tag:blogger.com,1999:blog-15916419749339324742024-03-13T14:05:24.393+12:00sobeq.orgcybersecurityUnknownnoreply@blogger.comBlogger537125tag:blogger.com,1999:blog-1591641974933932474.post-27424269949360959362013-12-14T06:39:00.003+12:002013-12-14T06:39:59.238+12:00Cybersecurity tweets<a class="twitter-timeline" data-widget-id="411565814282588160" href="https://twitter.com/search?q=cybersecurity">Tweets about "cybersecurity"</a><br />
<script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script><br />
<br />
<br />
<b><i>more news below</i></b><br />
<b><i><br />
</i></b> <a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a> <script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script><br />
<br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-89489117855773822572013-09-16T00:00:00.000+12:002013-09-16T00:00:02.543+12:00StartPage, Ixquick, Encryption<a href="https://www.ixquick.com/eng/press/pr-pfs.html">StartPage and Ixquick Deploy Newest Encryption Standards against Mass Surveillance</a>: "SSL encryption has been proven to be an effective tool for protecting sensitive online traffic from eavesdropping and surveillance. However, security researchers now worry that SSL encryption may not provide adequate protection if Government agencies are scooping up large amounts of encrypted traffic and storing it for later decryption.
With SSL alone, if a target website's "private key" can be obtained once in the future - perhaps through court order, social engineering, attack against the website, or cryptanalysis - that same key can then be used to unlock all other historical traffic of the affected website. For larger Internet services, that could expose the private data of millions of people.
StartPage and Ixquick have now deployed a defense against this known as "Perfect Forward Secrecy," or PFS." (read more at link above)<br />
<br />
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-27416553903462091802013-09-12T23:19:00.002+12:002013-09-12T23:19:30.027+12:00What It Means to Be An NSA Target<a href="https://www.eff.org/deeplinks/2013/07/what-it-means-be-target-or-why-we-once-again-stopped-believing-government-and-once" rel="nofollow" target="_blank">What It Means to Be An NSA "Target": New Information Shows Why We Need Immediate FISA Amendments Act Reform | Electronic Frontier Foundation</a>: "We’ve written before about the word games the government plays in describing its surveillance practices: “acquire,” “collect,” and “content” are all old government favorites. The New York Times report proves Feinstein statement is false, and it's clear it’s time to add “target” to the list of word games as well."<br />
<br />
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-74532099425037777852013-08-13T00:00:00.000+12:002013-08-13T00:00:04.662+12:00Booz Allen Hamilton Wins Major Integrated Cyber Operations Pillar Contract <a href="http://online.wsj.com/article/PR-CO-20130802-908767.html" rel="nofollow" target="_blank">Booz Allen Hamilton Wins Major Integrated Cyber Operations Pillar Contract to Support C4ISR, Cybersecurity Programs - WSJ.com</a>: "August 02, 2013-- Booz Allen Hamilton today announced it has now won four of the Full and Open Pillar contracts involving a range of full system lifecycle support activities for the Space and Naval Warfare Systems Center Atlantic (SCC Atlantic). Most recently, the firm won a contract with a total ceiling of nearly $900 million to support the integrated cybersecurity and Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance (C4ISR) operations of the Space and Naval Warfare Systems Center Atlantic (SCC Atlantic)."<br />
<br />
<a href="http://www.google.com/url?q=http://www.nasdaq.com/article/cyber-security-company-fireeye-files-for-a-175-million-ipo-cm264316&ct=ga&cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&cad=CAEYAA&usg=AFQjCNHwB5oVWyDrJ45e1CzE4teCDiil2A" rel="nofollow" target="_blank">Cyber security company FireEye files for a $175 million IPO</a><br />
NASDAQ<br />FireEye, which provides malware protection software to enterprises, filed on Friday with the SEC to raise up to $175 million in an initial public offering.<br />
<br /><a href="http://www.google.com/url?q=http://www.radioworld.com/article/we-need-a-dialogue-on-cyber-security/220655&ct=ga&cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&cad=CAEYAA&usg=AFQjCNEhmDXU1w6DnR8nNPclgeuk-ZzE6A" rel="nofollow" target="_blank">We Need a Dialogue on Cyber Security</a><br />
Radio World<br />Like it or not, cyber security will continue to be a fact of life for broadcasters and ... EAS systems for any potential indications of attack or unauthorized access.<br />
<div>
<br /></div>
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script><br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-12356859929836003322013-08-10T00:00:00.000+12:002013-08-10T00:00:04.190+12:00Cyber Security, Cyber Funding<a href="http://www.google.com/url?q=http://www.govtech.com/Cyber-Funding-Under-Our-Noses.html&ct=ga&cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&cad=CAEYAA&usg=AFQjCNE9RMuTowDtF0AREZot2CemZdeBWg" rel="nofollow" target="_blank">Cyber Funding Under Our Noses</a><br />
Government Technology<br />The recent leaks detailing the U.S. National Security Agency's extensive monitoring ... development for state and local governments and our overall cyber health.<br /><img src="http://t2.gstatic.com/images?q=tbn:ANd9GcTww0TeHoY_sqSI5IrjOxlg2K99kjEsCBmd2eO2argBsjI2WGtl8edQ_yx52A" /><br />Government Technology<br /><br /><a href="http://www.google.com/url?q=http://www.metrocorpcounsel.com/articles/24691/tensions-and-overlaps-between-cyber-and-data-security&ct=ga&cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&cad=CAEYAA&usg=AFQjCNHOSR32YUmT61I9cSYw2prPspwmag">The Tensions And Overlaps Between Cyber And Data Security</a><br />
Metropolitan Corporate Counsel<br />The U.S. Food and Drug Administration (FDA) warns about the risk of cyber attacks on medical devices. The White House is implementing an Executive Order ...<br />
<br /><a href="http://www.google.com/url?q=http://www.scmagazine.com/defcon-former-dhs-cyber-official-to-private-sector-govt-cant-help-you-with-intelligence/article/305953/&ct=ga&cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&cad=CAEYAA&usg=AFQjCNFUWd39nExTULvCh-U-pHJlnmvzEw">DefCon: Former DHS cyber official to private sector: Gov't can't help ...</a><br />
SC Magazine<br />The former deputy undersecretary for cyber security at the Department of ... can't act quickly enough to help private companies defend against a possible attack.<br />
<br /><a href="http://www.google.com/url?q=http://www.echopress.com/event/article/id/106572/group/homepage/&ct=ga&cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&cad=CAEYAA&usg=AFQjCNGUJ_SWZdntFNzHVk1bdCQafTuGaQ">Klobuchar wants to reduce risk of cyber attacks to infrastructure</a><br />
Alexandria Echo Press<br />The Cybersecurity Act of 2013 aims to help secure the nation from cyber threats by providing NIST, a non-regulatory agency within the Department of Commerce ...<br />
<br /><a href="http://www.google.com/url?q=http://crave.cnet.co.uk/software/bt-and-vodafone-helped-uk-cyber-spying-effort-report-claims-50011883/&ct=ga&cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&cad=CAEYAA&usg=AFQjCNHv-QaO9C6TcgqEWlcvDdVCvuD-bQ">BT and Vodafone helped UK cyber-spying effort, report claims</a><br />
CNET UK<br />Snowden is a former National Security Agency (NSA) contractor who leaked the US ... Questions related to national security are a matter for governments not ...<br /><img src="http://t3.gstatic.com/images?q=tbn:ANd9GcRsjcTr2XHBcaS0H-fqHiGYDj92bc7m5CXm0tfmbGwzRJpPZFyIJ0NKVu8TPw" /><br />CNET UK<br />
<br /><b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script><br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-2089379447040134302013-08-08T00:00:00.000+12:002013-08-08T00:00:05.945+12:00Cybersecurity, Cybercrime<a href="http://www.google.com/url?q=http://economictimes.indiatimes.com/tech/internet/cyber-criminals-try-to-steal-fin-data-using-fake-tax-ads-mcafee/articleshow/21597866.cms&ct=ga&cd=OTEzMDYzMDMxMDU2MTI2NDk1MA&cad=CAEYAA&usg=AFQjCNFTpJDQKEZVGtVtcQv5ZUw--BaYfg" rel="nofollow" target="_blank">Cyber criminals try to steal fin data using fake tax ads: McAfee</a><br />
