Wednesday, February 06, 2013

Cyber-crime ring stole $200M, invented 7,000 fake IDs, ripped off thousands of credit cards

  Important and Banal Topics You'll Hear About at the RSA Security Conference | Lawmakers pledge to change hacking law during Swartz memorial
 
  Network World Security

Forward this to a Friend >>>


Cyber-crime ring stole $200M, invented 7,000 fake IDs, ripped off thousands of credit cards
The FBI today said it broke up what it called one of the largest credit card, cyber-fraud schemes in its history - a $200M scam that created more than 7,000 false identities and tens of thousands of fake credit cards. The FBI said it arrested 13 people involved in the scam the agency said maintained more than 1,800 "drop addresses," located across the country including houses, apartments, and post... Read More


RESOURCE COMPLIMENTS OF: IT Roadmap Chicago

IT Roadmap Chicago Focuses on Five Pillars of Technology
The content-rich agenda has been redesigned and reenergized to include increased IDG content from editors you know and trust on topics such as: Security & Management, Network - From the Edge to the Core of the New Data Center, Analytics & Data Management, Cloud & Next Generation Apps, The Mobile/BYOD Enterprise, and more! Click to continue

WHITE PAPER: F5

Top Considerations When Choosing an ADC
Because of its strategic location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both functional and financial factors. This paper explores important elements to evaluate, including network performance, availability and security. Learn More.

Important and Banal Topics You'll Hear About at the RSA Security Conference
Just 3 weeks until the annual RSA Security Conference geek-fest in San Francisco. Should be a good one since the economy is doing okay, VCs are throwing money around and organizations are increasing security budgets. Oh, and let's not forget that the NY Times and Wall Street Journal just reported major security breaches. Read More

Lawmakers pledge to change hacking law during Swartz memorial
U.S. lawmakers pledged to rewrite an antihacking law as hundreds of people gathered in Washington, D.C., to mourn the death of Internet activist and innovator Aaron Swartz. Read More


WHITE PAPER: Fiberlink Communications

Best Practices Guide: for Mobile Device Management
This guide gives you best practices for Mobile Device Management (MDM) in the Enterprise that you can use now. Learn More

Apparently we can wait: Obama's online privacy effort
It has now been just about a year since the Obama administration put forth its online privacy blueprint. In spite of a title on the announcement that insisted "We Can't Wait," not much has happened since the blueprint was published. Meanwhile, things are heating up on the online privacy front in Europe, and the contrast between the United States and European viewpoints is and is not stark. Read More

Hackers release iOS 6.1 jailbreak utility
A program to jailbreak Apple devices running iOS 6 or above was released Monday, sparking over 100,000 downloads in the first 10 minutes of availability. The jailbreak modifies Apple's mobile firmware, letting users load applications from outside of the official AppStore, and access iOS files that Apple usually shields. Read More


WHITE PAPER: CA Technologies

Making Your Investment in an Executive Dashboard Count
Get insights into what your peers are seeking in Executive Dashboards along with the reasons these dashboards are most effective in achieving value. Learn More

Anonymous posts personal data of 4,000 bankers online
Personal information on some 4,000 people in the banking industry, including bank officers, was posted online Sunday by the hacker collective Anonymous. Read More

Malware Strikes With Valid Digital Certificate
One of the foundational elements of ecommerce is the web of trust enabled by digital certificates. When you go to a web site, you can feel confident that it's legitimate because it has a certificate from a recognized certificate authority that validates it. But the certificates themselves can be vulnerable. Case in point: Security firm Malwarebytes recently discovered some malware in the wild with a valid, signed digital certificate. Read More

Chinese malware targeted US drone secrets, security firm alleges
A series of highly-targeted malware attacks detected a year ago are almost certainly part of a longstanding and determined Chinese campaign to steal industrial secrets from US companies working in the field of UAVs (Unmanned Aerial Vehicles), security firm FireEye has claimed. Read More

 
 
 

SLIDESHOWS

2013's 25 Geekiest 25th Anniversaries

A look back at the most memorable tech-related happenings of 1988.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Juniper routers open to attack

2. What's up with VMware?

3. Hackers release iOS 6.1 jailbreak utility

4. Cisco fills out SDN family with 40G switch, controller, cloud gear for data center

5. IBM kills Lotus name, but software and founders live on

6. Techiest Super Bowl 47 ads

7. 2013's 25 geekiest 25th anniversaries

8. iOS 6 untethered jailbreak released, Cydia app store flooded

9. Microsoft and Google push FCC's public Wi-Fi for free networks

10. Moving to cloud computing is harder, costlier than originally envisioned

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment