Archive for the ‘cybercrime’ Category


Consumer Opinion and New TLDs: An Infographic on the ICANN Survey

Posted June 9th, 2015

The Internet Corporation for Assigned Names and Numbers, also know as ICANN, recently released results from the Global Consumer Research Study, Phase One survey that was conducted through Nielsen (see infographic below.) This survey, the first of its kind, was conducted in February and was intended to gauge consumer attitude, awareness and trust regarding new gTLDs and the overall domain name system.

“This is the first time we’ve surveyed consumers directly about domain names and Internet use, and it provides an important benchmark as the new domains roll out… as the community looks toward future rounds, the survey findings will help inform the best approach,” said President Akram Atallah of ICANN’s Global Domains Division.

Currently ICANN is working with Nielsen on another global survey, this time to measure registrants’ trust of the domain name landscape. Results should be available later this year.

An infographic on the ICANN survey

Posted in cybercrime, Cybersquatting, Domain Names, gTLDS, ICANN, Internet Governanace, Internet Security, new gTLDS by  


The Pirate Bay Must Be Blocked by UK ISPs, Court Rules

Posted May 1st, 2012

From BBC News

File-sharing site The Pirate Bay must be blocked by UK internet service providers, the High Court has ruled.

The Swedish website hosts links to download mostly pirated free music and video. Sky, Everything Everywhere, TalkTalk, O2 and Virgin Media must all prevent their users from accessing the site.

“Sites like The Pirate Bay destroy jobs in the UK and undermine investment in new British artists,” the British Phonographic Industry (BPI) said.

A sixth ISP, BT, requested “a few more weeks” to consider their position on blocking the site.

BPI’s chief executive Geoff Taylor said: “The High Court has confirmed that The Pirate Bay infringes copyright on a massive scale.

“Its operators line their pockets by commercially exploiting music and other creative works without paying a penny to the people who created them.

“This is wrong – musicians, sound engineers and video editors deserve to be paid for their work just like everyone else.”

See the full skinny HERE.

Posted in Compliance, cybercrime, Enforcement, Intellectual Property by  


After Threats, No Signs of Attack by Hackers

Posted April 2nd, 2012

From the New York Times

A threat to attack a crucial part of the Internet on Saturday by members of the mercurial, leaderless hacker collective called Anonymous appears to have had no discernible impact so far.

By Saturday in the Eastern United States, there were no major signs of an attack, said several people monitoring the Domain Name System. Some Anonymous hackers had threatened six weeks ago to attack that system, which converts domain names like into numeric addresses that computers use. It led to a quiet global multimillion-dollar effort to strengthen the Domain Name System in recent weeks.

For the full skinny go HERE.

Posted in cybercrime, Internet Security by  


Microsoft gives cops the tools to detect child porn

Posted March 20th, 2012


Microsoft is giving law enforcement PhotoDNA, a digital tool that sifts through massive amounts of online images to help identify instances of child pornography and rescue victims.

The software giant announced this morning that it, along with NetClean, a Swedish maker of technology to combat the spread of child porn, will give away the image-matching software to help law enforcement agencies detect new images of child abuse online. That then helps those agencies focus their efforts on tracking down abusers.

“By arming law enforcement with this powerful technology, our goal is to help expedite investigations, limit officer exposure to the corrosive effects of viewing child rape images, and strengthen law enforcement’s ability to quickly identify and rescue victims and get child abusers off the street,” Bill Harmon, associate general counsel in Microsoft’s Digital Crimes Unit wrote in a blog post.

See the full skinny HERE.

Posted in cybercrime, Internet Security by  


Two UK men charged with stealing Michael Jackson tunes from Sony

Posted March 6th, 2012

From The Seattle TImes

Two men have been charged in Britain with hacking into Sony Music’s computers and stealing music, the company and British police said Monday. A person familiar with the situation said the hackers had obtained unreleased Michael Jackson tracks.

Sony Music Entertainment spokeswoman Liz Young said the company noticed a breach of its systems in May, “and immediately took steps to secure the site and notify authorities. As a result, the two suspects were arrested.”

She said no customer data were compromised in the attack on the company’s internal music-sharing system.

Sony would not confirm how much music was stolen or what artists were involved. But a person familiar with the situation, who was not authorized to speak publicly, said Monday that the suspects were Jackson fans and had taken his music, including unreleased material.