Economic Times<br />Cyber criminals are busy using phishing e-mails and fake ads to steal confidential financial data of users, cyber security firm McAfee said today. NEW DELHI: As ...<br /><img src="http://t1.gstatic.com/images?q=tbn:ANd9GcR0HeFzbRZ6kzREX7kKPevMTS-XCnDRIl6wTrZJt20qOvSrOqOWcgp0cx0" /><br />Economic Times<br /><br /><a href="http://www.google.com/url?q=http://www.fiercefinanceit.com/story/nasdaq-faces-huge-cyber-security-challenges/2013-08-01&ct=ga&cd=OTEzMDYzMDMxMDU2MTI2NDk1MA&cad=CAEYAA&usg=AFQjCNHjbcjwucs9ET2UstEChi_uoIVbzg">Nasdaq faces huge cyber-security challenges</a><br />
FierceFinanceIT<br />Nasdaq faces huge cyber-security challenges.... To be sure, all financial services companies are under attack these days. But the especially ...<br />
<br /><a href="http://www.google.com/url?q=http://leadership.ng/news/040813/uba-advocates-increased-cyber-security-vigilance-banks&ct=ga&cd=OTEzMDYzMDMxMDU2MTI2NDk1MA&cad=CAEYAA&usg=AFQjCNF7XpW7jLqQlSNGVqCj8PqzRYN1mQ">UBA Advocates Increased Cyber-security Vigilance By Banks</a><br />
Leadership Newspapers<br />UBA Advocates Increased Cyber-security Vigilance By Banks ... particular case, the probability of attack would be very high and the consequence, very severe.<br /><img src="http://t0.gstatic.com/images?q=tbn:ANd9GcQWDujU8je3TuoW535kyl3pnsH_msWnhHIgzj8WQIYXonAVXS34yEXOjKOAng" /><br />Leadership Newspapers<br /><br /><b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script><br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-81975758497330388672013-08-06T00:00:00.000+12:002013-08-06T00:00:07.284+12:00CEO concerns about malware attacks and cyber-espionage<a href="http://www.google.com/url?q=http://www.eweek.com/small-business/cyber-security-confidence-lacking-among-executives/&ct=ga&cd=MTM1MzAzMDgwNzg2NzkzNTc0Nzc&cad=CAEYAA&usg=AFQjCNFYvUnwhueaZGSNvxI1firKoq2rMA" target="_blank">Cyber-Security Confidence Lacking Among Executives</a><br />
eWeek<br />A whopping 97 percent of enterprises with annual security budgets totaling more than ... reported concerns about malware attacks and cyber-espionage tactics. ... in five say their biggest concern is not knowing whether an attack is underway, ...<br />
<br /><a href="http://www.google.com/url?q=http://www.abc.net.au/news/2013-07-29/calls-for-government-to-develop-a-cyber-security-white-paper/4850754&ct=ga&cd=MTM1MzAzMDgwNzg2NzkzNTc0Nzc&cad=CAEYAA&usg=AFQjCNEiYSxxt3PtURXRk1LU8Jb8knRD0A">Report recommends cyber-security white paper within a year</a><br />
ABC Online<br />A new report by the Australian Strategic Policy Institute recommends the incoming government develop a white paper focusing on the country's cyber-security ...<br />
<br /><a href="http://www.google.com/url?q=http://targetjobs.co.uk/graduate-jobs/jobs/324555-bae-systems-detica-graduate-cyber-security-consultant&ct=ga&cd=MTM1MzAzMDgwNzg2NzkzNTc0Nzc&cad=CAEYAA&usg=AFQjCNFZk4-1ZDaMsBPr-ZdZrPJr_0s7HA">Graduate Cyber Security Consultant</a><br />
TARGETjobs<br />We are looking for talented Graduates to join BAE Systems Detica's Cyber Security Business Unit (BU). The Cyber Security BU supports our clients to identify, ...<br />
<br /><a href="http://www.google.com/url?q=http://www.afr.com/p/technology/cyber_and_security_of_nbn_emerging_z5XhDhlYbUDj4G9jncQM8J&ct=ga&cd=MTM1MzAzMDgwNzg2NzkzNTc0Nzc&cad=CAEYAA&usg=AFQjCNFdFzLmoo41wPAuZEk8zLYQCKPU2g">Cyber and security of NBN emerging as election issues</a><br />
The Australian Financial Review<br />“It's disappointing Australia doesn't have a national cyber security policy,” the institute's Tobias Feakin said. “This directly weakens our ability to respond to and ...<br />
<br /><b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script><br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-44829430652003677132013-08-03T00:00:00.000+12:002013-08-03T00:00:12.160+12:00Malware, Botnets<a href="http://www.staysafeonline.org/stay-safe-online/keep-a-clean-machine/malware-and-botnets" rel="nofollow" target="_blank">Malware & Botnets | StaySafeOnline.org</a>: "MALWARE & BOTNETS
The Internet is a powerful and useful tool, but in the same way that you shouldn’t drive without buckling your seat belt or ride a bike without a helmet, you shouldn’t venture online without taking some basic precautions."<br />
<br />
<b>Viruses</b><br />
<div>
Viruses are harmful computer programs that can be transmitted in a number of ways. Although they differ in many ways, all are designed to spread themselves from one computer to another through the Internet and cause havoc. Most commonly, they are designed to give the criminals who create them some sort of access to those infected computers.<br />
<br />
<b>Spyware</b></div>
<div>
The terms "spyware" and "adware" apply to several different technologies. The two important things to know about them is that:<br />
<ul>
<li>They can download themselves onto your computer without your permission (typically when you visit an unsafe website or via an attachment)</li>
<li>They can make your computer do things you don't want it to do. That might be as simple as opening an advertisement you didn't want to see. In the worst cases, spyware can track your online movements, steal your passwords and compromise your accounts.</li>
</ul>
</div>
<div>
<b>Botnets</b></div>
<div>
Botnets are networks of computers infected by malware (computer virus, key loggers and other malicious software) and controlled remotely by criminals, usually for financial gain or to launch attacks on website or networks.<br />
<br />
If your computer is infected with botnet malware, it communicates and receives instructions about what it’s supposed to do from “command and control” computers located anywhere around the globe. What your computer does depends on what the cybercriminals are trying to accomplish. <br />
<br />
Many botnets are designed to harvest data, such as passwords, social security numbers, credit card numbers, addresses, telephone numbers, and other personal information. The data is then used for nefarious purposes, such as identity theft, credit card fraud, spamming (sending junk email), website attacks, and malware distribution. For more information on botnets, visit the <a href="http://stopthinkconnect.org/campaigns/keep-a-clean-machine/">STOP. THINK. CONNECT. Keep a Clean Machine Campaign.</a><br />
<br />
Protect Yourself with these STOP. THINK. CONNECT. Tips:<br />
<ul>
<li>Keep a Clean Machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.</li>
<li>When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.</li>
<li>Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware.</li>
<li>Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them.</li>
</ul>
<br />
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a><br />
<br /></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-33838190410295450562013-08-01T00:00:00.000+12:002016-08-13T23:10:09.006+12:00Spam, Phishing<a href="http://www.staysafeonline.org/stay-safe-online/keep-a-clean-machine/spam-and-phishing" rel="nofollow" target="_blank">Spam & Phishing | StaySafeOnline.org</a>: "Cybercriminals have become quite savvy in their attempts to lure people in and get you to click on a link or open an attachment."<br />
<br />
The email they send can look just like it comes from a financial institution, e-commerce site, government agency or any other service or business. <br />
<br />
It often urges you to act quickly, because your account has been compromised, your order cannot be fulfilled or another matter. <br />
<br />
If you are unsure whether an email request is legitimate, try to verify it with these steps:<br />
<ul>
<li>Contact the company directly.</li>
<li>Contact the company using information provided on an account statement or back of a credit card.</li>
<li>Search for the company online – but not with information provided in the email.</li>
<li>SpamSpam is the electronic equivalent of junk mail. The term refers to unsolicited, bulk – and often unwanted – email.</li>
</ul>
Here are ways to reduce spam:<br />
<ul>
<li>Enable filters on your email programs: Most ISPs (Internet Service Providers) and email providers offer spam filters. However, depending on the level you set, you may wind up blocking emails you want. It’s a good idea to occasionally check your junk folder to ensure the filters are working properly.</li>
<li>Report spam: Most email clients offer ways to mark an email as spam or report instances of spam. Reporting spam will also help to prevent the messages from being directly delivered to your inbox.</li>
<li>Own your online presence: Consider hiding your email address from online profiles and social networking sites or only allowing certain people to view your personal information.</li>
