Items Tagged with "FBI"
Rallies Planned at Apple Stores to Protest FBI's Backdoor Court Order
February 17, 2016 Added by:InfosecIsland News
Rallies planned at Apple stores nationwide to protest court order pressuring the company to build a “backdoor” for the FBI to hack the iPhone
Comments (0)
The Great UDID Hacker Cache: What's the Big Deal?
September 07, 2012 Added by:Rafal Los
Why am I calling this a psychological operation? From talking to people who would know - the UDID is just a tracking mechanism to link a device to a person. The fact that this has stirred such a sentiment against the federal government at a time when distrust of is already high is suspect...
Comments (0)
LulzSec Member Arrested for Sony Pictures Hack
September 05, 2012 Added by:Headlines
Rivera allegedly used a proxy server in an attempt to mask or hide his Internet protocol (IP) address and obtained confidential information from Sony Pictures’ computer systems using an SQL injection attack against its website...
Comments (0)
Hackers Grabbed Twelve Million Apple IDs from FBI
September 05, 2012 Added by:Dan Dieterle
Is the information legit? If so, why would an FBI agent have a list of twelve million Apple ID’s which in some cases can be used to access information just as a password would? And how did the hacker group exploit this particular agent’s laptop and recover information from it?
Comments (0)
Three Domains Seized for Distributing Pirated Android Apps
August 27, 2012 Added by:Headlines
“Software apps have become an increasingly essential part of our nation’s economy and creative culture, and the Criminal Division is committed to working with our law enforcement partners to protect the creators of these apps and other forms of intellectual property from those who seek to steal it..."
Comments (0)
Four Defendants Charged in Credit Card Skimming Scheme
August 21, 2012 Added by:Headlines
Four men were arrested for their roles in an identity theft scheme involving the theft of credit card numbers used to fraudulently purchase fuel at gas stations in order to be sold, distributed, or otherwise used by the defendants in order to obtain criminal proceeds...
Comments (0)
FBI and IC3 Issue Advisory on Revetion Ransomware
August 10, 2012 Added by:Headlines
Reveton is drive-by malware and unlike many viruses which activate when users open a file or attachment. Reveton can install itself when users simply click on a compromised website. Once infected, the computer immediately locks, and the monitor displays a screen stating there has been a violation of federal law...
Comments (0)
FBI’s Facial Recognition is Coming to a State Near You
August 07, 2012 Added by:Electronic Frontier Foundation
The FBI wants to be able to search and identify people in photos of crowds and in pictures posted on social media sites—even if the people in those photos haven’t been arrested for or even suspected of a crime. The FBI may also want to incorporate those crowd or social media photos into its face recognition database...
Comments (0)
Student Pleads Guilty to Counterfeiting Coupons on the Internet
August 07, 2012 Added by:Headlines
In addition to creating and disseminating fake coupons, Henderson also wrote tutorials and created templates he posted online and that provided instructions for creating counterfeit coupons using their own computers. Henderson’s scheme caused retailers and manufacturers to lose approximately $900,000....
Comments (1)
EFF Challenges National Security Letter Statute
July 22, 2012 Added by:Electronic Frontier Foundation
Under the national security letter statute, the FBI can issue demands for records and gag provisions without court authorization, and recipient telecommunications and financial companies have no way to determine whether and how the government might be overreaching or otherwise abusing its authority...
Comments (0)
FBI: More Arrests in International Cyber Crime Takedown
July 13, 2012 Added by:Headlines
"The FBI announced three more arrests arising from Operation Card Shop, an international operation aimed at sophisticated, highly organized cyber criminals involved in buying and selling stolen identities, exploited credit cards, counterfeit documents, and sophisticated hacking tools..."
Comments (0)
Company Guilty of Illegal Export of U.S. Military Software to China
July 04, 2012 Added by:Headlines
“Preventing the loss of critical U.S. information and technologies is one of the most important investigative priorities of the FBI. Our adversaries routinely target sensitive research and development data and intellectual property from universities, government agencies, manufacturers, and defense contractors..."
Comments (0)
Georgia Man Convicted for Role in Phishing Operation
July 03, 2012 Added by:Headlines
Osarhieme Uyi Obaygbona, 32, of Atlanta, Georgia, was convicted last week of conspiracy to commit wire fraud, conspiracy to commit identity theft, and conspiracy to gain unauthorized access to protected computers. Phishing attacks use fraudulent web pages that mimic the legitimate web pages...
Comments (0)
Falconstor Software Conspired to Bribe Chase Executives
July 02, 2012 Added by:Headlines
The U.S. Attorney’s Office filed a criminal complaint against FalconStor Software, a data storage and protection company, alleging that the company conspired to pay more than $300,000 in bribes to executives of J.P. Morgan Chase Bank to obtain over $12 million in electronic storage licencing contracts...
Comments (0)
Twenty-Four Arrests in Eight Countries in Cyber Crime Takedown
June 27, 2012 Added by:Headlines
“As the cyber threat grows more international, the response must be increasingly global and forceful. The coordinated law enforcement actions taken by an unprecedented number of countries around the world demonstrate that hackers and fraudsters cannot count on being able to prowl the Internet..."
Comments (0)
Alert: Fake FBI Emails Seek Personal Information
June 26, 2012 Added by:Headlines
The fraudulent e-mails give the appearance of legitimacy due to the use of pictures of the FBI Director, seal, letterhead, and/or banners. The schemes cover a range from threat and extortion e-mails, website monitoring containing malicious computer program attachments (malware), and online auction scams...