Tag Archives: hackers

Google Infographic on Account Hijackers

They have a great article here for more information.

Posted in Security Blog | Tagged , , , , | Comments Off on Google Infographic on Account Hijackers

Operation Onymous… 414 Onion sites Taken Offline/Seized

Tor (The Onion Router) is an anonymizing program that allows access to the Dark Web, it works by basically routing packets through an anonymous proxy network. (See Searching the Deep Web) Europol, the FBI, and the Department of Homeland Security, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Operation Onymous… 414 Onion sites Taken Offline/Seized

Tales from the Encrypt (RSA Video)

Happy Halloween!

Posted in Security Blog | Tagged , , , , , , | Comments Off on Tales from the Encrypt (RSA Video)

Reuben Paul, an 8-year-old Cyber Professional and CEO

An extension from this old post, the 8 year old, identified as Reuben Paul, has grown in fame. He demonstrates in this video, some of his mastery of hacking tools and his thought processes. Here is an article/interview from Tripwire.

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Reuben Paul, an 8-year-old Cyber Professional and CEO

Payment Card with Smart Chip? So What?

Over the past week, at least three U.S. financial institutions reported receiving tens of thousands of dollars in fraudulent credit and debit card transactions coming from Brazil and hitting card accounts stolen in recent retail heists… The problem with that … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Payment Card with Smart Chip? So What?

McAfee Exec on Cybersecurity

Watch the latest video at video.foxbusiness.com

Posted in Security Blog | Tagged , , , , , , , | Comments Off on McAfee Exec on Cybersecurity

How Tyupkin, the ATM Malware, Works

The hack, known as Tyupkin, requires criminals to enter a unique code into a machine that has already been compromised by the malware. A second Pin code – a random sequence of numbers generated at another location – is also … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on How Tyupkin, the ATM Malware, Works

The Rise of the Hackers

Here’s a preview of the show! If you aren’t a fan of PBS|NOVA, you need to be! From http://www.pbs.org/wgbh/nova/tech/rise-of-the-hackers.html Our lives are going digital. We shop, bank, and even date online. Computers hold our treasured photographs, private emails, and all … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on The Rise of the Hackers

PBS Presents: The Secret Lives of Hackers

Found here

Posted in Security Blog | Tagged , , | Comments Off on PBS Presents: The Secret Lives of Hackers

Sears:Kmart Breach

Today Kmart stores were hit with a data breach that compromised some shoppers’ debit and credit card information but no personal information, no debit card PIN numbers, no email addresses and no social security numbers were obtained by those criminally … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Sears:Kmart Breach