</ul>
<br />
<br />
PhishingPhishing attacks use email or malicious websites (clicking on a link) to collect personal and financial information or infect your machine with malware and viruses.<br />
<br />
Spear PhishingSpear phishing is highly specialized attacks against a specific target or small group of targets to collect information of gain access to systems.<br />
<br />
For example, a cybercriminal may launch a spear phishing attack against a business to gain credentials to access a list of customers. From that attack, they may launch a phishing attack against the customers of the business. Since they have gained access to the network, the email they send may look even more authentic and because the recipient is already customer of the business, the email may more easily make it through filters and the recipient maybe more likely to open the email.<br />
<br />
The cybercriminal can use even more devious social engineering efforts such as indicating there is an important technical update or new lower pricing to lure people.<br />
<br />
Spam & Phishing on Social NetworksSpam, phishing and other scams aren’t limited to just email. They’re also prevalent on social networking sites. The same rules apply on social networks: When in doubt, throw it out. This rule applies to links in online ads, status updates, tweets and other posts.<br />
<br />
Here are ways to report spam and phishing on social networks:<br />
<ul>
<li><a href="https://www.facebook.com/help/?faq=%20205730929485170&in_context" rel="nofollow" target="_blank">Reporting spam and phishing on Facebook</a> </li>
<li><a href="http://support.twitter.com/groups/33-report-a-violation/topics/122-reporting-violations/articles/64986-how-to-report-spam-on-twitter" rel="nofollow" target="_blank">Reporting spam on Twitter </a></li>
<li><a href="http://support.google.com/youtube/bin/request.py?contact_type=abuse&hl=en-US" rel="nofollow" target="_blank">Reporting spam and phishing on YouTube</a></li>
</ul>
How Do You Avoid Being a Victim?<br />
<ul>
<li>Don’t reveal personal or financial information in an email, and do not respond to email solicitations for this information. This includes following links sent in email.</li>
<li>Before sending sensitive information over the Internet, check the security of the website.</li>
<li>Pay attention to the website's URL. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com versus .net).</li>
<li>If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Contact the company using information provided on an account statement, not information provided in an email. Information about known phishing attacks is available online from groups such as the <a href="http://www.apwg.org/" rel="nofollow" target="_blank">Anti-Phishing Working Group</a>.</li>
<li>Keep a clean machine. Install and maintain anti-virus software, firewalls, and email filters to reduce spam.</li>
</ul>
<br />
What to Do if You Think You are a Victim?<br />
<ul>
<li>Report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity.</li>
<li>If you believe your financial accounts may be compromised, contact your financial institution immediately and close the account(s).</li>
<li>Watch for any unauthorized charges to your account.</li>
<li>Consider reporting the attack to your local police department, and file a report with the <a href="http://www.onguardonline.gov/phishing#report%20phishing%20emails" rel="nofollow" target="_blank">Federal Trade Commission</a> or the <a href="http://www.ic3.gov/" rel="nofollow" target="_blank">FBI's Internet Crime Complaint Center</a>.</li>
</ul>
<br />
Additional Resources:<br />
<ul>
<li><a href="http://apwg.org/consumer_recs.html" rel="nofollow" target="_blank">Anti-Phishing Working Group</a></li>
<li><a href="http://www.us-cert.gov/cas/tips/ST04-014.html" rel="nofollow" target="_blank">United States Computer Emergency Readiness Team (US-CERT)</a></li>
</ul>
Protect Yourself with these STOP. THINK. CONNECT. Tips:<br />
<ul>
<li>When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.</li>
<li>Think before you act: Be wary of communications that implores you to act immediately, offers something that sounds too good to be true, or asks for personal information.</li>
<li>Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site.</li>
<li>Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.</li>
<li>Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals</li>
</ul>
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a><br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-87849188744160040212013-07-30T00:00:00.000+12:002013-07-30T00:00:04.359+12:00Hacked Accounts, what to do<a href="http://www.staysafeonline.org/stay-safe-online/keep-a-clean-machine/hacked-accounts" rel="nofollow" target="_blank">Hacked Accounts | StaySafeOnline.org</a>:<br />
<br />
If your account has been compromised or hacked, here are ways to regain control.<br />
<br />
How do I know if my email or social network account has been hacked?<br />
<ul>
<li>There are posts you never made on your social network page. These posts often encourage your friends to click on a link or download an App.</li>
<li>A friend, family member or colleague reports getting email from you that you never sent.</li>
<li>Your information was lost via a data breach, malware infection or lost/stolen device.</li>
</ul>
<br />
If you believe an account has been compromised, take the following steps:<br />
<ul>
<li>Notify all of your contacts that they may receive spam messages that appear to come from your account. Tell your contacts they shouldn’t open messages or click on any links from your account and warn them about the potential for malware.</li>
<li>If you believe your computer is infected, be sure your security software is up to date and scan your system for malware. You can also use other scanners and removal tools.</li>
<li>Change passwords to all accounts that have been compromised and other key accounts ASAP. Remember, passwords should be long and strong and use a mix of upper and lowercase letters, and numbers and symbols. You should have a unique password for each account.</li>
</ul>
If you cannot access your account because a password has been changed, contact the web service immediately and follow any steps they have for recovering an account.<br />
<br />
Here are some resources:<br />
<br />
eBay<br />
<a href="http://pages.ebay.com/help/account/unwanted-email.html">Help with eBay mail violations</a><br />
<a href="http://pages.ebay.com/help/account/securing-account.html">Help with a hacked account</a><br />
<a href="http://pages.ebay.com/help/buy/report-trading.html">Help with inappropriate trading</a><br />
<a href="http://pages.ebay.com/securitycenter/index.html">eBay Security Center</a><br />
<br />
PayPal<br />
<a href="https://cms.paypal.com/us/cgi-bin/marketingweb?cmd=_render-content&content_ID=security/suspicious_activity#email_from_paypal">Help with suspicious emails</a><br />
<a href="https://cms.paypal.com/us/cgi-bin/?cmd=_render-content&content_ID=security/report_problem">Help with a hacked account </a><br />
<a href="https://cms.paypal.com/us/cgi-bin/marketingweb?cmd=_render-content&content_ID=security/online_security_center%20%20">PayPal Security and Protection Center</a><br />
<br />
Facebook<br />
<a href="http://www.facebook.com/help/?page=798">Help with cyberbullying and impostor profiles</a><br />
<a href="http://www.facebook.com/#%21/help/?page=420">Help with a hacked account</a><br />
<a href="http://www.facebook.com/help/">Facebook Help Center</a><br />
<br />
Gmail/Google<br />
<a href="https://mail.google.com/support/bin/answer.py?answer=50270&cbid=1uslv13hx7tyw&src=cb&lev=answer">Help with a hacked account</a><br />
<a href="https://www.google.com/support/accounts/bin/request.py?ara=1&hl=en&contact_type=ara&ctx=ara">Help with an inaccessible account</a><br />
<a href="https://support.google.com/mail/?hl=en">General safety tips</a><br />
<br />
Twitter<br />
<a href="http://www.staysafeonline.org/_admin/pages/body/%20https:/support.twitter.com/groups/33-report-a-violation/topics/122-reporting-violations/articles/31796-my-account-has-been-compromised">Help with a hacked account</a><br />
<a href="https://support.twitter.com/groups/33-report-a-violation/topics/122-reporting-violations/articles/185703-my-account-is-compromised-hacked-and-i-can-t-log-in">Help with an inaccessible account</a><br />
<a href="http://www.staysafeonline.org/_admin/pages/body/%20https:/support.twitter.com/groups/33-report-a-violation/topics/166-safety-center/articles/76036-safety-keeping-your-account-secure">Twitter Safety Center</a><br />
<br />
Yahoo<br />
<a href="https://edit.yahoo.com/forgotroot/">Help with a hacked account </a><br />
<a href="http://help.yahoo.com/kb/index;_ylt=ArcKMoEOSzm64SJVDhLYNGQHjSN4?locale=en_US&y=PROD_ACCT&page=content&id=SLN3417%20%20">What to do if your account is sending spam</a><br />
<a href="http://abuse.yahoo.com/">Help Center</a><br />
<br />
Hotmail<br />
<a href="http://windows.microsoft.com/en-US/hotmail/hacked-account-faq">Help with a hacked account</a><br />
<a href="http://windows.microsoft.com/en-US/hotmail/account-temporarily-blocked-faq">Help with an inaccessible account</a><br />
<a href="http://windows.microsoft.com/en-US/hotmail/help-center">Hotmail Help Center</a><br />
<br />
YouTube<br />
<a href="http://www.google.com/support/youtube/bin/answer.py?hl=en&answer=126266">Help with cyberbullying</a><br />
<a href="http://www.google.com/support/youtube/bin/answer.py?answer=83544">Help with flagging a spam-based video</a><br />
<a href="http://www.google.com/support/youtube/bin/answer.py?hl=en&answer=76187">Help with a hacked account</a><br />
<a href="http://support.google.com/youtube/bin/request.py?hl=en&contact_type=abuse&rd=1">YouTube Safety Center</a><br />
<br />
Protect Yourself with these STOP. THINK. CONNECT. Tips:<br />
<ul>
<li>Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.</li>
<li>Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.</li>
<li>Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals.</li>
<li>When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.</li>
</ul>
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a><br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-87357754307396138552013-07-27T00:00:00.000+12:002013-07-27T00:00:00.088+12:00ID Theft and Fraud: If you become a victim of cybercrime<a href="http://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/id-theft-and-fraud" rel="nofollow" target="_blank">ID Theft & Fraud | StaySafeOnline.org</a>: "ID THEFT, FRAUD & VICTIMS OF CYBERCRIME"*<br />
<br />
If you're the victim of cybercrime, you need to know what to do and respond quickly.<br />
<br />
The Realities of Cybercrime<br />
When dealing with cybercrime, an ounce of prevention is truly worth a pound of cure. Cybercrime in all its many forms (e.g., online identity theft, financial fraud, stalking, bullying, hacking, e-mail spoofing, information piracy and forgery, intellectual property crime, and more) can, at best, wreak havoc in victims’ lives through major inconvenience and annoyance. At worst, cybercrime can lead to financial ruin and potentially threaten a victim’s reputation and personal safety.<br />
<br />
It’s always wise to do as much as possible to prevent cybercrime.<br />
<br />
One of the best ways to learn how to prevent cybercrime is to check out STOP. THINK. CONNECT. at <a href="http://stopthinkconnect.org/tips-and-advice/" rel="nofollow" target="_blank">http://stopthinkconnect.org/tips-and-advice/.</a><br />
<br />
But, despite our best efforts, our increasingly digital lives may put us in harm’s way. The fact remains that the bad guys continue to find new uses for ever-expanding—but easily accessible—online technologies to steal, harass, and commit all sorts of crime. If cybercrime happens to you, you need to know what to do and to respond quickly.<br />
<br />
Should I Report Cybercrime?<br />
Cybercrime can be particularly difficult to investigate and prosecute because it often crosses legal jurisdictions and even international boundaries. And, many offenders disband one online criminal operation—only to start up a new activity with a new approach—before an incident even comes to the attention of the authorities.<br />
<br />
The good news is that federal, state, and local law enforcement authorities are becoming more sophisticated about and devoting more resources to responding to cybercrime. Furthermore, over the past several years, many new anti-cybercrime statutes have been passed empowering federal, state, and local authorities to investigate and prosecute these crimes. But, law enforcement needs your help to stop the nefarious behavior of cyber criminals and bring them to justice.<br />
<br />
Who to contact:<br />
<ul>
<li>Local law enforcement. Even if you have been the target of a multijurisdictional cybercrime, your local law enforcement agency (either police department or sheriff’s office) has an obligation to assist you, take a formal report, and make referrals to other agencies, when appropriate. Report your situation as soon as you find out about it. Some local agencies have detectives or departments that focus specifically on cybercrime.</li>
<li>IC3. The Internet Crime Complaint Center (IC3) will thoroughly review and evaluate your complaint and refer it to the appropriate federal, state, local, or international law enforcement or regulatory agency that has jurisdiction over the matter. IC3 is a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center (funded, in part, by the Department of Justice’s Bureau of Justice Assistance). Complaints may be filed online at <a href="http://www.ic3.gov/default.aspx">http://www.ic3.gov/default.aspx</a>.</li>
<li>Federal Trade Commission. The FTC does not resolve individual consumer complaints, but does operate the Consumer Sentinel, a secure online database that is used by civil and criminal law enforcement authorities worldwide to detect patterns of wrong-doing, leading to investigations and prosecutions. File your complaint at <a href="https://www.ftccomplaintassistant.gov/FTC_Wizard.aspx?Lang=en">https://www.ftccomplaintassistant.gov/FTC_Wizard.aspx?Lang=en</a>. Victims of identity crime may receive additional help through the FTC hotline at 1-877-IDTHEFT (1-877-438-4388); the FTC website at<a href="http://www.ftc.gov/IDTheft">www.ftc.gov/IDTheft</a> provides resources for victims, businesses, and law enforcement.</li>
<li>Your Local Victim Service Provider. Most communities in the United States have victim advocates ready to help following a crime. They can provide information, emotional support and advocacy as needed. Find local victims service providers here: <a href="http://ovc.ncjrs.gov/findvictimservices/search.asp">http://ovc.ncjrs.gov/findvictimservices/search.asp</a></li>
</ul>
<br />
Collect and Keep Evidence<br />
Even though you may not be asked to provide evidence when you first report the cybercrime, it is very important to keep any evidence you may have related to your complaint. Keep items in a safe location in the event you are requested to provide them for investigative or prosecutive evidence. Evidence may include, but is not limited to, the following:<br />
<ul>
<li>Canceled checks</li>
<li>Certified or other mail receipts</li>
<li>Chatroom or newsgroup text</li>
<li>Credit card receipts</li>
<li>Envelopes (if you received items via FedEx, UPS, or U.S. Mail)</li>
<li>Facsimiles</li>
<li>Log files, if available, with date, time and time zone</li>
<li>Messages from Facebook, Twitter or other social networking sites</li>
<li>Money order receipts</li>
<li>Pamphlets or brochures</li>
<li>Phone bills</li>
<li>Printed or preferably electronic copies of emails (if printed, include full email header information)</li>
<li>Printed or preferably electronic copies of web pages</li>
<li>Wire receipts</li>
</ul>
<br />
Additional Tips for Specific Types of CybercrimeOnce you discover that you have become a victim of cybercrime, your response will depend, to some degree, on the type and particular circumstances of the crime. Here are useful tips to follow for some specific types of cybercrimes:<br />
<br />
In cases of identity theft:<br />
Make sure you change your passwords for all online accounts. When changing your password, make it long, strong and unique, with a mix of upper and lowercase letters, numbers and symbols. You also may need to contact your bank and other financial institutions to freeze your accounts so that the offender is not able to access your financial resources.<br />
Close any unauthorized or compromised credit or charge accounts. Cancel each credit and charge card. Get new cards with new account numbers. Inform the companies that someone may be using your identity, and find out if there have been any unauthorized transactions. Close accounts so that future charges are denied. You may also want to write a letter to the company so there is a record of the problem.<br />
