30-5-2011 – 24-5-2011


Cops-use-mobile-scanner-to-steal-cellphone-data-from-innocent-americans/

 Posted by Caspertwin on May 30, 2011 at 9:55 PM Comments comments (0)

If there was a scintilla of doubt as to whether Americans are living in a predatory police state, then this story completely eviscerates it. Michigan state police have been using a handheld mobile forensics device to steal information from cell phones belonging to motorists stopped for minor traffic violations.

Read Full Post »

Understanding how the VISA & MasterCard telephone Credit Card Scam works, you’ll be better prepared to protect yourself

 Posted by Caspertwin on May 30, 2011 at 9:30 PM Comments comments (0)

This information is worth reading. By understanding how the VISA & MasterCard telephone Credit Card Scam works, you’ll be better prepared to protect yourself. One of our employees was called on Wednesday from ‘VISA’, and I was ca…

Read Full Post »

Facebook Battles Spams and Scammers with New Security Features

 Posted by Caspertwin on May 30, 2011 at 9:23 PM Comments comments (0)

Facebook rolled out three new security measures to try to prove that it cares about user privacy.

The social networking site now features two-factor authentication to secure the login process, a secondary step to thwart clickjacking scams and a new surfing tool to rate the safety of links, Clement Genzmer, a Facebook security engineer, wrote on the Facebook Security blog that appeared…

Read Full Post »

2011 Data Breach Investigations Report: Breaches Increased Dramatically While Data Loss Was at All-Time Low

 Posted by Caspertwin on May 30, 2011 at 9:20 PM Comments comments (0)

Cyber Criminals Shifting to Smaller, More Opportunistic Attacks; External Attacks, Especially Hacking, on

Read Full Post »

Sonys Bad News Isnt Over ? Hackers Have Made Two More Data Breaches

 Posted by Caspertwin on May 30, 2011 at 9:02 PM Comments comments (0)

May 29, 2011

With the intent to deliberately embarrass Sony, hackers have perpetrated another data breach, this ti…

Read Full Post »

FBI PROBES BREACH INTO INTERNET SECURITY FIRM

 Posted by Caspertwin on May 30, 2011 at 8:45 PM Comments comments (0)

A security breach that affected digital certificates issued by Internet security company Comodo has prompted an investigation by the Federal Bureau of Investigation (FBI).

The FBI is focusing on how a hacker got a New Jersey, US-based company to issue the fraudulent certificates, tech site CNET reported.

Italian law enforcement is also involved in the investigation, CNET 

Read Full Post »

Lockheed Martin confirms it came under attack

 Posted by Caspertwin on May 30, 2011 at 8:41 PM Comments comments (0)
Defense contractor Lockheed Martin confirmed last night that the network problems it has been contending with during the last several days are the result of a “significant and tenacious attack” carried out against its network. The company says that because its information security team detected the attack right away and took aggressive action to ward it off, its systems remain secure. Reuters is reporting that the U.S. Department of Homeland Security and the Defense Department have offered to … Read Full Post »

PBS Hacked After Critical WikiLeaks Show

 Posted by Caspertwin on May 30, 2011 at 8:28 PM Comments comments (0)

The Internet’s vigilant brigade has come to WikiLeaks’ defense yet again.

Read Full Post »

What to Do If Hackers Steal Your Online Accounts

 Posted by Caspertwin on May 30, 2011 at 5:35 AM Comments comments (0)

Has your Web-mail or social-network account been hijacked? Join the (miserable) club.

Stolen accounts—caused b…

Read Full Post »

7 Reasons Why The Windows Phone 7 Is THE iPhone Killer

 Posted by Caspertwin on May 30, 2011 at 5:33 AM Comments comments (0)

The sleeping giant is back. With yesterda…

Read Full Post »

Beware of the Windows Phone Scam

 Posted by Caspertwin on May 30, 2011 at 5:32 AM Comments comments (0)

Jasmine at MoneyMagpie has a warning about a scam that she was targeted with following a call from someone claiming they were from “Windows”.

