    Beginners guide to survive a phishing attempt. These simple methods for Detecting Phishing Scam Emails, will enhance your Internet Security.
Jeff Ratliff

Criminal hacker 'Iceman' gets 13 years (ComputerWorld) - 0 views

  •  
    A former security researcher turned criminal hacker has been sentenced to 13 years in federal prison for hacking into financial institutions and stealing credit card account numbers. Max Ray Butler, who used the hacker pseudonym Iceman, was sentenced Friday morning in U.S. District Court in Pittsburgh on charges of wire fraud and identity theft. In addition to his 13-year sentence, Butler will face five years of supervised release and must pay US$27.5 million in restitution to his victims, according to Assistant U.S. Attorney Luke Dembosky, who prosecuted the case for the federal government. Dembosky believes the 13 year sentence is the longest-ever handed down for hacking charges.
1 - 20 of 195 Next › Last »
Showing 20 items per page