Think about what other personal information may be at risk. You may need to contact other agencies depending on the type of theft. For example, if a thief has access to your Social Security number, you should contact the Social Security Administration. You should also contact your state Department of Motor Vehicles if your driver's license or car registration are stolen.<br />
File a report with your local law enforcement agency. Even if your local police department or sheriff’s office doesn’t have jurisdiction over the crime (a common occurrence for online crime which may originate in another jurisdiction or even another country), you will need to provide a copy of the law enforcement report to your banks, creditors, other businesses, credit bureaus, and debt collectors.<br />
If your personal information has been stolen through a corporate data breach (when a cyberthief hacks into a large database of accounts to steal information, such as Social Security numbers, home addresses, and personal email addresses), you will likely be contacted by the business or agency whose data was compromised with additional instructions, as appropriate. You may also contact the organization’s IT security officer for more information.<br />
If stolen money or identity is involved, contact one of the three credit bureaus to report the crime (Equifax at 1-800-525-6285, Experian at 1-888-397-3742, or TransUnion at 1-800-680-7289). Request that the credit bureau place a fraud alert on your credit report to prevent any further fraudulent activity (such as opening an account with your identification) from occurring. As soon as one of the bureaus issues a fraud alert, the other two bureaus are automatically notified.<br />
<br />
For additional resources, visit the Identity Theft Resource Center at <a href="http://www.idtheftcenter.org/">www.idtheftcenter.org</a>or the Federal Trade Commission at<a href="http://www.ftc.gov/bcp/edu/microsites/idtheft/tools.html">http://www.ftc.gov/bcp/edu/microsites/idtheft/tools.html</a>. <br />
<br />
In cases of Social Security fraud:<br />
If you believe someone is using your social security number for employment purposes or to fraudulently receive Social Security benefits, contact the Social Security Administration’s fraud hotline at 1-800-269-0271. Request a copy of your social security statement to verify its accuracy.<br />
<br />
For additional resources, visit the Social Security Administration at<a href="http://oig.ssa.gov/report-fraud-waste-or-abuse">http://oig.ssa.gov/report-fraud-waste-or-abuse</a>.<br />
<br />
In cases of online stalking:<br />
In cases where the offender is known, send the stalker a clear written warning saying the contact is unwanted and asking that the perpetrator cease sending communications of any kind. Do this only once and do not communicate with the stalker again (Ongoing contact usually only encourages the stalker to continue the behavior).<br />
Save copies of all communication from the stalker (e.g., emails, threatening messages, messages via social media) and document each contact, including dates, times and additional circumstances, when appropriate.<br />
File a complaint with the stalker’s Internet Service Provider (ISP) and yours. Many ISPs offer tools that filter or block communications from specific individuals.<br />
Own your online presence. Set security and privacy settings on social networks and other services to your comfort level of sharing.<br />
Consider changing your email address and ISP; use encryption software or privacy protection programs on your computer and mobile devices. (You should consult with law enforcement before changing your email account. It can be beneficial to the investigation to continue using the email account so law enforcement can also monitor communication.)<br />
File a report with local law enforcement or contact your local prosecutor’s office to see what charges, if any, can be pursued. Stalking is illegal in all 50 states and the District of Columbia.<br />
<br />
For additional resources, visit the Stalking Resource Center at <a href="http://www.ncvc.org/src">www.ncvc.org/src</a>.<br />
<br />
In cases of cyberbullying:<br />
<ul>
<li>Tell a trusted adult about what’s going on.</li>
<li>Save any of the related emails, texts, or messages as evidence.</li>
<li>Keep a record of incidents.</li>
<li>Report the incident to the website’s administrator; many websites including Facebook and YouTube encourage users to report incidents of cyberbullying.</li>
<li>Block the person on social networks and in email.</li>
<li>Avoid escalating the situation: Responding with hostility is likely to provoke a bully. Depending on the circumstances, consider ignoring the issue. Often, bullies thrive on the reaction of their victims. If you or your child receives unwanted email messages, consider changing your email address. The problem may stop. If you continue to get messages at the new account, you may have a strong case for legal action.</li>
<li>If the communications become more frequent, the threats more severe, the methods more dangerous and if third-parties (such as hate groups and sexually deviant groups) become involved—the more likely law enforcement needs to be contacted and a legal process initiated.</li>
</ul>
<br />
For more information, visit <a href="http://www.stopcyberbullying.org/">www.stopcyberbullying.org</a> and <a href="http://www.ncpc.org/cyberbullying">www.ncpc.org/cyberbullying</a>.<br />
<br />
How Did This Happen To Me? A Word about Malware.Many cybercrimes start with malware—short for “malicious software.” Malware includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent—you may have downloaded the malware without even realizing it! These programs can cause your device to crash and can be used to monitor and control your online activity. Criminals use malware to steal personal information and commit fraud. If you think your computer has malware, you can file a complaint with the Federal Trade Commission at <a href="http://www.ftc.gov/complaint">www.ftc.gov/complaint</a>.<br />
<br />
Avoid malware with the following tips from the STOP. THINK. CONNECT. campaign:<br />
Keep a clean machine by making sure your security software, operating system and web browser are up to date.<br />
When in doubt throw it out. Don’t click on any links or open attachments unless you trust the source.<br />
Make your passwords long and strong and unique. Combine capital and lowercase letters with numbers and symbols to create a more secure password. Use a different password for each account.<br />
Set your browser security high enough to detect unauthorized downloads.<br />
Use a pop-up blocker (the links in pop-up ads are notorious sources of malware).<br />
Back up your data regularly (just in case your computer crashes).<br />
Protect all devices that connect to the Internet. Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from malware.<br />
Make sure all members of your family follow these safety tips (one infected computer on a home network can infect other computers).<br />
<br />
Other Places to Find Resources or File a Complaint:<br />
<ul>
<li>Anti-Phishing Working Group (<a href="https://mail.google.com/mail/?view=cm&fs=1&tf=1&to=reportphishing@antiphishing.org">reportphishing@antiphishing.org</a>)</li>
<li>Better Business Bureau (investigates disagreements between businesses and customers; <a href="https://www.bbb.org/consumer-complaints/file-a-complaint/get-started">https://www.bbb.org/consumer-complaints/file-a-complaint/get-started</a>)</li>
<li>CyberTipLine, operated by the National Center for Missing & Exploited Children (investigates cases of online sexual exploitation of children; 1-800-843-5678 or <a href="http://www.cybertipline.com/">www.cybertipline.com</a>)</li>
<li>Electronic Crimes Task Forces and Working Groups (<a href="http://www.secretservice.gov/ectf.shtml">http://www.secretservice.gov/ectf.shtml</a>)</li>
<li>The Secret Service (investigates fraudulent use of currency;<a href="http://www.secretservice.gov/field_offices.shtml">http://www.secretservice.gov/field_offices.shtml</a>)</li>
<li>StopFraud.Gov Victims of Fraud Resources (<a href="http://www.stopfraud.gov/victims.html">http://www.stopfraud.gov/victims.html</a>)</li>
<li>U.S. Computer Emergency Readiness Team (<a href="http://www.us-cert.gov/">www.us-cert.gov</a>)</li>