The year after the King of Pop’s 2009 death, Sony signed a 7-year deal with his estate, worth up to $250 million, to sell his unreleased recordings.

For the full skinny go HERE.

Posted in cybercrime, Internet Security, Oh No by  


In Attack on Vatican Web Site, a Glimpse of Hackers’ Tactics

Posted February 28th, 2012

From The New York Times

Anonymous has carried out Internet attacks on well-known organizations like Sony and PBS. In August, the group went after its most prominent target yet: the Vatican.

The campaign against the Vatican, which did not receive wide attention at the time, involved hundreds of people, some with hacking skills and some without. A core group of participants openly drummed up support for the attack using YouTube, Twitter and Facebook. Others searched for vulnerabilities on a Vatican Web site and, when that failed, enlisted amateur recruits to flood the site with traffic, hoping it would crash, according to a computer security firm’s report to be released this week.

The attack, albeit an unsuccessful one, provides a rare glimpse into the recruiting, reconnaissance and warfare tactics used by the shadowy hacking collective.

Anonymous, which first gained widespread notice with an attack on the Church of Scientology in 2008, has since carried out hundreds of increasingly bold strikes, taking aim at perceived enemies including law enforcement agencies, Internet security companies and opponents of the whistle-blower site WikiLeaks.

The group’s attack on the Vatican was confirmed by the hackers and is detailed in a report that Imperva, a computer security company based in Redwood City, Calif., plans to release ahead of a computer security conference here this week. It may be the first end-to-end record of a full Anonymous attack.

For the full skinny go HERE.

Posted in cybercrime, Enforcement, Internet Security by  


Just in Time for Valentine’s Day

Posted February 13th, 2012

From Yahoo! News

LONDON (AP) — A hacker claims to have compromised the personal information of more than 350,000 users after breaking into a disused website operated by pornography provider Brazzers.

Kate Miller, director of communications for site owner Manwin Holding SARL, said Saturday it was “currently investigating the issue” but that no credit card information has been leaked.

Miller said it appeared that the hacker had gained access to an inactive forum to help enter other, linked websites. She said people who were potentially affected were being notified of the security breach by the company.

In an email, she said that security was “a priority at all times” and that the company would do all it could to safeguard its users’ information. The email went on to blame the hacker for “illegal and prohibited cyber criminal activities.”

The breach is a potential embarrassment for Luxembourg-based Manwin, which runs some of the world’s best-known pornography websites.

See the full skinny HERE.

Posted in cybercrime, Oh No, Security by  


Government-backed hacker teams do most China-based data theft

Posted December 13th, 2011

From USA Today

WASHINGTON – As few as 12 different Chinese groups, largely backed or directed by the government there, commit the bulk of the China-based cyberattacks stealing critical data from U.S. companies and government agencies, according to U.S. cybersecurity analysts and experts.

See the full story HERE.


Posted in cybercrime, Security by  


“2012: The Year of Securing Websites?”

Posted November 28th, 2011

As posted to by Wout de Natris: ”In a seemingly never-ending row of news on hacks of websites now this one in which 2.3 million individual cases of privacy sensitive data were accessible through a leak in the websites of most public broadcasting stations in the Netherlands. To make the news more cheerful, the accessible data was, if compiled, sufficient to successfully steal a complete identity. What were thoughts that came to my mind after hearing this news on Friday?


The 8 o’clock news item ended with the soothing words that everything possible was being done to secure the websites. What?, I thought. After all the items in the past year on the public broadcast news on hacks, phishing, hacked companies and websites, you guys never bothered to check your own? Apparently this is a thought that doesn’t spring up in anyone’s mind till it’s too late. Or is it?”

Click HERE to continue reading.

Posted in cybercrime by  


“What Mobile Malware Looks Like”

Posted November 15th, 2011

As posted to by Terry Zink: “ Last month at the Virus Bulletin Conference in Barcelona, I took in one of the sessions on mobile malware. This type of malware is foreign to me because I mostly stay in the email space at work (and even then, I am focusing more on day-to-day issues of running a large mail provider than I am on spam and abuse). What’s mobile malware like? What are the threats? How do users get infected?

The fastest growing segment of mobile malware is on the Google Android platform. While it is still less than J2ME, eventually at the current rates it will overtake it by next year.”

Click HERE to read more.

Posted in cybercrime, Malware by