[Update: A week after the initial spam wave, Evans sent several additional waves advertising his LocatePC service (5th) as well as National Cyber Security Radio (6th, 9th, 10th, and 11th). Two are included at the bottom. The NCS Radio spam was sent each time as HTML and was over 500k, the copy below is text only (161k). Attempts to unsubscribe are met with "Too many connections" or "Invalid information".]
On December 29, 2011, Gregory Evans / Hi-Tech Crime Solutions sent out email to a long list of people. The list included people who signed up for his broken "amihackerproof.com" scanning service as well as hundreds of security professionals that never signed up for any of his services or had a business relationship with. This is one of many ways that the email campaign violated the Federal CAN-SPAM Act.
The email does not clearly state it is an advertisement, does not provide a mailing address for the company sending the email, and offers no method for removal from the mailing list. These are three distinct guidelines that Evans / Hi-Tech Crime Solutions violated in sending this email. Each mail he sent in violation of the CAN-SPAM Act is subject to penalties up to $16,000. If you received this message and wish to report it, visit the FTC Complaint Assistant Web Site.
From: no-reply[at]howtobecomeahackerin15minutes.com To: Date: Thu, 29 Dec 2011 18:22:25 -0500 Subject: Hacker Conference For Dummies "How to become a hacker in 15 minutes" View the web page for this email: http://www.howtobecomeahackerin15minutes.com/ In order to Catch a Hacker it takes a Hacker. Every 6 seconds a personal computer is hacked. In 2011 alone, we saw it happen to Nintendo, InfraGard, L-3 Communications, Google mail, PBS, Canada's Conservative Party, Citigroup, Lockheed Martin, NASA, Fox Broadcasting Company, LIGATT Security International, Sony, FBI, CIA and even the hit TV show, "The X Factor." According to the FBI 55% of computer crimes come from stolen computers. If multi-million and multi-billion dollar companies, who have thousands of employees working within their IT departments can get hacked, your home or small business network is next How to "Hi-Jack" a facebook or twitter account and what you can do to protect yourself. How to get anyone's IP Address to your network or computer. How to scan a network or computer looking for ways to hack into their computer. How to hack into a computer once you've completed your scan. How to install spyware on computers and how to detect them. How to install spyware on a cell phone and how to avoid it or detect cell phone spyware. How to avoid having your computer stolen. How to track down a cyberbully. How to track down a hacker. How to be invisible on the internet. How to hack a persons voicemail and how to protect your voicemail from being hacked. How to send untraceable emails and text messages. How to send an email and make it look like it came from someone else. Social Engineering. This is where you convince a person to give you their username and password. This Class Includes: The eBooks' for your iPhone, iPad or Android phone or tablet How To Become The Worlds No. 1 Hacker Laptop Security Short and Simple 48 Ways To Protect Your Personal Computer 3-month subscription for AmIHackerProof.com 3-month subscription to HTCS Suites 60-minute subscription to SPOOFEM.COM A copy of the class video, so you can remember everything you learned in class A free T-shirt Two Ways to Join: Live in person at Embassy Suites Atlanta - Buckhead 3285 Peachtree Road NE, Atlanta, GA 30305 Jan. 28, 2012 from 10:00 AM to 2:00 PM Via Skype if you are not in the Atlanta area
Return-Path: (no-reply@locatepc.net) X-Original-To: [redacted] Delivered-To: [redacted] Received: from mx2.gigahost.dk (unknown [46.183.139.167]) by mailstore1.gigahost.dk (Postfix) with ESMTP id 3F3DC2607E95 for (redacted); Thu, 5 Jan 2012 18:28:08 +0100 (CET) X-Greylist: delayed 526 seconds by postgrey-1.32 at mx2; Thu, 05 Jan 2012 17:28:07 UTC Received: from 50-57-106-81.static.cloud-ips.com (50-57-106-81.static.cloud-ips.com [50.57.106.81]) by mx2.gigahost.dk (Postfix) with ESMTP id BFEBD33831D1 for (redacted); Thu, 5 Jan 2012 17:28:07 +0000 (UTC) Received: by 50-57-106-81.static.cloud-ips.com (Postfix, from userid 1009) id DE620E38F1F; Thu, 5 Jan 2012 12:19:41 -0500 (EST) To: (redacted) Subject: LocatePC/MAC Features X-PHP-Originating-Script: 1009:class.phpmailer.php Date: Thu, 5 Jan 2012 12:19:41 -0500 From: no-reply@locatepc.net Reply-to: no-reply@locatepc.net Message-ID: (b64962c82450d2e38b44dc489c28f786@localhost.localdomain) X-Priority: 3 X-Mailer: PHPMailer 5.1 (phpmailer.sourceforge.net) MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="b1_b64962c82450d2e38b44dc489c28f786" LOGIN Skip to content Home FAQ Products Purchase How does it work? Downloads Help Contact us Blog Sitemap LocatePC/Mac Features Geolocation - LocatePC/Mac uses the most efficient and successful way to get your lost or stolen computer back. Using the mobile tracker and apps for the iPad and iPhone, you do not have to depend on the law enforcement during the recovery process. Receive alerts each time your computerâ??s IP address changes. Video Snap Shot â?? If a person has a camera connected to their laptop, LocatePC/Mac will take snap shots every 30 seconds of the person and/or everything in the room. It will then add the pictures to the LocatePC/Mac Control Panel with a date and time stamp. Key Logging â?? The ability to record all the key strokes the thief types. For instance,if the thief logs in to their Facebook or Twitter account, you will have the ability to access their real name, username and password. Text Message â?? The ability to set your computer to text message your cell phone or email you every time the computers IP Address changes. Text to Screen â?? The ability to send a message to your computer screen that the thief can read. Shut Down â?? The ability to have the computer shut down every time the thief turns your computer on. File Recovery â?? Once LocatePC/Mac is installed on the computer, set up folders you want constant access to. If your computer is stolen you can delete those specified files or feel comfortable knowing your sensitive information is protected from the thief wiping the hard drive. Activity â?? LocatePC/Mac will check into the Monitoring Center allowing you to see the IP address and the map of where in the world your computer is located. Groups â?? If you have a large organization i.e. a corporation or university, you can set groups. Take a group of the laptops running LocatePC/Mac and assign them to a group or department such as sales, marketing, freshmen class or biology department. Inventory â?? Attempting to track all the desktops, laptops, iPhones and iPads; along with current operating systems, memory, hard drive space and even their location can be difficult to say the least. LocatePC/Mac takes complete inventory of each device anywhere in the world. Reports â?? Get PDF reports of Short Inventory, Detailed Inventory, Keylogger Reports, Image Reports, Police/Insurance Reports. Police/Insurance Report â?? If your computer is lost/stolen click 1 button and a detailed PDF report will be generated to send to the police or insurance company. Unlimited Monitoring â?? To monitor 1, 2 or 2000 computers, you do not need multiple accounts. Monitor unlimited accounts with 1 username and password. iPad/iPhone â?? Stolen or Lost?? Track your computer right from your iPhone or iPad for free. Beginning April 1, 2011, track your iPad and iPhone FREE! Upgrades â?? Unlimited FREE upgrades! Some companyâ??s charge for software updates, not LocatePC/Mac. â??The U.S. Federal Trade Commission recommends using tracking devices like LocatePC/Mac which can help track down the location of a stolen laptop. We are excited about this product launch and know this product will benefit our customers.â??
From: no-reply@nationalcybersecuirty.com Sent: Friday, January 06, 2012 10:41 PM To: Subject: Nation Cyber Security Radio Home About Contact Earn Cash Blogging Log In Latest Cyber Security Radio Show National Cyber Security Click to listen to radio show NCS 01/06/12 - Jan 06,2012: A SWEDISH company has created eye-control computer technology that could spell the end of the traditional mouse. The Tobii Gaze enables users to operate Windows 8 by looking where they want to click. Yesterday in federal court, a 49-year-old Carver man pleaded guilty to producing inapropriate images of a child. Randy Davies Anderson specifically pleaded guilty to one count of production of those images by using his computer. Also check out the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 01/05/12 - Jan 05,2012: Voters in many states will have an easier time casting their ballots in 2012, as elections officials are now allowing some people vote via email or iPad devices. Theyre also using technology to help count ballots faster and keep track of ballot boxes. Passwords could become a thing of the past for Apple iPhone and iPad users; the tech company recently revealed a patent application for what it i s calling .Low Threshold Face Recognition,. a tool that would allow users to unlock their phones by simply picking up the device and pointing it at their face. Also check out the job of the day!! hacker | cyber security | cyber crime | cyber security | technology Click to listen to radio show NCS 01/04/12 - Jan 05,2012: Evidence collected by computer forensics teams has recently become admissible in US and Canada court systems. U.S. Attorney William J. Hochul, Jr. announced today that Eugene DeBerger, 59, of Rochester, N.Y., was charged by criminal complaint with knowing infringement of copyright for purposes of private financial gain. Also check out the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 01/03/12 - Jan 03,2012: Cyber bugs are big trouble for many websites, mostly those sites frequently accessed by users. Most companies have their own ways to tackle bugs and pay a good amount of money to bug hunters. Facebook, however, has found a unique way to reward its bug hunters. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 01/02/12 - Jan 02,2012: It follows a hack attack which led to the theft of personal details of 45m Chinese customers of various banks. The Chinese government is taking steps to crack down on domestic cyber criminals who steal online banking d etails. An official of Iran.s Judiciary announced new limitations on using cyber space and content publishing on the Internet ahead of the upcoming parliamentary elections. Barnaby Lenon, chairman of the Independent Schools Council, said young people.s reading and conversational skills were being put at risk by overexposure to modern technology. Also check out the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/30/11 - Dec 30,2011: Computer hackers plan to take the Internet beyond the reach of censors by putting their own communication satellites into orbit. A federal grand jury has indicted six foreign nationals on charges related to an Internet sales scheme that allegedly defrauded Americans who attempted to purchase automobiles and other vehicles on the Internet through websites that included eBay Motors, Auto Trader, Yahoo Auto, Edmunds.com and Craigslist. Mobile device users continue to be lax about installing security software or using strong pass codes to protect data saved on their mobile devices, behavior that can have an impact on enterpris es. Also check out the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/29/11 - Dec 29,2011: < p> A report from bug identification specialist TippingPoint indicates that Microsoft remains a leader in an unwelcome category: The software giant is one of the most sluggish responders when it comes to patching bugs in its programs. New York Assemblywoman Jane Corwin announced Tuesday she has authored and introduced landmark legislation to create the crime of cyber-bullying in New York state. With the .License. app for Apple iPhones and iPads, making a realistic fake ID has never been easier; to prevent this app from falling into the wrong hands that would use it for nefarious purposes, Senator Bob Casey (D -- Pennsylvania) recently requested that Apple remove the app from its online store. Also listen for the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/28/11 - Dec 28,2011: The Controls Systems Security Program (CSSP) at DHS and Idaho National Laboratory have created a series of training programs for managerial and technical people in the critical infrastructure sector that are packed with up-to-date information on cyber threats and mitigations f or vulnerabilities Detectives from UK.s top cyber crime unit have spotted out various websites, which are targeting Olympic visitors by using Olympic images. SEN. Edgardo Angara is pushing for the passage of Senate Bill 2796, or the Cybercrime Prevention Act, to bolster the capacity of the country.s two main law-enforcement agencies, the National Police and the National Bureau of Investigation (NBI). Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/27/11 - Dec 27,2011: A Law Firm is branching out into a digital forensic lab, a move to capitalize on the computer crime phenomenon and offer integrated legal and technical consulting services. An Indian man is in hot water for allegedly changing someones email information to steal money and deposit that cash into his account. Also check out the job of the day! computers | cyber security | cyber crime | hackers | technology Click to listen to radio show NCS 12/26/11 - Dec 26,2011: The loosely-associated band of hackers known as Anonymous claims to have targeted the global intelligence think tank Strategic Forecasting. As we approach 2012, we.ve seen plenty of predictions on what types of security threats to expect in the coming months. If the predictions are correct, expect your mobile device to be under attack, no matter which OS you use. Also check out the job of the day. hackers | cyber crime | cyber security | computers | technology Click to listen to radio show NCS 12/23/11 - Dec 23,2011: People in poorer countries send text messages more often than those in wealthier countries. Men in Spain and Germany access the Internet on their phones twice as much as women do. Italys Finmeccanica and U.S. company Northrop Grumman have joined to help NATO boost its ability to quickly detect and respond to cybersecurity threats. Bloomington police.s cybercrime unit is getting some high praise from federal prosecutors. Also check out the job of the day!! hacker | cyber se curity | cyber crime | computers | technology Click to listen to radio show NCS 12/22/11 - Dec 22,2011: Identity theft can be easy for thieves preying on holiday travelers, whether through low-tech tactics like snooping or as a result of stolen or left-behind electronics. Malware has become very sophisticated in its entry, infection and damage mechanisms . and 2011 saw a dramatic increase in attacks. In the UK, the information commissioner reported that data security breaches were up 58% in 2011/12 so far. Also check out the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/21/11 - Dec 21,2011: Lawyers for the Army intelligence anal yst blamed for the biggest national security leak in American history rested their case today, with closing arguments ahead before Pfc. Bradley Manning learns whether he will face a court-martial. A group of hackers in China breached the computer defenses of Americas top business-lobbying group and gained access to everything stored on its systems, including information about its three million members, according to several people familiar with the matter. Malware targeting devices cell phone devices jumped 37 per cent since last quarter. Mobile security threats have become a reality. Malware growth for 2011 is set to exceed last years, with the Android operating system emerging as the main target. Also check out the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/20/11 - Dec 20,2011: Phishers, credit-card cloners and identity thieves will be busy today, searching for ways to take advantage of interest in the life and sudden death of North Korean dictator Kim Jong Il. Adobe has warned users of a critical vulnerability in its Flash Player that could potentially al low an attacker to take remote control of the compromised system. The biggest draw in television is entering the cyber world. The Super Bowl will be streamed online and to phones for the first time, the NFL announced today. Also check out the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/19/11 - Dec 19,2011: You.ve probably heard that saying before, what goes around comes around. Well, it seems that.s exactly what.s happening to Attrition.org founder Brian Martin also known as Jericho. For years now, Brian Martin has used his site to target cyber security experts he deemed unworthy to join the field. He typically went after them claiming plagiarism, fake credentials, among other things. Cybercrime is a huge cost for the Indian population. The country loses billions of dollars to Internet fraud every year. Even worse, very few victims come forward according to government officials. While you are doing your holiday budget, you might want to account for the cyber criminal waiting to take advantage of you. Those crooks lurking online are expected to steal over $10 million this holiday season. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radi o show NCS 12/16/11 - Dec 16,2011: Cyber crooks will target small businesses, social media attacks will be more common, and mobile security threats will reach an all-time high in 2012. The Manhattan district attorney.s office plans on Friday to announce the indictment of 55 people who it said stole over $2 million as part of a cybercrime ring. Maria José Morgado, director of Portugal.s criminal investigation department, has this week called for greater political priority to be attributed to tackling cybercrime. Also check out the job of the day! hacker | c yber security | cyber crime | computers | technology Click to listen to radio show NCS 12/15/11 - Dec 15,2011: There.s been an email circling the Internet. It.s about the creator of attrition.org, Brian Martin. The email claims to expose him as a fraud, even though that.s what Martin claims to do of others in the cyber security industry. In 2011 Hi-Tech Crime Solutions gained over 100,000 new customers between it.s products such as SPOOFEM.COM, LocatePC and AmIHackerProof.com; its books like How To Become The Worlds No. 1 Hac ker; and websites and services like NationalCyberSecurity.com, National Cyber Security Radio, Nerds N Style, Stolen Computer Alert and iSpy uSpy. It seems that Latin American gangs are turning to the web to continue their crime sprees. That surge has analysts warning that organized crime in the region is developing an increasingly sophisticated understanding of information technology, and the ways to make money from it. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/14/11 - Dec 14,2011: The number of Anonymous members could be shrinking. Tuesday the FBI announced the arrest of a Connecticut man with ties to the Internet hacking group. California Attorney General Kamala Harris unveiled a new statewide cybercrime unit in Silicon Valley on Tuesday aimed at investigating and prosecuting such misdeeds as the ATM-skimming scheme that recently fleeced more than 500 Lucky supermarket customers. On Tuesday, San Francisco prosecutors got a badly needed boost to their ability to investigate high-tech crimes. The Board of Supervisors approved a $200,000 U.S. Department of Justice grant for the District Attorney.s Office to pay for a senior investigator, forensic equipment and training for the office.s high-tech crimes unit. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/13/11 - Dec 13,2011: The Government Accountability Office (GAO) found there are some serious problems for government agencies. After an audit, the GAO discovered that there.s a problem in effectively developing or implementing a cyber security workforce planning strategy. There have also been issues in filling cyber security positions, especially those requiring specialized skills. Sen. Edgardo Angara renewed his call for the establishment of a legal framework for investigating, apprehending, and prosecuting cybercriminals, as he defended on Tuesday the Cybercrime Prevention Act also known as Senate Bill 2976. California is cracking down on cyber security. California Attorney General Kamala Harris is set to announce the creation of a new criminal unit to investigate and prosecute identity theft, cybercrimes and other criminal activity involving technology. Also check out the job of the day!!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/12/11 - Dec 12,2011: Scammers have a new target and they are hoping to cash in big if you fall for their trap. They latest scam involves the Federal Deposit Insurance Corp. (FDIC). That organization is warning banks of another strand of phishing attacks claiming to come from the FDIC. Cyber Crime or E-crime is on the rise among middle-aged people, according to the National Crime Records Bureau (NCRB). Bulgarian authorities have a big arrest under their belts. Law officers there arrested three men on charges of being part of an international cybercriminal gang that targeted U.S. bank customers. Also check out the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/09/11 - Dec 09,2011: The Christmas spirit hasn.t slowed down hackers at all. In fact, it may be fueling the fire and motivating them to steal more. Software developers will be vital in ensuring enterprise security in 2012. Enterprise IT departments are no longer the only folks on the hook for locking down corporate networks according to Richard Clarke. It.s the end o f the year and that always means there will be plenty of best of 2011 lists. One list includes they best hacking incidents of this year. Here are the top two so far. Also listen to hear the job of the day!! hacker | cyber security | cyber crime< /a> | computers | technology Click to listen to radio show NCS 12/08/11 - Dec 08,2011: Attorneys from around Washington are meeting in Seattle this week for updates on the hottest legal topics heading into the New Year. Some stem from the sweeping changes to the Washington workers compensation system that go into effect Jan. 1. The Romanian secret service (SRI) and the FBI on Wednesday pledged to step up joint efforts to fight terrorism and cybercrime, during a visit by FBI director Robert Mueller to Bucharest. Data managers will be aware of the rise in cyber crime in recent years and the increasing sophistication of attacks, but there are steps businesses can take limit the risk. Also listen to hear the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/07/11 - Dec 07,2011: Teamwork with the FBI and the Bulgarian police helped to round up an international cyber crime gang. The gang has allegedly been draining money through illegal transactions. As the threat of cybercrime continues to grow, governments and private companies are now exploring ways to tackle the problem together. This story is pretty good news, depending on where you live. The United States businesses take the threat posed to data management by cyber crime a lot more seriously by than by those in the UK. Also listen to hear the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/06/11 - Dec 06,2011: The effects of cyber security could trickle down into your home. That.s the latest threat from cyber criminals the United States is working to ward off. A report released this week from Massachusetts Institute of Technology says the country must have standards to fight against cyber attacks on power lines that run right into homes and businesses. A new web video comes as evidence the hacker group Anonymous is getting involved in the 2012 election. Draft legislation that proposes the establishment of a so-called National Information Sharing Organization will be the subject of a hearing held today by the House Homeland Security Subcommittee on Cybersecurity, Infrastructure Prot ection and Security Technologies. Also listen to hear the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NC S 12/05/11 - Dec 05,2011: Cyber security is has long been an issue for those in technology. Now, as it gains in popularity among criminals, it is also gaining as an economic problem. A survey recently released by PricewaterhouseCoopers showed that cybercrime is the fourth most prevalent economic crime globally. Some experts even predict that it will shoot up to second on that list in about two years. Take cybercrime more seriously. That.s what.s governments around the world are being urged to take the threat of cybercrime more seriously as a new initiative is set to bring help to countries looking to keep online scammers at bay. The New Year will bring new opportunities for most consumers and businesses. Unfortunately, those new opportunities are often accompanied by new threats posed by cybercriminals bent on exploiting cybersecurity in new ways. Also check out the job of the day. hacker | cyber security | cyber crime< /a> | computers | technology Click to listen to radio show NCS 12/02/11 - Dec 02,2011: Hackers coulb be hitting you where it hurts, your smartphone or you tablet. Cyber criminals are stepping up in their ways to get your online information and you may be surprised to hear what they are doing now. Britains electronic listening agency, GCHQ, is trying to reach individuals with "a keen interest in code breaking and ethical hacking" for new career opportunities. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 12/01/11 - Dec 01,2011: Congress may not be able to agree on much theses days but they do realize something needs to be done to better protect the country from a cyber attack. Because of that very real threat, Congress is headed in the right direction to passing a cyber security bill. A new cyber crime campaign is drawing national attention. The FBI warns of a scheme where crooks launch crippling cyber attacks against banks while simultaneously harvesting your bank-account credentials and making it impossible for you to get your money back once the fraud is complete. Your cellphone could have spyware on it and you don.t even know it. According to Android developer Trevor Eckhart, over 100 million smartphones track their owners&rsqu o; every move as a result of preinstalled software from most major carriers. Also check out the job of the day!!