<li>U.S. Department of Justice (<a href="http://www.justice.gov/criminal/cybercrime">www.justice.gov/criminal/cybercrime</a>)</li>
<li>U.S. Postal Inspection Service (investigates fraudulent on-line auctions and other cases involving the mail;<a href="https://postalinspectors.uspis.gov/contactus/filecomplaint.aspx">https://postalinspectors.uspis.gov/contactus/filecomplaint.aspx</a>)</li>
<li>Your State Attorney General (the National Association of Attorneys General keeps a current contact list at <a href="http://www.naag.org/current-attorneys-general.php">http://www.naag.org/current-attorneys-general.php</a>)</li>
<li>Ways to Prevent CybercrimeMany cybercrimes start with malware. Criminals use malware to steal personal information and commit fraud. </li>
</ul>
Avoid malware with these STOP. THINK. CONNECT. Tips:<br />
<ul>
<li>Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.</li>
<li>Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option.</li>
<li>Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware.</li>
<li>Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them.</li>
<li>Protect your $: When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “Http://” is not secure.</li>
<li>Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely.</li>
</ul>
Additional Resources:<br />
<ul>
<li><a href="http://www.ftc.gov/bcp/edu/microsites/idtheft/tools.html.">Federal Trade Commission: Identity Theft Tools</a></li>
<li><a href="http://www.identitytheftassistance.org/">Identity Theft Assistance Center</a></li>
<li><a href="http://www.idtheftcenter.org%20/">Identity Theft Resource Center </a></li>
<li><a href="http://www.ic3.gov/default.aspx">Internet Crime Complaint Center</a></li>
<li><a href="http://www.naag.org/current-attorneys-general.php">National Association of Attorneys General </a></li>
<li><a href="http://oig.ssa.gov/report-fraud-waste-or-abuse">Social Security Administration: Report Fraud, Waste or Abuse</a></li>
<li><a href="http://www.stopfraud.gov/victims.html">StopFraud.Gov Financial Fraud Enforcement Task Force</a></li>
</ul>
<i>*<a href="http://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/id-theft-and-fraud" target="_blank">The National Cyber Security Alliance </a>would like to thank the National Sheriffs’ Association and International Association of Chiefs of Police for their assistance in creating this resource. </i><br />
<br />
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-15099823614447449782013-07-25T00:00:00.000+12:002013-07-25T00:00:05.051+12:00Passwords and Securing Your Accounts<a href="http://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/passwords-and-securing-your-accounts">Passwords & Securing Your Accounts | StaySafeOnline.org</a>: " PASSWORDS & SECURING YOUR ACCOUNTS - Passwords are like keys to your personal home online. You should do everything you can prevent people from gaining access to your password. You can also further secure your accounts by using additional authentication methods."<br />
<br />
Passwords<br />
<div>
When creating a password, make sure it is long and strong, with a minimum of eight characters and a mix of upper and lowercase letters, numbers and symbols. <br />
<br />
You should also remember to:<br />
<ul>
<li>Not share your password with others.</li>
<li>Make your password unique to your life and not something that is easily guessed.</li>
<li>Have a different password for each online account.</li>
<li>Write down your password and store it in a safe place away from your computer.</li>
<li>Change your password several times a year. </li>
</ul>
Other Ways to Secure an Account -Typing a username and password into a website isn't the only way to identify yourself on the web services you use.<br />
<div>
<ul>
<li>Multi-factor authentication uses more than one form of authentication to verify an identity. Some examples are voice ID, facial recognition, iris recognition and fingerscanning. </li>
<li>Two-factor authentication uses a username and passowrd and another form of identifcation, often times a security code. Over time, more websites will be adopting multi-factor authentication. In some cases, the services may be available, but are not required. </li>
</ul>
Many email services offer two-step verification on an opt-in basis. Ask your financial institution and other online services if they offer multi-factor authentication or additional ways to verify your identity. <br />
<br />
Additional Resources:<br />
<ul>
<li><a href="https://support.google.com/accounts/bin/answer.py?hl=en&topic=1056283&answer=180744&rd=1">Google: Two-step verification for Google accounts </a></li>
<li><a href="http://www.rsa.com/go/authtree/auth-index.htm">RSA: The Authentication Decision Tree</a></li>
<li><a href="http://www.us-cert.gov/cas/tips/ST04-002.html">US-CERT: Choosing and Protecting Passwords</a></li>
<li><a href="http://www.ymailblog.com/blog/2011/12/yahoo-introduces-stronger-user-authentication-%E2%80%93-second-sign-in-verification/">Yahoo!: Second Sign-In Verification for Yahoo! accounts</a> </li>
</ul>
</div>
<div>
STOP. THINK. CONNECT. Tips:<br />
<ul>
<li>Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site.</li>
<li>Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.</li>
<li>Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals.</li>
<li>Write it down and keep it safe: Everyone can forget a password. Keep a list that’s stored in a safe, secure place away from your computer.</li>
</ul>
</div>
<div>
<br />
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a></div>
</div>
<div>
<br /></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-91714430445289604032013-07-23T05:10:00.002+12:002013-07-23T05:10:36.410+12:00US Spy Chief Leading US Into Cyberwar<a href="http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/all/" rel="nofollow" target="_blank">NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar | Threat Level | Wired.com</a>:<i> "And he and his cyberwarriors have already launched their first attack. The cyberweapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material." (read more at link above)</i>
<br />
<i><br /></i>
<a href="http://www.pcmag.com/article2/0,2817,2421971,00.asp" rel="nofollow" target="_blank">U.K. to Probe Huawei Cyber-Security Center | News & Opinion | PCMag.com</a>: "The U.K. government will conduct a review of a cyber-security center run by Huawei to ensure that it is actually effective. The country's National Security Adviser will "carry out a review" of the center, which is known as the Cell, according to a new report from the U.K.'s Intelligence and Security Committee. The committee issued its report after Prime Minister David Cameron last month raised concerns in his own report to Parliament about Huawei's operations in the U.K."<br />
<br />
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-77062404449517522452013-07-20T00:00:00.000+12:002013-07-20T00:00:03.578+12:00Attackers hide code to thwart defenders<a href="http://www.darkreading.com/threat-intelligence/attackers-focus-on-increasing-defenders/240158154" rel="nofollow" target="_blank">How Attackers Thwart Malware Investigation -- Dark Reading</a>: <i>" . . . Yet if the attackers find better ways of hiding their code and making analysis more difficult for defenders, it could result is less intelligence on attackers tools and techniques, ThreatGRID's De Beer says. "Ultimately, all of these things can be decoded and decrypted and figured out over time, whether it be through dynamic or static means, but the goal on the attackers' side is to increase the workload to the extent where it becomes a very difficult thing to scale," De Beer says. "If you can't scale your analysis and you can't scale your ability to produce actionable content and threat intelligence, then they have an advantage over you at any point in time."" (read more at link above)</i><br />
<br />
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script><br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-32545113448771267862013-07-18T10:23:00.001+12:002013-07-18T10:23:07.137+12:00DDoS Attack Takes Down DNS Provider Network Solutions and Clients<a href="http://threatpost.com/ddos-attack-knocks-network-solutions-website-clients-offline/101374">DDoS Attack Takes Down DNS Provider Network Solutions | Threatpost</a>: "A distributed denial of service attack knocked the website of the domain name registrar Network Solutions LLC offline this morning and affected an unknown number of its clients’ sites as well.
