…was offered as evidence that WikiLeaks was more like an intelligence agency than a publisher. But the full transcript is fascinating in its own right for what it shows of the give-and-take between Assange and his key source at this historically important moment in the WikiLeaks story.
Archive for the ‘Cybercrime’ Category
Researchers have documented one of the first known botnets to target point-of-sale terminals used by stores and restaurantsPosted: 2013/12/04 in Cybercrime, Education / Awareness, Enforcement, Network Security, Privacy / Data Protection, Stats / reports, Tech Evolution
Dotcom explains that he donated €20,000 to Wikileaks after the Collateral Murder video came out early 2010Posted: 2013/11/25 in Cybercrime, Education / Awareness, New Business Models, Organized Crime, Privacy / Data Protection, Public Policy, Stats / reports
ICANN Shuts Down Registrar Dynamic Dolphin For Hiding Fact That Spam King Scott Richter Is In ChargePosted: 2013/11/25 in Blocking, Cybercrime, Education / Awareness, Enforcement, Organized Crime, Stats / reports
The termination is due to Dynamic Dolphin’s material misrepresentation, material inaccuracy, or materially misleading statement in its application for accreditation or any material accompanying the application, in violation of Section 5.3.1 of the RAA.
Dutch language news article:
Dutch Banks: DO NOT INSTALL PIRATED SOFTWARE, Or We Won’t Reimburse You When You Fall Victim To Internet Banking FraudPosted: 2013/11/24 in Cybercrime, Education / Awareness, Illegal File Sharing, Network Security, New Business Models, Privacy / Data Protection, Stats / reports, Tech Evolution
NSA infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive informationPosted: 2013/11/23 in Cybercrime, Education / Awareness, Enforcement, Network Security, New Business Models, Privacy / Data Protection, Public Policy, Stats / reports, Tech Evolution
Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this.
A management presentation dating from 2012 explains how the NSA collects information worldwide. In addition, the presentation shows that the intelligence service uses ‘Computer Network Exploitation’ (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, malicious software.
Stolen data from the attacks includes information about government employees and their family members. The hackers also stole banking data. Reuters reports that the attacks have been connected to Lauri Love, a British hacker who was indicted in October for alleged hacking into US government agencies.
The web site belonging to the Prime Minister of Singapore appeared to have been hacked by members of the Anonymous hacking collectivePosted: 2013/11/08 in Cybercrime, Education / Awareness, Enforcement, Network Security, Privacy / Data Protection, Public Policy, Stats / reports, Tech Evolution
F-Secure Corporation’s Answer to Bits of Freedom Regarding Detection Of Malware Manufactured By GovernmentsPosted: 2013/11/07 in Network Security, Cybercrime, Privacy / Data Protection, Education / Awareness, Stats / reports, Public Policy, Enforcement
Large Dutch Hosting Provider Flexwebhosting Suffers From DDOS Attack That Affects Its 60,000 CustomersPosted: 2013/11/04 in Network Security, Cybercrime, Education / Awareness, Tech Evolution, Stats / reports
BT, Vodafone, Verizon Have Allegedly Assisted GCHQ In Harvesting Your E-Mail, Social Networking And Phone DataPosted: 2013/11/04 in Cybercrime, Education / Awareness, Enforcement, New Business Models, Privacy / Data Protection, Public Policy, Stats / reports, Tech Evolution
UK carriers BT and Vodafone are among top telcos today accused of supplying surveillance data to Blighty’s eavesdropping nerve center, GCHQ.
The Guardian cited documents leaked by whistleblower Edward Snowden in reporting that the operators, along with Verizon Business and a number of smaller providers, provided spooks with access to their undersea cable networks for the collection of voice and internet traffic.
According to the report, the firms have assisted in the harvesting of social networking and email activity of customers as well as the banking of phone conversations by way of tapped fiber-optic lines.
Today’s disclosure sheds further light on GCHQ’s modern-day dragnet activities, first revealed in June after Snowden fled the US and handed reporters top-secret dossiers he obtained while working as an NSA contractor.
In addition to tapping undersea fiber cables for telco data, GCHQ – which shares intelligence with its American counterpart, the NSA – is said to be collecting other information from data-center communications links, essentially hoarding data generated by Google and Yahoo! services.
NSA Demonstrates That Knowledge Is – Economic, Political And Military – Power. And Hackers Are Invaluable To ThemPosted: 2013/11/03 in Cybercrime, Education / Awareness, Network Security, New Business Models, Privacy / Data Protection, Public Policy, Stats / reports, Tech Evolution
Leaseweb Has Had Its Ticketing System Hacked. Wants Users To Change Passwords Used Over Past 6 MonthsPosted: 2013/10/31 in Cybercrime, Education / Awareness, Enforcement, Network Security, Privacy / Data Protection, Stats / reports
Dear LeaseWeb Customer,
As one of the largest hosting companies in the world, we know cyber-attacks are an unfortunate reality for online businesses. That is why we have a dedicated team of security specialists to defend the infrastructure that supports both our customers and our internal systems.
As a result of a routine security audit, LeaseWeb has reason to believe some credentials of one of its employees were recently compromised by a very sophisticated and targeted attack. Our investigation currently indicates that these credentials were used to access our ticketing system, our log files show access was requested to some of the tickets that you have created. As a precaution, we advise you to change all the passwords that were communicated via these tickets in the last six months.
LeaseWeb deeply regrets the occurrence of this incident. Our security team has worked diligently to address the incident, and has taken the following steps:
Affected customers were informed; to prevent unauthorized access to their servers, they were requested to change the credentials they submitted or received via the ticketing system during the last six months
Dutch national law enforcement was informed and we are currently assisting them with their investigation
A plan to remove external access to the ticketing system has been implemented
Two-factor authentication for our internal systems is currently being studied
We deeply value the trust of our customers and will work aggressively to prevent this type of event from occurring in the future. Again, we regret any inconvenience this may cause you. If you would like to receive additional information, please contact our security team via firstname.lastname@example.org.
1101 EC Amsterdam