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/30/11 - Nov 30,2011: The United States Federal Bureau of Investigations helped to make a huge arrest, putting behind bars four Manila people accused of hacking numerous trunk lines of multiple U.S. telecommunication companies. One well-known target was AT&T. The cloud is the next big thing in computer technology and apparently hackers know that. In order to fight cybercrime in the cloud, Trend Micro, a computer security company, is looking to link up with the International Cybersecurity Protection Alliance to establish the "Global Cyber Nation" in Washington, D.C. Cyber crime is on the rise and some experts say it.s your fault. Researchers have applied criminological concepts and research methods in the study of cyber-crime, leading to recommendations for IT managers to use in the prevention of cyber-attacks on their networks. Also, check out the job of the day!!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/29/11 - Nov 29,2011: Buying a cheap knock off of the hottest designer may seem innocent enough. However, it& rsquo;s illegal to copies of high-end merchandise without giving credit or money to the real designers and creators and the FBI stepped in to put some of those people who allegedly sell fake items behind bars. Is it fact or is it fiction. HP is looking into claims that any LaserJet the company made prior to 2009 could remotely catch on fire on a hacker.s control. Facebook has taken some heat recently for its privacy policy. Today, it reached an agreement with the Federal Trade Commission regarding the social networks policy on changing privacy controls and informing users of those changes. Also check out the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/28/11 - Nov 28,2011: The UK government wants computer users to feel free to use an open and uncensored Internet but the country is also taking steps to introduce measures to by cyber criminals from the web. The British government is taking a proactive stance to prevent cyber crime. Last week, the country announced the creation of a cyber security hub as a part of its cyber security strategy. Researchers h ave been busy trying to make sure the cyber world and the real world safe places for everyone. They are crafting self-powered sensors for installation in insect cyborgs. That will enable them to perform surveillance, monitor hazardous environments and assist first-responders in search-and-rescue missions. Also check out the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/25/11 - Nov 25,2011: The United States officially announced that the military has the right to retaliate with military force against a cyber-attack. There.s a big debate going on. The question is how secure is the Android operating system. A report came out last week with a report that said mobile malware on Android platforms has climbed 472 percent since July. It apparently was a big payout for one alleged hacker victim. According to court records, the government paid nearly $2,500 for Sarah Palin.s husband, Todd, to come to the trial of a Tennessee college student who hacked into her email. The problem is Todd Palin never testified according to court records. Also check out the job of the day!!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/24/11 - Nov 24,2011: Cyber crime is taking over according to one cyber security expert. Some believe that you are more likely to be a victim of crime online than in the real world. Cyber crimes are up all over the world, including India. Most cases pertained to forgery, criminal breach of trust or fraud. It may surprise you to know that even the IT and TMT sector are not immune to cyber security breaches. New research shows that 75 percent of those enterprises within the TMT sector have reported a security breach so far this year. That.s an increase of 13 per cent on the previous year. Also listen to hear the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/23/11 - Nov 23,2011: It.s a frightening thought but cyber criminals may have been responsible for a water pump failure at a public water district in Illinois. Federal officials have confirmed they are investigating the incident. Be careful. That.s the message from Dr. Abdullah al-Mal, Chairman of the Board of Directors of Qatar Foundation for Combating Human Trafficking (QFCHT), when it comes to dealing with the crimes perpetrated thr ough the Internet. Ireland has a major problem with organized crime. However it.s not the type of organized crime you may be used to hearing about in the news. Government officials say almost all website hacks in the country have been linked to organized crime gangs. Their primary motive is believed to be money. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/22/11 - Nov 22,2011: The well-known hacking group Anonymous has allegedly been at it again. The group claimed to have leaked thousands of private emails that belonged to Fred Baclagan, a retired California cybercrime investigator. The hacking was in response to a recent crackdown on Occupy Wall Street. Cyber crime may be creeping its way onto Facebook according to some cyber experts. Governments around the world will focus on the social networking site as the rise of hacking groups brings an increased threat of cyber warfare. Top leaders from around the world are meeting this week to focus on cybersecurity. Delegates from around the world are in France to discuss the only internation al treaty dealing with cybercrime. Also listen to hear the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show N CS 11/21/11 - Nov 21,2011: If you thought the News of the World hacking scandal was over, think again. Some of the victims of the hacking scandal, including celebrities and family members of crime victims, are scheduled to testify at a nationally televised inquiry into media ethics. Technology appears to be an easy target for hackers. According to a report from Deloitte, three quarters of technology, media and telecoms firms have been victims of cyber attacks this year alone. As the year winds down, things are not looking much better for 2012 when it comes to cyber security. Experts expect your cellphone will be responsible for more cyber security breaches in the year to come according to security vendor M86. Also listen to hear the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/18/11 - Nov 18,2011: Cyber security is quickly climbing up the list of importance for the federal government and apparently with good reason. Hackers have been busy and cyber thieves have cashed in on innocent victims online. Lawmakers are focusing on cyber security. One way t o ensure change, they say is to add laws to fight cyber crime. One detective went undercover to prove just how serious cyber crime is and the damage it can do. How did he do it? He went online and did a lot of work on Facebook. Also, check out the job of the week. Make sure you tune in!!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/17/11 - Nov 17,2011: Lying on the Internet could be against the law. The Department of Justice recently asked Congress to make some changes to the Computer Fraud and Abuse Act. Those changes would make it a crime to break terms of service or violate workplace policies. The United States government says it is ready to fight cyber crime if the government is attacked. The Defense Department says if the President gives an order in response to hostile cyberattacks against the U.S. economy, government or military, it is ready to launch offensive cyber operations against specific foes. There.s a war going on in the cyber world and in order to win, the government says the public and private sectors have to work together. Cyber security experts say t he effort against cyber crime is very complex and the more hands in the pot fighting against cyber crime, the better. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/16/11 - Nov 16,2011: If the Department of Justice has its way, cybercriminals could be prosecuted in a new way. The DOJ hopes to include cyber crime under a racketeering law. The final report is out today. Information from a Congressional advisory panel advising lawmakers on U.S.- China relations showed several things including a new assessment of the malicious cyber activities that hit two U.S. government satellites from 2007 and 2008. According to British police, cyber security helped to make sure the royal wedding went off without a hitch earlier this year. The Scotland Yard.s cybercrime unit helped to fight off an attack on the international event. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/15/11 - Nov 15,2011: House lawmakers on Tuesday are slated to mull updating a 1986 anti-hacking law that even ideological opponents agree criminalizes innocent Web surfing. However, when a Senate panel discussed the Computer Fraud and Abuse Act in Se ptember, Justice Department officials argued that changing the penalties could let legitimate bad guys off the hook. The cost of securing smart grids around the country is expected to skyrocket in just a few years. A report that came out this week titled .Smart Grid Security. found that $590 million dollars was spent on smart grid security in 2010. That number expected to jump to $2 billion dollars by 2016. According to AVG, the average 11-year-old child has "adult skills when it comes to technology." In other words, they can perform any task that an adult can when it comes to surfing the Web, getting a gadget to work, or solving complex computer issues. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/14/11 - Nov 14,2011: It appears that hackers have gone from targeting others to becoming targets themselves. The major drug cartel Los Zetas is reportedly sending strong messages to both bloggers and hackers. Last week the group took responsibility for gruesomely decapitating a Mexican blogger and dumping his body in public. Recent reports of the computers used to pilot General Atomics Aeronautical Systems Predator drones being infected with a computer virus -- one that so far has proven impossible to remove -- are a perfect example of why cyber security is becoming an increasingly hot topic in defense. If you do the crime, you should do the time according to the top cop in England. The head of the Scotland Yard.s e-crime unit believes cybercrimes should get tough sentences. Det. Supt Charlie McMurdie criticized judges for going too easy on e-banking fraudsters while throwing the book at the old-school cohorts in crime. Also, listen to hear the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/11/11 - Nov 11,2011: File sharing is going to be a bit harder. The Italian police division which handles cybercrime cases announced it shutdown several file-sharing websites. NATO is working to get all its agencies and commands under a single cyber roof by the end of 2012, but lacks a strategy to respond to an all-out assault on civilian critical infrastructure throughout the European Union according to reports. Is letting people cast votes from their home computers is a recipe for chaos? Some cyber experts say yes. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/10/11 - Nov 10,2011: The London Metropolitan Police Services PCeU (Police Central E-Crime Unit), announced the sentencing of a pair of Ukrainian nationals after they were found using a bankers Trojan for stealing money out of several Brits accounts, the number remaining unknown. Their alleged ring affected millions of computer users around the world but today members of an international cyber ring are behind bars. The FBI announced Wednesday the arrest of six Estonian nationals for their alleged roll in running a sophisticated Internet fraud ring. Law officers say the ring infected the computers with a virus and enabled the cyber crooks to manipulate the multi-billion-dollar Internet advertising industry. Pending in Brazils House of Representatives is a proposed cybercrime law that could criminalize many ordinary online activities and that would mark an abrupt shift in Brazils progressive digital policy environment . The Committee on Science and Technology will vote on the bill this month. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/09/11 - Nov 09,2011: Federal law officers made a major arrest spanning 100 countries and millions of computer users. Malware Secretly Re-Routed More Than 4 Million Computers, Generating at Least $14 Million in Fraudulent Advertising Fees for the Defendants You may not be able to keep your personal information on your smartphone safe from hackers. Cyber experts say there.s a bug in Apple.s mobile operating system that allows cyber criminals to take control of your iPhone and iPad apps. With access, hackers can steal your photos, contacts and even send text messages without your knowledge. UK police are considering adding cybercrime data to their online crime map to their website. Also listen to hear the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/07/11 - Nov 07,2011: Hackers have allegedly targeted the German sportswear and equipment manufacturer, Adidas. The company allegedly had to take its website offline after facing a sophisticated and criminal cyber assault. You might be happy to know that even hackers get hacked too. Some researchers say that hackers have formed gangs and hack each other. Hackers are making big money covering a wide range of targets. Their latest target appears to be smartphones. GetSafeOnline.org is a government backed site that warns that smartphone malware and rogue apps are bringing in big bucks and business for cyber criminals. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/04/11 - Nov 04,2011: Could illegally downloaded information cause a problem for cyber security? That is the answer many cyber security experts are trying to answer. It could be a lot easier than you think to get your information online. It.s something that cyber security experts have known for a while but are working to correct. The threat of cyber-attacks is very real and could potentially be very near-term according to a BrigadierGeneral. The commander goes on to say the nation will demand the military be engaged in cyber defense of the nation, because the military has the greatest capacity and capabilities to do so. Also chec k out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/03/11 - Nov 03,2011: British pol ice have made a major cyber crime arrest this week. A total of 13 people are behind bars for their alleged role in a sophisticated banking fraud gang that used malware to help steal at least $4.6 million from hundreds of people. The United States points the finger at China and Russia when it comes to cyber security. Cyber-attacks by Chinese and Russian intelligence services, as well corporate hackers in those countries, have swallowed up large amounts of high-tech American research and development data, and that stolen information has helped build their economies, U.S. intelligence agencies have concluded. Are criminal techniques a good way to prevent cybercrime? Some experts say the same Trojans cyber crooks use to steal information could be just what.s needed to protect us online. Also listen to hear the job of the day!! hacker | cyber security | cyber crime | computers< a href='http://www.blogtalkradio.com/rss/tag/computers.rss'> | technology Click to listen to radio show NCS 11/02/11 - Nov 02,2011: Microsoft Corp says hackers have used a previously unknown bug in its Windows operating system. Company officials say the hackers wanted to to infect computers with the Duqu virus, whic h some security experts say could be the next big cyber threat. He may be a basketball superstar but even Shaquille O.Neal isn.t immune to hackers. O.Neal claims he hired a computer tech who stole O.Neal.s private emails and sold them for profit. The man even allegedly threatened to use the electronic communications to harm O.Neal unless O.Neal paid the man twelve million dollars. If children are using Facebook too much, it could be partly their parent.s fault. A new survey showed that 36 percent of them were aware their children joined Facebook before age 13. It also shows that parents help their children lie about their age in order to join the social networking site. Also check out the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 11/01/11 - Nov 01,2011: Chinese hackers have been very busy according to one software company. Symantec helps consumers secure and manage their information-driven world. Well, they are saying that Chinese hackers are in the driver.s seat when it comes to cyber crime. It appears tha t Facebook needs plenty of security. The company says that it receives 600,000 logins to the social networking website from imposters every 24 hours. Those imposters attempt to access users. messages, photos and other personal information. Some of the world.s leaders gathered together to discuss cyber security. Today, ministers, tech executives and Internet activists met to discuss how to tackle security threats and crime on the Internet. The problem is they don.t want to stifle economic opportunities or freedom of speech while cracking down on cyber criminals. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/31/11 - Oct 31,2011: They may be at it again. Earlier this month, Anonymous allegedly named its next target. Believe it or not, they appear to be taking on the Mexican drug cartel Los Zetas. New cyber threats are creating new approaches from countries around the world. Countries are defending themselves by using the public.s help. The sharing of information between nations is seen as a critical aspect in narrowing do wn on cyber culprits across borders. Working together seems to be the global theme. Today Britain and India are teaming up to stop cyber criminals before they can act. The two announced they will jointly work on new avenues of research to make the Internet safer. Also check out the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/28/11 - Oct 28,2011: Hackers were close yet so far away. According to government officials, American infrastructure was a target for hackers numerous times and came very close to shutting down critical parts of it. Human error is still one of the biggest problems when it comes to cyber security. The Coon Rapids Police Department has one more tool to fight cyber security. The police department now has the ability to handle computer forensics investigations. The department now has $30,000 in software and hardware equipment that the Coon Rapids Police Department from the federal government for computer forensics investigations. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/27/11 - Oct 27,2011: The U.S. government is pointing the finger at China once again. Computer hackers, possibly from the Chinese military, interfered with two U.S. government satellites four times in 2007 and 2008 through a ground station in Norway, according to a congressional commission. Australia may not be prepared when it comes to a cyber attack. Cyber experts say Australias lack of data breach notification laws and the consequent failure of companies to take basic security measures is hurting the countrys reputation as a leader in security standards. Police have been busy taking calls this month from people reporting a phone scam using the popular computer company name of Microsoft. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/26/11 - Oct 26,2011: The government is stepping up its efforts to stop hackers. The National Security Agency now provides Wall Street banks with intelligence on foreign hackers. Some experts believe that is a sign of growing U.S. fears of financial sabotage. Is your privacy at risk? According to privacy watchdogs, it may be in danger if you use Facebook. Ireland.s Data Protection Commissioner began an onsite investigation following accusations that the company is creating ext ensive .shadow profiles. of non-users. Apple is going to battle with a German family café over a cutout silhouette and a leaf. The café owners say they named their restaurant to what translates to apple baby after a nearby apple orchard. Christin Romer says she commissioned a logo, which turned out to be a red apple that looked a lot like the tech giants logo. Also check out the job of the day! hacker | cyber security< a href='itpc://www.blogtalkradio.com/rss/tag/cyber-security.rss'> | cyber crime | computers | technology Click to listen to radio show NCS 10/25/11 - Oct 25,2011: Some of the things that have taken place in the cyber world may make you think that it came from a sci-fi movie. But experts say threats are very real and often times easy to do. Hackers have been on a roll. They have targeted small businesses, the government and even everyday Americans. The U.S. Federal Communications Commission plans to fight this cyber war with a new tool to at least help businesses develop a cybersecurity plan. A Virginia county is giving a computer the task of keeping cyber criminals off the streets. Loudoun County Police now have a ComputerCop. It.s a software prog ram that allows parents and others to view and delete certain images on any computer. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/24/11 - Oct 24,2011: The FBI has some pretty strong words about the security on the Internet. FBI officials say the way Internet security is now is not designed with enough security in mind to meet today.s threats. They also suggest that engineers and policymakers should consider developing an alternate version. Skype users can.t hide because of a reported flagrant security flaw in the service. The organization that helped to make hacking popular is having some financial problems. WikiLeaks announced it is temporarily holding off on publication to find funds to stay afloat. Also check out the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/21/11 - Oct 21,2011: Whenever there.s big news, scammers try to cash in and the death of Moammar Gadhafi is no different. Today a computer security firm warned that cyber criminals were trying to exploit photos of the slain Libyan dictator in an email scam. News International, publisher of the now-defunct News of the World newspaper in Great Britai n, will hand over millions of dollars to the family allegedly at the center of the scandal. The company agreed to pay $3.2 million - to the family of British teen Milly Dowler, who disappeared in 2002 and was later found dead. It seems that MC Hammer is too legit to quit! The former rapper is stepping into the cyber world with a new search engine. He hopes it will outperform Google, Bing and other established tools. Also check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/20/11 - Oct 20,2011: The Department of Homeland Security tapped a new man to work with cybersecurity partners across the country. Mark Weatherford will discuss issues that affect the federal government. This year has been a very busy year for hackers. You may remember Anonymous and LulzSec wreaking havoc on the federal government and businesses alike. Sony, PBS and websites around the world were easy targets and cyber security experts say the attacks probably won.t stop anytime soon. Two Maryland men will spend plenty of time behind bars for their role in a major identity theft r ing. Prosecutors say there were more than 250 victims in the Washington area. hacker | cyber security | cyber crime | computers | technology Click to listen to radio sho w NCS 10/19/11 - Oct 19,2011: Members of the ATM Industry are working to better protect themselves from cybercrimes. The association is highlighting reverse engineering and targeting of ATM software as a new way to prevent fraud. The FBI wants you to be on the lookout for yet another scam. This latest scam involves making you believe you have received a traffic ticket. If you think it, you may see it on your computer. That.s possibly the way of the future if researchers get their way. This week a scientist suggested that there may soon come a time when people no longer have to touch a keyboard or a mouse, or even speak a command, in order to perform a computer function. Instead, a person can think of a command and the computer will respond. Also check out the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/18/11 - Oct 18,2011: Britain says it.s better to be safe than sorry. The country says it is prepared to strike first to defend itself against a cyber attack from an enemy state. The Foreign Secretary made the statement today and gives an indication that the UK has developed new weapons for the online battlefield. It used to be a minor domestic crime but organized cybercriminals have turned ID trafficking into a global problem. The information they steal is so valuable to some criminals looking to cash in on your identity. Also listen to hear the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/17/11 - Oct 17,2011: It seems that even Sesame Street is not safe from hackers. And unfortunately they used very graphic images to prove their point. Cyber crime is up and security experts are blaming smartphones. The problem is the smartphone is too useful and too user friendly. If you were one of the many people affected by the recent BlackBerry outages, there.s some good news and some bad news. The good news is you may be able to get free apps to make up for the inconvenience. The bad news is you won.t get any cash. Also check out the job of the day! hacker | cyber security | cyber crime | computers< /a> | technology Click to listen to radio show NCS 10/14/11 - Oct 14,2011: It is an open secret that Chinese hackers have been lurking in the cyber world for years. They have allegedly targeted the American government and businesses. And now they may be re sponsible for yet another attack, this time on NationalCyberSecurity.com. The Air Force is trying to downplay the recent hacking of its war drones. The virus that