Network Solutions announced on its Facebook page that it was experiencing a DDoS attack just before 11 a.m. EST, and then at 1:30 p.m. said the attack had been mitigated. Beyond that, the company has been relatively mum on the issue, angering its customers by failing to keep them adequately updated on its website and various social media channels."<br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-91442478324937477702013-07-18T00:00:00.000+12:002013-07-18T00:00:09.901+12:00Emergency Alert System Vulnerable to Hackers<a href="http://www.pcmag.com/article2/0,2817,2421503,00.asp" rel="nofollow" target="_blank">Emergency Alert System Vulnerable to Hackers, Report Finds | News & Opinion | PCMag.com</a>: "Hackers could have a field day with the Emergency Alert System (EAS), thanks to vulnerabilities with equipment used to transmit the alerts, according to a new report. According to Seattle-based IOActive, the systems that intercept emergency messages from federal officials and then interrupt regular broadcasts to transmit the message - known as DASDEC - are susceptible to cyber attacks."<br />
<br />
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script><br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-89436383655612715072013-07-16T00:00:00.000+12:002013-07-16T00:00:05.493+12:00Students Question the NSA at Recruiting Session<iframe frameborder="no" height="166" scrolling="no" src="https://w.soundcloud.com/player/?url=http%3A%2F%2Fapi.soundcloud.com%2Ftracks%2F99464422" width="100%"></iframe>
<a href="https://soundcloud.com/madiha-1/students-question-the-nsa-at?utm_source=soundcloud&utm_campaign=wtshare&utm_medium=Facebook&utm_content=https%3A%2F%2Fsoundcloud.com%2Fmadiha-1%2Fstudents-question-the-nsa-at" rel="nofollow" target="_blank">▶ Students Question the NSA at Recruiting Session by Madiha</a>: <br />
<br /><a href="http://www.google.com/url?sa=X&q=http://www.bloomberg.com/video/u-s-expands-role-in-cyber-defense-ZGg8E~TiTgaqvldmMB6l_g.html&ct=ga&cad=CAcQAhgAIAAoATACOAJAwZKHjwVIAVAAWABiBWVuLVVT&cd=zU_vnJJ-wek&usg=AFQjCNGk_iAfY_n9mrlxibmIh_rCl544Gw" rel="nofollow" target="_blank">US Expands Role in Cyber Defense</a><br />Bloomberg<br />Reports on chinese hacking activity -- let's bring in a chief security officer at a cyber security firm who has published several reports on chinese hacking activity. This is a fairly new program. It's important to realize that the information ...<br /><br /><a href="http://www.google.com/url?sa=X&q=http://www.muscatdaily.com/Archive/Oman/Dramatic-increase-in-phishing-scams-as-criminals-target-Apple-IDs-2ep8&ct=ga&cad=CAcQAhgAIAAoATAHOAdAjuKLjwVIAVAAWABiBWVuLVVT&cd=yd2UoTD4RXY&usg=AFQjCNFuwMSbqFaqHg7d50QJUz-peOCe0Q">Dramatic increase in phishing scams as criminals target Apple IDs</a><br />Muscat Daily<br />Kaspersky Lab recently published a report that analysed increase in cyber criminal campaigns to steal users' Apple IDs and account information by creating fraudulent phishing sites that imitate the official Apple site (<a href="http://www.apple.com/" rel="nofollow" target="_blank">www.apple.com</a>). Cyber criminals ...<div>
<br /></div>
<div>
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a><br />
<div>
<br /></div>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-12552173452312676992013-07-13T00:00:00.000+12:002013-07-13T00:00:11.051+12:00Port of Baltimore vulnerable to cyber attack<a href="http://www.google.com/url?sa=X&q=http://www.baltimoresun.com/business/bs-bz-port-security-20130703,0,5616600.story&ct=ga&cad=CAcQAhgAIAAoATAGOAZAgMPhjgVIAVAAWABiBWVuLVVT&cd=GwfCZJuSQ0c&usg=AFQjCNGbHReb8Qv6HOaq3o5L9EY2ttTmSQ" rel="nofollow" target="_blank">Port of Baltimore is vulnerable to cyber attack, Brookings study says</a><br />Baltimore Sun<br /><i>The port and the MDOT work with the FBI Baltimore Cyber Crime Unit and a liaison with the NationalSecurity Agency at Fort Meade to ensure the integrity of the computer network, he said. "We have the highest level of security available and a thorough ...read more at link above</i><br />
<br /><b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script><br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-84703764345059006672013-07-11T12:50:00.000+12:002013-07-11T12:50:00.116+12:00China and US to discuss cyber security at forum<a href="http://www.google.com/url?sa=X&q=http://www.lasvegassun.com/news/2013/jul/06/as-china-us/&ct=ga&cad=CAcQAhgAIAAoATAHOAdAgMPhjgVIAVAAWABiBWVuLVVT&cd=GwfCZJuSQ0c&usg=AFQjCNE6PK-vMWqY5-J8h4hDL-awnk2BTA" rel="nofollow" target="_blank">China, US to discuss cyber security at forum</a><br />
Las Vegas Sun<br /><i>It will include the inaugural gathering of a U.S.-Chinese cyber security group. Beijing is under U.S. pressure to crack down on cyberspying after security consultants tracked a wave of hacking attacks to China. An assistant foreign minister, Zheng ...read more at link above</i><br />
<br />
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script><br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-70737362887758007742013-07-09T00:00:00.000+12:002013-07-09T00:00:00.425+12:00Cyber attacks growing more advanced<a href="http://www.google.com/url?sa=X&q=http://www.upstreamonline.com/live/article1331185.ece&ct=ga&cad=CAcQAhgAIAAoATAGOAZAx529jgVIAVAAWABiBWVuLVVT&cd=oLzThzoixMM&usg=AFQjCNFj2vAKi9nPKCRb1tQlGKfKQc5P7Q" rel="nofollow" target="_blank">Cyber attacks growing more advanced - report</a><br />Upstream Online<br />The threats posed by state-backed intelligence outfits, industry insiders and freelance hackers is evolving and could deal a blow to US national security and economic competitiveness, the non-partisan think tank said in a report this week. "Once in the ...<br /><br /><a href="http://www.google.com/url?sa=X&q=http://news.xinhuanet.com/english/indepth/2013-06/29/c_132496730.htm&ct=ga&cad=CAcQAhgAIAAoATAHOAdAx529jgVIAVAAWABiBWVuLVVT&cd=oLzThzoixMM&usg=AFQjCNEk3ZIv2mj0P_64KMlYVvi-UKj9Aw" rel="nofollow" target="_blank">West must work with the rest to secure Internet</a><br />Xinhua<br />At a time when China and the US are striving to build a new type of relationship, it is imperative that both should be guided by good faith, one of the basic requirements of international relations of whichcyber security affairs is a part. They should ...<br />
<br />
<a href="http://www.google.com/url?sa=X&q=http://english.vietnamnet.vn/fms/science-it/77926/nation-at-high-risk-of-cyber-attacks.html&ct=ga&cad=CAcQAhgAIAAoATAFOAVAx529jgVIAVAAWABiBWVuLVVT&cd=oLzThzoixMM&usg=AFQjCNEbH5Ooc-QUecp4VQwDwyL6Ncjg3w" rel="nofollow" target="_blank">Nation at high risk of cyber attacks</a><br />VietNamNet Bridge<br />The study, which was based on data from the Kaspersky Security Network cloud service, found that what was once a subset of spam has evolved into a rapidly growing cyber threat in its own right.Phishing is a form of internet fraud in which criminals ...<br />
<br />
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script><br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-55409361592799932432013-07-06T00:00:00.000+12:002013-07-06T00:00:08.004+12:00General in leak probe quit Pentagon post suddenly<a href="http://www.google.com/url?sa=X&q=http://investigations.nbcnews.com/_news/2013/06/28/19191717-general-in-leak-probe-quit-pentagon-post-suddenly-citing-health-reasons&ct=ga&cad=CAcQAhgAIAAoATAIOAhAx529jgVIAVAAWABiBWVuLVVT&cd=oLzThzoixMM&usg=AFQjCNHJFcuFLRqGb6W9C4mZEVphYfX45w" rel="nofollow" target="_blank">General in leak probe quit Pentagon post suddenly, citing health reasons</a><br />NBCNews.com (blog)<br />“He was a crucial voice in communicating both the opportunities and dangers of cyber warfare,” said Peter Singer, a national security expert at the Brookings Institution think tank. More from NBC News Investigations: Report: Millions wasted on ...<br /><br /><table border="0" cellpadding="0" cellspacing="0" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px; width: 600pxpx;"><tbody></tbody></table>