Read Full Post »

Recent Malware

 Posted by Caspertwin on May 30, 2011 at 5:26 AM Comments comments (0)

Been a victim to any scam and want the best protection here is a tip

 Posted by Caspertwin on May 30, 2011 at 5:26 AM Comments comments (0)

If u have been a victim to any scam and want the best protection here is a tip: create a email account with 1 of Manny free company like gmail or hotmail online and in there do not place any personnel detail like name address phone ect just make 1 up that you will remember. Now use this for any sites that ask for email address like social networks etc .. Never give out your ema…

Read Full Post »

Apple’s iPhone and iPad hacked in just six minutes

 Posted by Caspertwin on May 30, 2011 at 5:24 AM Comments comments (0)

RESEARCHERS have exp…

Read Full Post »

Apple Security Breach Gives Complete Access To Your iPhone

 Posted by Caspertwin on May 30, 2011 at 5:22 AM Comments comments (0)

Right now, if you visit a web page and load a simple PDF file, you may give total control of your iPhone, iPod touch or iPad to a hacker. The security bug affects all devices running iOS 3.1.2 and …

Read Full Post »

Why Windows is a Security Nightmare

 Posted by Caspertwin on May 30, 2011 at 5:20 AM Comments comments (0)

Security in all mainstream operating systems is non-existent; however, things are especially bad for Windows. Windows happens to be the favorite target of worm and virus writers. Conventional wisdom suggests that the huge installed base of Windows helps spread the worms and viruses, and also makes it a highly attractive target for worm/virus writers. The installed base …

Read Full Post »

Facebook red-faced after Google PR attack

 Posted by Caspertwin on May 30, 2011 at 5:19 AM Comments comments (0)

FACEBOOK has been le…

Read Full Post »

HondaÂ?s Canadian division has suffered a data breach that exposed the personal information of 283,000 customers

 Posted by Caspertwin on May 30, 2011 at 5:08 AM Comments comments (0)

Honda’s Canadian division has suffered a data breach that exposed the personal information of 283,000 customers, according to its website and published media reports.

The purloined data includes the names, addresses and vehicle identification numbers of customers who made purchases in 2009. The company is warning customers to be wary of scams, which could use the stolen informa…

Read Full Post »

Whats the difference between HTTP and HTTPS?

 Posted by Caspertwin on May 30, 2011 at 2:19 AM Comments comments (1)

The “S” in HTTPS indicates a secure site. If you visit a web site or web page, and look at the address in the web browser, it will likely begin with the following: http://. This means that the web site is talking to your browser using the regular ‘unsecured’ language. In other words If you fill out a form on the web site, someone might see the information you send to that site. This is why you never ever enter your credit card number in an http web site! But if the web address beg…

Read Full Post »

Banks cancel cards over potential security breach

 Posted by Caspertwin on May 30, 2011 at 2:12 AM Comments comments (0)

All major banks have blocked, restricted or cancelled what totals thousands of credit cards in response to a potential security breach. All four major banks and St George have confirmed to the ABC that some customers’ cards have been cancelled, blocked or restricted due to fears they had been compromised and would be open to fraud.  The Commonwealth Bank was the first to release information to the media, and says it detected the potential security breach through its continuous monit…

Read Full Post »

A keylogger is a piece of software that records every keystroke that you type on the keyboard.

 Posted by Caspertwin on May 30, 2011 at 2:10 AM Comments comments (0)

This is extremely dangerous, as your passwords, credit card numbers, bank account numbers, and other sensitive information can all land in the hands of a thief. Keylogging is one of the biggest reasons that identity theft is such a problem across the world right now. Every 3 seconds someone is a victim of identity theft.  Make sure you use eg (like in Kaspersky Internet security virtual keyboard or equivalent) to prevent this when you log on to any online web site like here on Facebook, …

Read Full Post »

Police crack down on computer support phone scam

 Posted by Caspertwin on May 30, 2011 at 2:07 AM Comments comments (0)

Teams at Indian call centres rang computer users claiming to be from tech supportand told computer users there were problems with their machines which could be fixed. Photograph: Virginia Mayo/AP.  Nineteen websites which were used to perpetrate a phone scam offering “computer support” that defraud…

Read Full Post »

New scam targets computer users

 Posted by Caspertwin on May 30, 2011 at 1:59 AM Comments comments (0)

The Queensland Police Service has issued a warning about a new scam targeting computer users. The scam involves people taking a call from a person working at a foreign call centre. The victim receives a call from the offender, who claims to belong to a software support company that has been requested by Microsoft to fix problems on the victim’s computer.  The offender confirms the victim’s computer has sent error messages to Microsoft regarding problems with their Window…

Read Full Post »

Email Exceeded Storage Limit Phishing Scam

 Posted by Caspertwin on May 30, 2011 at 1:50 AM Comments comments (0)

Email Exceeded Storage Limit Phishing Scam

Email claims that the user’s email account has exceeded its storage limit and instructs him or her to reply with the account username and password in order to increase the mailbox size and restore full functionality  Beleow is an example:

From: System Administrator

Subject: RE; Your E-MailBox Has Exceeded Storage Limit!

Attention:

RE; Your E-MailBox Has Exceeded Storage Limit!

Your Emailbox has exceeded the st…

Read Full Post »

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s