recently infected the remote cockpits of its fleet of unmanned aerial vehicles operating over war zones was swiftly and easily contained according to Air Force officials. He may be a computer whiz-kid but he is behind bars today after trying to bring new bank card scamming technology into Britain. German Thomas Beeckmann was stopped in June at Victoria coach station having just arrived from Holland. Also, listen in to hear the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/13/11 - Oct 13,2011: Wednesday night, military officials divulged details of a virus that infected computers supporting drones that fly over battlefields. Air Force officials said they wanted to give out more information so people wouldn.t be concerned that missions were ever in jeopardy. He.s accused of hacking celebrities and now Christopher Chaney is behind bars. The Florida man allegedly hacked into a number of people .s emails including Scarlett Johansson, Christina Aguilera and Mila Kunis. The Harris County District Attorney.s Office in Houston, TX is taking a shot at crime prevention. The office announced that it now has two initiatives to help residents keep an eye out on crime by looking out for Internet predators and tracking down criminals on the run. Also listen to hear the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/12/11 - Oct 12,2011: Did it happen again? Was Sony the victim of another cyber attack? The company said today that it found a large amount of unauthorized sign-in attempts on its PlayStation Network and other online entertainment services. Because of that, it has temporarily suspended about 93,000 user accounts for those services. It has quickly spread overseas and BlackBerry is working hard to fix massive worldwide outages. Sprint Nextel announced today that it is working with BlackBerry-builder Research in Motion to fix the problem that has now reached the United States. It has already caused interruptions in Europe and Asia. It was a bus y day today for Apple. It released the latest versions of the software that powers its smartphones and iPad tablet computers. The company also unveiled its much anticipated iCloud service. Also, listen to the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/11/11 - Oct 11,2011: Was it or wasn.t it Anonymous that allegedly hacked into the New York Stock Exchange? The answer: maybe and maybe not. We do know that the NYSE.s site was in fact attacked twice on Monday. Some believe that it was the result of computer attacks as part of the weeks long anti-Wall Street protest. The state of Michigan is cracking down on cyber crime with a new cyber command center and cyber defense response teams. It.s a part of their plan to heighten the state.s profile in the computer security industry. You may think your actions online are safe and private but a new study released today says otherwise. They study results is renewing calls for .do not track. rules. Also listen to hear the job of the day!! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/10/11 - Oct 10,2011: The U.S. government remains tight lipped about a computer virus that infected the coc kpits of America.s Predator and Reaper drones. They are saying that the virus has been logging pilots. every keystroke while they flew remote missions over warzones including Afghanistan. It may be National Cyber Security Awareness month but that apparently is not stopping spammers. Cyber experts warn computer users that there.s been an upsurge in spam and virus-loaded emails this month. A cyberbullying law is getting some traction in the NY Senate. Sen. Jeff Kine now has support in proposing legislation to expand the crime of third- degree stalking to include cyberbullying. The recent suicide of Jamey Rodemeyer reportedly helped to move things along. Rodemeyer was a victim of bullying. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 10/7/11 - Oct 07,2011: If nothing else, the WikiLeaks scandal may make you more secure online. The White House plans to issue an executive order on Friday to replace a flawed patchwork of computer security safeguards exposed by the disclosure of hundreds of thousands of classified government documents to WikiLeaks last year. Facebook i s facing some more legal problems. This time it.s from a Kansas Facebook user. 42 year old John Graham filed a federal lawsuit against the social networking giant, claiming it violated wiretap laws with a tracking cookie that records web browsing history after logging off of Facebook. The death of Steve Jobs has touched people in many ways. Unfortunately, it.s also moving scammers to try and cash in on the Apple co-founder.s death. Tune in to hear the job of the day as well. hackers | cyber crime | cyber security | computers | techn ology Click to listen to radio show NCS 10/6/11 - Oct 07,2011: A top American lawmaker may be right after all. Just one day ago, China was accused of exercising .an intolerable level. of espionage right here in the county. Today, Russia.s spy service announced they detained a Chinese national for allegedly attempting to steal secrets about a Russian missile system. Identity theft is a growing issue. However if you have questions, theres a website to help you. The Consumer Federation of America opened a site called idtheftinfo.org. The site gives links to helpful, c redible websites that offer information and advice about identity theft and privacy protection. The economy is hurting every industry and technology is no different. Jobs in technology fell 2 percent last year, outright more than 115,000 people out of work. Thats the second consecutive year of falling employment in the industry. The good news is that the number of jobs lost was less than half of the more than 249,000 jobs lost the year before. Also, make sure you hear the job of the day!! hackers | cyber crime | cyber security | computers | technolog y Click to listen to radio show NCS 10/4/11 - Oct 04,2011: Crime may not pay for cyber criminals in England. The Metropolitan Police claim to have saved millions of dollars in the last six month of fighting cybercrime. The numbers are based on theoretical earnings the crooks could have made if police didn.t stop them. The United States has a cyber campaign and now so does Canada. Monday the Canadian government launched a website and ad campaign focused on getting Canadians to help fight cybercrime. The clock is ticking for those of you who want to get your hands on the new iPh one 4S. Today, Apple gave the public a glimpse of the faster version of its best-selling smartphone. It even includes a virtual personal assistant you can talk to. Also check out the job of the day! hackers | cyber crime | cyber security | computers | technology Click to listen to radio show NCS 10/3/11 - Oct 03,2011: Hackers have a very strong message. It.s that no one is safe from them, not even Prime Ministers. Officials say in an effort to embarrass the government, hackers targeted the personal Twitter account of Prime Minister Yingluck Shinawatra. A homeless man is facing some pretty serious charges for allegedly hacking into Santa Cruz County computers last December. He is out of custody but federal charges await him for now. If you have a smartphone, like most people do, you might want to pay attention to this story. Researchers believe they.ve found a flaw in several smartphone models produced by HTC. It gives any application that has Internet access the keys to a plethora of information on the phone, including e-mail addresses, GPS locations, phone numbers, and text message data. Also, check out the job o f the day! hackers | cyber crime | cyber security | computers | technology Click to listen to radio show NCS 9/30/11 - Sep 30,2011: You, the voter may not h ave as much of a say when it comes to who will be our next president. The 2012 Presidential may have hackers lurking to change the results. Betfair customers lost big but not because of what happened on the track but because they didn.t bet on cyber criminals cashing in. Criminals reportedly stole payment card details of nearly 2.3 million Betfair customers. October is National Cyber Security Awareness month and it is the perfect time to discuss cyber security with the young and the not so young. Surfing the web can be like surfing in shark- infested waters according to some experts. Social media makes anyone an easy target. Also make sure you listen to hear the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/29/11 - Sep 29,2011: The world of cyber crime is constantly changing according to a new report from IBM. The company released results of the X-Force 2011 Mid-Year Trend and Risk Report. It says that whaling is becoming more popular for hackers. They didn.t hack into computers but law officers say they did use the Internet to steal cash from an Indi an woman. Police arrested four Nigerians after they allegedly lured the Indian teacher into a fake ICC World Cup lottery scheme. West Virginia State Police hope to crack down on cyber criminals and they are teaming up to do it. The police will work with West Virginia University and the National White Collar Crime Center to form the West Virginia Cyber Crime Cooperative. Also make sure you listen to hear the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/28/11 - Sep 28,2011: A major international arrest came today. Indonesia.s National Police arrested 35 Chinese and Taiwanese nationals at the request from Interpol. They were all allegedly involved in cybercrime. The best way to fight cybercrime is to constantly monitor your network. That.s the latest from a senior official for Arcsight, a subsidiary of Hewlett Packard. Microsoft took down what.s being described as a small but dangerous botnet. On Monday, a Virginia federal judge ordered VeriSign to shut down almost two dozen domains linked to servers that controlled the Kelihos botnet at the req uest of Microsoft. Also tune in for the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/27/11 - Sep 27, 2011: Some of the world.s top leaders have gathered together this week. While they will discuss several issues at the United Nations Internet Governance Forum, cyber security will be one of the big items on the list. There will be workshops on protecting youth against the exploitation and exposure to adult content. Cyber security is traveling overseas. Ghana has established the first ever computer forensics firm with a new e-crime laboratory. It will assist the country in fighting cyber crime. New York Governor Andrew Cuomo hopes a new act he signed will provide a way for teens to preserve their records and reputations. It.s called the Cyber-Crime Youth Rescue Act and it could help teens for whom a quick .sext. message could lead to a criminal conviction. Also listen in for the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/26/11 - Sep 26,2011: She.s topped the charts and now she.s trying a new gig, fighting cybercrime. Pop superstar, Lady Gaga wants to stop bullies and she used her recent concert to do that. The suic ide last week of bullied teen Jamey Rodemeyer prompted Lady Gaga to get involved. The Pentagon is stepping up to the plate to stop cybercrime with a pilot program to help protect its prime suppliers. If it works, the program could serve as a model for other government agencies. If you.ve been on pins and needles waiting for the next iPhone, you won.t have to wait much longer. According to reports, Apple announced you.ll get to see the next-generation iPhone at an event on Tuesday, October 4th. Also, listen in for the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/23/11 - Sep 23,2011: Law officers made a major arrest in the Sony Picutre hacking case. A federal grand jury indicted 23- year old Cody Kretsinger for his alleged roll in hacking the major corporation earlier this year. Kretsinger is a suspected member of the hacking group LulzSec and he was arrested in Arizona on Thursday. Security firms warn you better be careful the next time you use your computer. They say there.s a new Trojan horse masquerading as a PDF document to Mac users. It.s been a political fight that might seem to be over. California Governor Jerry Brown signed a bill today over whether Internet retailers should collect sales tax. Also, tune in for the job of the day. hacker | cyber security | cyber cri me | computers | technology Click to listen to radio show NCS 9/22/11 - Sep 22,2011: There are multiple vulnerabilities on Adobe Flash Player and Adobe is working to fix the problem. Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code, obtain sensitive information, cause a denial-of-service condition, or perform a cross-site scripting attack. Facebook has 750 million users worldwide. Twitter users now send one billion tweets a week and LinkedIn operates the world.s largest professional network on the Internet with more than 120 million members. If you think social media is going away, think again. Cyber experts say that makes the jobs of cybercriminals way too easy. Identity theft is a growing problem in Massachusetts. The Attorney General.s office has been busy with more than 1100 notices of data breaches in less than two years. Also, listen in for the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/21/11 - Sep 21,2011: The latest cyb er attack may have taken place across the ocean, but U.S. officials are taking notice. Mitsubishi Heavy Industries was hit and the attack involved at least eight different types of malware. Cyber criminals are very busy overseas. According to officials, Malaysia sees incidents of online threats at least twice an hour. So far, more than 10 thousand cases have been reported this year alone. One technology company is turning what some see as a disadvantage into a major reason to hire people with disabilities. Aspiritech, is a nonprofit organization in Illinois. It plans to hire adults with autism as software testers. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/20/11 - Sep 20,2011: A New Zealand teen is behind bars, charged with threatening the government on YouTube. The threats were reportedly made in a video on YouTube. It included claims that explosives had been hidden in New Zealand government buildings. Law officers say a poker site took a gamble and lost when it tried to steal hundreds of millions of dollars. Tuesday, federal prosecutors said the operators of the online site Full Tilt Poker ran a Ponzi scheme through the site. The operators allegedly took more than $440 million in gambler winnings to give to board members and owners. A well known presidential advisor offers his take on the nation.s cyber defense. Richard Clarke says the country lags in the capabilities of those attacking us online. He believes the country is leaving critical infrastructure and data vulnerable to more sophisticated attacks. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/19/11 - Sep 19,2011: Hackers don.t appear to be slowing down anytime soon. This time they reportedly managed to target U.S. intelligence officials, including some from the Obama Administration. The names and addresses of hundreds of those officials were posted on an anti-secrecy website after computer hackers allegedly took them from the internal membership list of the Intelligence and National Security Alliance. They may be hackers but they are saying no to cybercrime. Gong Wei and Wan Tow released a convention calling for the rejection of cybercrime. They are asking their associates and peers to support it. A UK tabloid will have to shell out some big bucks for its alleged role in phone hacking. News International, which is the UK division of News Corp, will reportedly pay $4.7 million to the family of Milly Dowler. She is the 13- year old murder victim allegedly involved in the News of the World phone hacking scandal. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/16/11 - Sep 16,2011: Is Yahoo up for sale? Maybe or maybe not. The founder of the company Jerry Yang says the company is not up for sale but says the company is exploring strategic options. Groups like LulzSec and Anonymous have apparently taught those in the technology world a very valuable lesson: you need to protect your data. In an effort to better preparefor cyber attacks, teachers, students and cyber experts gathered at the 2nd Annual New York Institute of Technology Cyber Security Conference Thursday. As the school year started so did something else: New Jersey.s landmark legislation. The Anti-Bullying Bill of Rights, went into effect last week as students across the state began the 2011/ 2012 school year. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/15/11 - Sep 15,2011: They are thousands of miles away but they are wreaking havoc on computer users around the world. Cyber experts say an international cybercrime gang is currently on the loose, orchestrating attacks on major U.S. corporations and government organizations to the tune of $3.2 million in the first six months of the year, or $17,000 a day. Do you have a bit of a temper? If you do, you may be more likely to be a target of cybercrime. That.s the latest from a new report from Norton. As the list of cyber attacks gets longer and longer, experts say those attacks won.t stop anytime soon. However, there is hope. They believe the publicity of hacking will only make people more aware and better prepared to fight cybercrime. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/14/11 - Sep 14,2011: Men seem to be the most common victims of cyber attacks according to a new study. A new Symantec report studied 500 Singaporean adults and found that 86 percent of men are likely to become a victim of cybercrime versus 74 percent of women. Two major cyber giants could be headed back to court soon. Auto-Completion So lutions LLC or ACS says Google Inc. and Facebook Inc. infringed on its technology patent by incorporating it on their websites. It seems that people want the government to get involved when it comes to cybersecurity. A recent Eset/ Harris Interactive poll found that 91 percent of respondents feel vulnerable in some way to cyberattacks. Eighty-four percent think the Federal government should have some responsibility in protecting their online identities. We will also have the job of the day. Make sure you listen in! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/13/11 - Sep 13,2011: It may seem like innocent banking protection but experts say this latest Trojan is anything but innocent. The Trojan steals SMS messages and can intercept text messages, sending them to the attacker.s command and control server. The UK government is asking search engine sites like Google to step up to the plate and help fight online piracy. Government officials are expected to ask Google to make it more difficult for piracy sites by blocking them. With kids headed back to school, cyberbullying is something on many students and parents. minds. A San Francisco based nonprofit organization kicked off its national campaign this week to help keep kids safe online. Also, check out the job of the day! hacker | cyber security | cyber crim e | computers | technology < BR/> Click to listen to radio show NCS 9/12/11 - Sep 12,2011: Hackers turned to Twitter to wreak havoc during preparations for the 9/11 ceremonies this weekend. They allegedly hacked into the NBC News account and posted false messages about a new attack on New York.s ground zero. It beat out some of the top thinkers in the world at Jeopardy. Now, IBM.s Watson computer has a pretty neat job to add to its resume. The company will work with WellPoint to bring Watson technology to the healthcare sector. The cyber world isn.t just about hacking into other people.s computers and shutting down networks. It can actually be used for very good causes like finding a long lost son. Thanks to Facebook, Kattia Liebers was reunited with her 17 .year- old son after he was taken from her 12 years ago. Also, make sure you check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/9/11 - Sep 09,2011: Hackers and mobsters have a lot in common ac cording to President Obama. His administration wants to impose stricter punishments for cyber-criminals because of increased data breaches. The U.S. government wants to hold businesses accountable if they have week cyber security. Lawmakers plan to introduce a bill next week that would fine big companies that lose consumer data in a security breach if that breach is a result of poor security measures. Police say she led a sophisticated conspiracy to import and sell counterfeit Cisco Systems networking equipment and because of that a Virginia woman received a five- year prison sentence. In addition to the prison time, a U.S. District Court for the Eastern District of Virginia also ordered Chun-Yu Zhao, 43, of Chantilly, Virginia, to pay US$2.7 million restitution and a $17,500 fine. Also listen for the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/8/11 - Sep 08,2011: A new report says that hackers are turning their sights from computers to cars. Computer security company McAfee released information regarding the large amount of electronics being used in cars today . Researchers believe that technology is making cars increasingly vulnerable to hacking attacks, even by something as simple as text message. If you have a Twitter account, you are not alone. In fact, you are among 100 million other active users. Twitter CEO Dick Costolo announced the statistic this morning. He also said Twitter receives 400 million page views per month. That.s up from about 250 million in January of this year. Here.s one more thing robots can apparently do just as well as humans, carry on conversations. You may remember that last week, Cleverbot, which is an artificial intelligence computer, shocked the world when it held a human like conversation. Also, listen to hear the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/7/11 - Sep 07,2011: It.s an effort to crack down on cyber crime, but a proposed U.S. law could also make you a target for something much less sinister. On Wednesday, two senators said the main law targeting cybercrime needs fixing because it allows law enforcement agencies to target people who simply violate websit es. terms of service or their employer.s computer use policies. The news isn.t too good for many computer users. Norton Cybercrime.s annual report found that 19 web users fall victim to online crime every minute. Also according to the security firms report, only 16 percent of victims of online crime report the incident to the police. If you have a computer, there.s nearly a 50 percent chance you are using illegal software. That.s the latest word from the Business Software Alliance, (BSA) which released its detailed findings from its new global anti-piracy study today. In the study, the company found that 47 percent of computer users around the world get software through illegal means most or all of the time. In developing economies, that number is much higher. Also, listen for the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/6/11 - Sep 06,2011: If it sounds too good to be true, it probably is. Cyber experts warn if you find a deal for DiRT 3 Steam Codes on eBay or places similar, just to keep moving. At least one million and as many as three million Steam codes for a free copy of Codemaster.s DiRT 3 were leaked onto the web, reportedly by hackers. Law officers are looking into the possible hacking of Iranian Gmail accounts. About 300,000 accounts were reportedly compromised and read by hackers according to Fox-IT. That is a forensics firm that investigated the theft of hundreds of digital certificates from a Dutch company. The Sony Corporation hopes some leadership from a former U.S. Homeland Security official will prevent another major hacking like over the summer. The company announced it has hired Philip Reitinger to take the role of chief information security officer. Also, check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/2/11 - Sep 02,2011: The crackdown on hacktivists continues with the arrest of two men in the U.K. The Metropolitan Police Service released a statement late Thursday saying that two males, ages 24 and 20, are now behind bars and could be connected to the hacking groups Anonymous and LulzSec. He said he was sorry but it was too little, too late for L uis Mijangos. A judge sentenced the 32-year old Thursday to six years in prison for hacking into the computers of women and teenage girls. He found sexually explicit photos and threatened to put them online unless the victims gave him more pictures. Cyber attacks have reached the Irish but they were able to make some arrests. Two people were taken into custody after law officers investigated an attack on the Fine Gael website. In January, the hackers allegedly modified the personal information of 2,000 site subscribers that was emailed to the media. Also, check out the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 9/1/11 - Sep 01,2011: They may be used to having the prying eyes of the paparazzi on them at all times. Now, Hollywood will have to be on alert for hackers as well. Indian students are getting a crash course in hacking and how to avoid it. Future engineers of MSU.s Faculty of Technology and Engineering will host a festival this month teaching all about the world of hacking and how and why to avoid it. If you are poor, it is much harder to afford the Internet. A recent report has the numbers to back up that claim. According to a report done by the National Telecommunications and Information Administration, more than one-third of all Americans are not connected to the Internet. Also, tune in for the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/31/11 - Aug 31,2011: Some good news coming from China. It may have gotten a lot harder for hackers to get away with their crimes. The country announced new, tougher penalties people convicted of computer hacking. Australian authorities are working hard to stop identity theft and other scams. It looks like they may have taken a big step in that direction. Property owners can now put a caveat over their property in an effort to stop scammers. A group of university employees have found a new way to keep you on your