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script><br />
<br />Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-9339677822981491722013-07-04T00:00:00.000+12:002013-07-04T00:00:10.856+12:00Cyber threats are here to stay<a href="http://www.google.com/url?sa=X&q=http://www.aspentimes.com/news/7115114-113/pawlenty-cyberwarfare-delaney-mcconnell&ct=ga&cad=CAcQAhgAIAAoATAJOAlAx529jgVIAVAAWABiBWVuLVVT&cd=oLzThzoixMM&usg=AFQjCNEf6JGVaRtH3ujxC03atViIF4XvPg" rel="nofollow" target="_blank">Panelists : Cyber threats are here to stay</a><br />Aspen Times<br />The two participated in a discussion called “The Cyber Threat to America's Economy, Infrastructure, and Security,” as a part of the Aspen Ideas Festival. ... So what's the motivation for this kind ofwarfare? ... “If there's a missile attack you have ...<div>
<br /><b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script><br />
<br /></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-83186435793294646412013-07-02T00:00:00.000+12:002013-07-02T00:00:12.337+12:00NSA wasting money and resources - Terrorists Don't Use Verizon. Skype or Gmail<a href="http://motherboard.vice.com/blog/hey-nsa-terrorists-dont-use-verizon-or-skype-or-gmail" rel="nofollow" target="_blank">Sorry, NSA, Terrorists Don't Use Verizon. Or Skype. Or Gmail. | Motherboard</a>: . . . Or, as Bloomberg more bluntly puts it, the "infrastructure set up by the National Security Agency ... may only be good for gathering information on the stupidest, lowest-ranking of terrorists. The Prism surveillance program focuses on access to the servers of America’s largest Internet companies, which support such popular services as Skype, Gmail and iCloud. These are not the services that truly dangerous elements typically use."
Read more: <a href="http://motherboard.vice.com/blog/hey-nsa-terrorists-dont-use-verizon-or-skype-or-gmail#ixzz2XLaWIu4z" rel="nofollow" target="_blank">http://motherboard.vice.com/blog/hey-nsa-terrorists-dont-use-verizon-or-skype-or-gmail#ixzz2XLaWIu4z</a>
Follow us: <a href="http://ec.tynt.com/b/rw?id=djHJe-zZSr4PaFacwqm_6r&u=motherboard">@motherboard on Twitter</a> | <a href="http://ec.tynt.com/b/rf?id=djHJe-zZSr4PaFacwqm_6r&u=motherboardtv">motherboardtv on Facebook</a><script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="//platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");</script><br />
<br />
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-2322148761357624582013-06-29T00:00:00.000+12:002013-06-29T00:00:00.981+12:00Social Networks safety and security<a href="http://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/social-networks">Social Networks | StaySafeOnline.org</a>: "
SOCIAL NETWORKS
Facebook, Twitter, Google+, YouTube, Pinterest, LinkedIn and other social networks have become an integral part of online lives. Social networks are a great way to stay connected with others, but you should be wary about how much personal information you post."<br />
<br />
Have your family follow these tips to safely enjoy social networking:<br />
<ul>
<li>Privacy and security settings exist for a reason: Learn about and use the privacy and security settings on social networks. They are there to help you control who sees what you post and manage your online experience in a positive way.</li>
<li>Once posted, always posted: Protect your reputation on social networks. What you post online stays online. Think twice before posting pictures you wouldn’t want your parents or future employers to see. Recent research (<a href="http://www.microsoft.com/privacy/dpd/research.aspx">http://www.microsoft.com/privacy/dpd/research.aspx</a>) found that 70% of job recruiters rejected candidates based on information they found online.</li>
<li>Your online reputation can be a good thing: Recent research (<a href="http://www.microsoft.com/privacy/dpd/research.aspx">http://www.microsoft.com/privacy/dpd/research.aspx</a>) also found that recruiters respond to a strong, positive personal brand online. So show your smarts, thoughtfulness, and mastery of the environment.</li>
<li>Keep personal info personal: Be cautious about how much personal information you provide on social networking sites. The more information you post, the easier it may be for a hacker or someone else to use that information to steal your identity, access your data, or commit other crimes such as stalking.</li>
<li>Know and manage your friends: Social networks can be used for a variety of purposes. Some of the fun is creating a large pool of friends from many aspects of your life. That doesn’t mean all friends are created equal. Use tools to manage the information you share with friends in different groups or even have multiple online pages. If you’re trying to create a public persona as a blogger or expert, create an open profile or a “fan” page that encourages broad participation and limits personal information. Use your personal profile to keep your real friends (the ones you know trust) more synched up with your daily life.</li>
<li>Be honest if you’re uncomfortable: If a friend posts something about you that makes you uncomfortable or you think is inappropriate, let them know. Likewise, stay open-minded if a friend approaches you because something you’ve posted makes him or her uncomfortable. People have different tolerances for how much the world knows about them respect those differences. </li>
</ul>
Know what action to take: If someone is harassing or threatening you, remove them from your friends list, block them, and report them to the site administrator.<br />
<br />
Protect Yourself with these STOP. THINK. CONNECT. Tips:<br />
<ul>
<li>Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.</li>
<li>Own your online presence: When applicable, set the privacy and security settings on websites to your comfort level for information sharing. It’s ok to limit how you share information.</li>
<li>Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.</li>
<li>Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals.</li>
<li>When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.</li>
<li>Post only about others as you have them post about you. </li>
</ul>
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1591641974933932474.post-44007042432458897392013-06-27T00:00:00.000+12:002013-06-27T00:00:01.137+12:00Backdoor.AndroidOS.Obad.a, malware <a href="http://www.techrepublic.com/blog/security/new-android-malware-should-be-wake-up-call-for-security-admins/9641?tag=nl.e019&s_cid=e019&ttag=e019&ftag=" rel="nofollow" target="_blank">New Android malware should be wake-up call for security admins | TechRepublic</a>:<i> "Nicknamed Backdoor.AndroidOS.Obad.a, this malware used a hole in the code packing system to create an executable that should be found invalid, but still gets processed on an Android smartphone, by planting deliberate errors in the AndroidManifest file. Once there, it can get elevated to the Device Administrator status, but using a security hole in Android, it will not get listed in the apps listing, making it impossible to remove. And the complexity doesn’t stop there. The malware uses a lot of encryption to keep all of its variable names secret, and it will go out through a network connection, downloading a part of the Facebook home page, and use that as its encryption key, to ensure it is truly online and able to connect to its control servers. . . ." (read more at link above)</i><br />
<br />
<b><i>more news below</i></b><br />
<b><i><br /></i></b>
<a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg">Follow @sobeqorg</a><br />
<div>
<br /></div>
Unknownnoreply@blogger.com