computer for a longer time. It.s called PwrSmart. It.s by New Boundaries Technology and it.s an energy conserving program. Also, tune in for the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/30/11 - Aug 30,2011: Could the hacking group Anonymous group be at it again? It is a definite possibility. The website englishdefenseleague.or g went offline today in what is a possible take down by a hacker. It has been a crazy two weeks for many BART commuters. The hacking group Anonymous even got in on the action, claiming to hack the BART system in protest of a shooting death by a BART police of transient. The police are hoping to put a stop to the madness as they began to make arrests. Facebook is working to make sure your time on their site is as enjoyable as possible. To ensure that it is, they are paying out some pretty big chunks of cash. The social networking site has shelled out $40,000 to people that have reported security bugs in its service. That comes just one month after launching its Bug Bounty program. Also, make sure you check us out for the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/29/11 - Aug 29,2011: If you think that cyber crime doesn.t pay, think again. Unfortunately it paid off big time for a group of cyber criminals. The gang apparently withdrew $13 million dollars in one day from ATMs in six countries. That made it one of the largest and most complex banking heists e ver. Two rivals are teaming up hoping that it will keep children safe from online predators. The U.S. and China will work together to take down a network of sites that exploit children. It.s considered a rare cyber crime bust operation between the two countries. No place is safe when it comes to cyber crime, not even cyber cafes. So, Indian police are going to keep a close eye on cyber cafes in an effort to keep you safe online. Also, make sure you tune in for the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/26/11 - Aug 26,2011: The British are doing everything possible to keep children safe online, including considering banning adult content. British officials say getting that type of entertainment out of the cyber world could go a long way in protecing their children and worth it in the end. One man may consider himself a hacker, but hes doin it to make life better for disabled sister. Glenn is an electrical engineer. And he used those skills to create what hes calling the Frankenkindle for his sister, who has cerebral palsy. Its the news that shook the cyber community to its core. Apple CEO, Steve Jobs announced that he will step down from his role. The position will now go to the current COO Tim Cook. Jobs will shift over tothe chairman of the board. The announcement comes after a long period of leave due to health reasons. hackers | cyber crime | cyber security | computers | technonlogy Click to listen to radio show NCS 8/25/11 - Aug 25,2011: If you.re tired of getting a bunch of spam mail, Google has some good news for you. The company recently announced it plans to hire search quality associates to fight spam. The employees will be based in the Dublin, Ireland office. Attacks on Androids are way up according to cyber security company McAfee. Android malware is reportedly up 76 percent over the last three months. That spike has made it the most assaulted mobile operating system on earth during that period. Something as simple as taking a walk could power up your cellphone. Sounds strange right? However, researchers at the University of Wisconsin-Madison are hoping to make that statement a reality. The researchers describe a new energy-harvesting technology that p romises to dramatically reduce our dependence on batteries and instead capture the energy of human motion to power portable electronics. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/24/11 - Aug 24,2011: Australia is stepping up to the plate to fight cyber crime. It has a three- year plan to stop cyber crime. The Australian government made the announcement of the new legislation on Tuesday. One airline is ditching paper and is turning to cyber technology. United Continental plans to replace flight manuals and aeronautical navigational charts with electronic versions on Apple iPads. The airline has ordered 11,000 iPads that it plans to put in the hands of all United and Continental pilots. Some of the engineers at Ohio State University are getting pretty creative to make sure soldiers always stay connected. The group developed a new antenna designed to be sown into clothing. It would give the soldiers a connection range of four times larger than a conventional body worn antenna which is used right now. hackers | cyber crime | cyber security< /a> | computers | technology Click to listen to radio show NCS 8/23/11 - Aug 23,2011: China may have gotten caught with its hand it the cyber cookie jar. There have been plenty of rumors swirling around over the years claiming that China is responsible for various cyber attacks. There.s not been enough proof to support those claims until now. China has always refuted those accusations but an accidental leak reveals that they are engaging in cyber warfare and routing it through US IP addresses. Nigeria is also jumping into the ring to knockout cybercriminals. Microsoft Nigeria, along with others, has launched a campaign against cyber crime in that country. If you are an AT&T customer, you will soon have fewer choices for your text messaging plan. The company announced Tuesday that it will cut out its 1,000 text messages for $10 a month. Instead, it will continue to offer unlimited text messages plans for a flat fee or a pay-per-text service. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/22/11 - Aug 22,2011: The FBI says the U.S. is a target for cybercrime and they believe the attacks are coming from Russia. There have been several distributed denial of service attacks against American websites costing more than $600,000. Hackers don.t appear to be slowing down anytime soon. This time the target was Omaha.s Metropolitan Entertainment and Convention Authority or MECA. Police say computer hackers broke into their payroll systems and got away with more than $200,000. The problems apparently started when an employee opened an email attachment infected with a virus that steals passwords. Divorce can always get a bit nasty but one wife faces some serious time behind bars for allegedly stealing her husband.s Social Security number. According to law officers, Rachel Jones used the number to fraudulently get a credit card. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/19/11 - Aug 19,2011: Google says IP spoofing is on the rise. It reviewed more than 160 million web pages on more than 8 million sites in order to see how malware is distributed. It found that while social engineering tricks play a major role, cyber criminals are turning more to IP spoofing as a way to avoid detection. UK police believe rioters used social media to increase the riots there. Now the government will meet to discuss the role social media played in making matters worse. Facebook, Twitter and Research in Motion, which makes BlackBerry will all meet with the British government to talk about their use and role in the worst riots in Britain in decades. So far more than 1,200 people have been arrested. Wordpress seems to be making it a lot easier for just about anyone to have their own website. According to the owner of Wordpress, the site now accounts for about 14.7 percent of the top million sites on the web. That.s up about six percent from last year. He also says that 22 percent of all new domains in the U.S. run on the platform. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/18/11 - Aug 18,2011: Targeting the BART system once this week apparently wasn.t enough for Anonymous. The hacking group says members focused on the transit system again, this time hacking into the Police Officers Association website. The group claims to have the private information of more than 100 BART police officers. This next story proves that you can hack just about anyone, anywhere, even at McDonalds. 37-year old Jason Cornish of Smyrna, Ge orgia allegedly attacked his former employer, Shionogi, for revenge. Cornish was an information technology employee at the Japanese drug maker but resigned because of company layoffs that affected his former supervisor and close friend. A British college student faces some very serious charges after he allegedly hacked into Facebook. It took several tries before he was able to penetrate the social networking site. According to reports, 25- year old Glenn Steven Mangham used .considerable technical expertise. to repeatedly bypass security. Also, tune in for the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/17/11 - Aug 17,2011: Cyber crime is an international problem and the Thai government is joining the fight against cyber criminals. It plans to expand its information security capabilities in an effort to stop global cybercrime. Catching up with friends on Facebook is becoming an easy way for cyber criminals to target you and your information. A new survey from Webroot says that users should take more steps to protect your privacy. The news isn. t good for Dell. Yesterday it predicted weak sales growth after the closing bell. The second largest personal computer maker.s stock fell 10 percent after that announcement.The computer company blamed the wary consumer and slower computer technology spending. Also tune in for the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/16/11 - Aug 16,2011: Heading to the Internet is a great way to get a great deal on just about anything. However, it can also be a way for scammers to take advantage of you. The FBI.s Internet Crime Complaint Center says scammers are catching shoppers in their web of deception with fraudulent vehicle sales and false vehicle protection claims. Most people use Facebook just to catch up with old friends. But one man decided to use the social media site as a way to steal thousands of dollars. A judge sentenced Iain Wood to 15 months in jail for stealing $57,000 from various people on Facebook. Wood allegedly spent up to 18 hours a day online scrutinizing profiles. Apple Incorporated is in yet another battle. This time HTC Corporation f iled a trade complaint at the U.S. International Trade Commission seeking to block imports of Apple.s iPhone, iPad and Mac computers. HTC is Asia.s second largest maker of smartphones and filed the complaint in Washington today. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/15/11 - Aug 15,2011: The hacking group Anonymous apparently hoped to stop the BART Transit System in its tracks. According to a statement and Twitter messages, the group claimed responsibility for the Sunday online attack of the San Francisco transit system. The system apparently went down from noon to six pm yesterday. Members of Anonymous say the attack was for the system.s decision to cut off cellphone signals at certain subway stations because of planned protests last week. Law officers are on the lookout for a cyber attack. The hacking group, Anonymous sent a letter to the Fullerton Police Department letting them know the group planned to avenge the death of a 37-year old homeless man. Anonymous reportedly said in the letter saying that the group plans to show the police department&rsqu o;s information technology the same mercy that was show to Kelly Thomas. As college students head back to school, they might be surprised to know that they could be easy targets. According to one identity theft attorney report, college students are at higher risk for identity theft. hacker | technology | cyber crime | computers | cyber security Click to listen to radio show NCS 8/12/11 - Aug 12,2011: The crackdown continues as British police arrests those accused of using social media sties to start riots. Police say they arrested and charged three men for allegedly posting notices on social sites to stir up trouble. A woman who took advantage of a computer glitch will spend nine years behind bars. A Pittsburgh U.S. District judge handed down the sentence to 46- year old Jamie Harris on Thursday. She is one of four people charged in the scheme that stole more than a million dollars from the city.s only minority owned bank. Regulators closed the bank as insolvent two years ago. A massive data breach has left thousands of social security numbers exposed for anyone to see. The University of Wisconsin-Milwaukee recently posted on its website that back in June, they found malware on one of its servers. That server had the names of staff and students. It also had the Social Security Numbers and other files with personal data of about 75, thousand past and present students and staff members. The university did say that the server did not contain any financial information. Also tune in for the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/11/11 - Aug 11,2011: It seems that those in the financial industry are not optimistic about cyber crime and their abilities to stop it. In a poll of 100 banking executives from 50 US financial institutions attending a Fundtech client conference, 66% expressed fears that cyber-crime was uncontrollable. A similar majority see fraud monitoring as their biggest challenge, with 84% believing that better detection tools are the keys to addressing high levels of online crime. Do you have a password for your cell phone? If you don.t, you.re not alone. In fact, you are like most people. A report done by Sophos says that 67 percent of consumers dont hav e password protection on their mobile phones. In addition to patrolling the streets, New York Police will also be patrolling social media, looking for trouble. The department is responding to the criminals growing use of these sites to plan and celebrate illegal exploits. Law enforcement has linked social media to increasing incidents of flash robs in the U.S. and the recent looting and rioting in London. Public safety agencies are consequently looking to step up their game in order to better protect citizens against these trends. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/10/11 - Aug 10,2011: Law officers think technology may have played a key role in the rioting going on in England. Research in Motions Inside BlackBerry Blog was hacked Tuesday after the Canadian smartphone maker suggested it would cooperate with London police to help identify rioters who may have used a BlackBerry messaging service to plan mayhem. The hacking group Anonymous is giving Facebook fair warning to prepare to be hacked. Members of the group say they plan to attack Facebook on November 5th in reta liation for alleged collusion by the social network with government agencies and security firms to allow them to spy on Facebook users. You can do just about anything on the Internet but search and email still remains the most popular online activities. The Pew Internet & American Life Project said on Tuesday that it found 92 percent of online adults use search engines to find information on the Web, and 92 percent of online users also use email. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/9/11 - Aug 09,2011: The world of government and hacking could soon collide. The U.S. just launched a program called Cyber Fast Track. It will fund what the government calls quick and dirty security research projects. The program launched at this year.s Black Hat conference in Las Vegas and will accept proposals for research projects lasting up to 12 months offering new benefits for the US defense and military agencies. The Philippines is turning to the Internet to help catch child predators. The country.s primary investigative agency.Criminal Investigation and Detection Grou p (CIDG).has launched a website where people can report internet-related crimes involving children. The website, called .Angel Net,. will serve as an online complaint center on incidents of identity theft, and other cybercrimes involving children. You can add Paul McCartney to the many people allegedly hacked by reporters from the now defunct News of the World Newspaper. The former Beatle addressed reporters and confirmed that he has been drawn into the UK hacking scandal. hacker | cyber security | cyber crime | computers | technology< /a> Click to listen to radio show NCS 8/8/11 - Aug 08,2011: The list of hacked businesses just keeps getting longer and longer. The Travelodge hotel chain in the UK confirmed that its email marketing database was breached earlier this year resulting in spam being sent to a number of its customers.??The company launched an investigation back in June after multiple customers reported receiving job spam on addresses they registered with the hotel chain. Some stores want to give you the look and feel of an Apple store and that.s a big problem for the company. A federal judge recently s ided with the technology super power and granted a request for a preliminary injunction and issued a temporary restraining order against several retailers for infringing Apples trademark, according to court documents. Microsoft announced it will ship 13 security updates this week to patch 22 vulnerabilities in Internet Explorer, Windows, Visio and Visual Studio. Tuesdays patch lineup is larger than Julys on the update count, but matches that months vulnerability total. Thats unusual, since the company usually delivers a heavier load in even-numbered months. hacker | cyber security< a href='http://www.blogtalkradio.com/rss/tag/cyber-security.rss'> | cyber crime | computers | < a href='http://www.blogtalkradio.com/search/technology/'>technology Click to listen to radio show NCS 8/5/11 - Aug 05,2011: It appears that hackers proved the makers of Google.s Chrome OS wrong. Security was one of the biggest selling points, saying it had better built in security than other operating systems. However, hackers were able to get into the system. It.s a war of words for cyber security companies and it appears that the winner depends on whom you believe. On Tuesday, antivirus vendor McAfee described a five year hacker operation that infiltrated more than 70 U .S. and foreign government agencies, defense contractors and international organizations to plant malware that in some cases hid on networks for years. A California man turned himself in and faces some serious charges after using Facebook to target his victims. Last month, a San Jose, California, grand jury indicted Sanford Wallace on three counts of intentional damage to a protected computer and two counts of criminal contempt, according to the US Attorneys Office in the Northern District of California. Wallace allegedly compromised approximately 500,000 Facebook accounts during three separate attacks on the social-networking company between November 2008 and March 2009. Also tune in for the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/4/11 - Aug 04,2011: Even medical equipment may not be safe from hackers according to some researchers. One researcher found flaws in medical equipment, which diabetics use to monitor blood sugar levels. He believes that an attacker could remotely control insulin pumps and the readouts from blood sugar monitors. Because of that, di abetics could get too much or too little insulin to regulate their metabolism. It seems that hackers are stealing millions of dollars with just a few clicks of a mouse. In increments of a few thousand dollars to a few million per theft, cyber crooks are stealing as much as $1 billion a year from small and mid-sized bank accounts in the U.S. and Europe like Experi-Metal, according to cyber experts. And account holders are the big losers. Well I guess some hackers weren.t too sweet on Hershey.s. Recently, hackers attacked the website of the chocolate manufacturer. And what exactly did they do with the hack? They changed a recipe on the website. Also, tune in for the job of the day! hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/3/11 - Aug 03,2011: Cyber crime may be more organized that some first thought. Security company McAfee says it.s found evidence of a cyber criminal campaign that has compromised 72 organizations since 2006, including the United Nations and several military defense contractors. More than 50 members of a ring who engaged in what authorities de scribe as "horrific" and "unspeakable" crimes have been arrested for exploiting children from 12 years old to as young as infants. In an effort to stop cyber crime in its tracks, St. Charles County in MO received a big boost from the federal government. The county received money to cover the salaries of three officers to the county.s Cyber Crime Unit. hacker | cyber security | cyber crime | computers | technology< /a> Click to listen to radio show NCS 8/2/11 - Aug 02,2011: There.s a war going on and if you.re a hacker, the government hopes you will join its side. The National Security Agency is looking for cyber warriors this year and next year to help them battle the increasingly intense international cyber war. To help them find the best, NSA, Department of Defense and the Department of Homeland Security plan to scan the annual DEF CON hacker conference in Las Vegas this weekend. It.s not only costing companies private information, but cyber crime is also costing them big bucks. Corporations spent 56 percent more than last year because of cyber crime, according to a recent study. Based on the study, Cybercrimes can do serious harm to an organizations bottom line. The study found that the median cost related to cybercrime to the 50 companies in the survey was $5.9 million. The death of Amy Winehouse was of course tragic, but what.s making it even worse is that cyber criminals are trying to cash in because of it. Experts say the British singer.s recent death gave lawbreakers all over the world the opportunity to target unsuspecting Internet users. Also tune in for the job of the day. hackers | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 8/1/11 - Aug 01,2011: One of the latest LulzSec suspects is out on bail today after a judge released him until he appears at another court hearing on August 30th. He can go home but he must wear an electronic monitoring device. Jake Davis was arrested on Wednesday in England and faces several charges including conspiracy to mount a cyber attack on the Serious Organized Crime Agency.s website. It.s a big problem now, but members of the FBI expect cyber crime will only get worse in a few years. Right now, it.s the agency.s numb er three priority but it will probably rise to number one very soon according to FBI agents. They believe that given the country.s connection to the Internet, infrastructure and everything being computerized, the country can potentially be an easy target of cyber terrorism. It can happen to you and I and apparently it can happen to the state of New Jersey. Governor Chris Christie says hell consider restoring $35 million to the budget for technology upgrades after two computer crashes hampered Motor Vehicle Commission operations last month. Christie blamed Democrats for cutting funds for technology upgrades in the current budget. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 7/29/11 - Jul 29,2011: Large, organized crime syndicates have been launching sophisticated attacks against individuals and major corporations for decades. The result of their efforts is the theft of billions of dollars every year, and a large, ongoing presence in many of our most sensitive computer systems. The recent cyber attacks across the world has highlighted a very big need for cyber security expert s. A grant from the National Science Foundation has given Whatcom Community College in Washington State $200,000 grant to get students interested in cyber security. A recent study by British consumer research specialist Intersperience found that people.s biggest nightmare would be to go 24 hours without an internet connection or access to a smartphone, computer or tablet. They even compared it to having their head chopped off. hackers | cyber crime | cyber security | technology | computers Click to listen to radio show NCS 7/28/11 - Jul 28,2011: The federal government says it.s working to make sure your privacy is protected, even on the internet. Government officials put Google, Microsoft, Apple and other technology companieson notice to give consumers a way prevent advertisers from tracking their movements across the Web - or face regulation. A panel of government experts Tuesday once again warned lawmakers that cyber-attacks against the nation.s computer networks are growing more frequent and increasingly sophisticated, while the U.S. has lagged behind on implementing the necessary protections. An Alabama w oman could face 32 years behind bars and a fine of 1 million dollars. 67 year old Peggy McGlaughn pleaded guilty Tuesday to bank fraud and aggravated identity theft. According to the U.S. Attorney and FBI, McGlaughn stole more than 900 thousand dollars from her former employer, Bob Roberts and Company. She worked at the construction company as a bookkeeper and officer manager for 24 years. hacker | cyber crime | cyber security | computers | technology Click to listen to radio show NCS 7/27/11 - Jul 27,2011: Scotland Yards cybercrime unit has arrested a teenager it suspects of working as the spokesman for the Lulz Security hacking collective, officials said Wednesday. The Metropolitan Polices Central e-Crime Unit arrested a 19-year-old, the force said in a statement. His name wasnt released, but police said he was believed to be one of LulzSecs most prominent members. The hacker group Anonymous posted a message Tuesday to PayPal customers, urging people to close their accounts with the online payment service. Anonymous and fellow hackers Lulzsec accused PayPal of being unfair for refusing to allow donations to the controversial Wi kileaks and for helping law enforcement track down hackers. An unemployed truck driver was charged Wednesday with hacking into an Australian broadband network provider in an alleged crime that police say could have caused significant damage to the national Internet infrastructure. David Cecil, 25, was charged in a court in New South Wales state with hacking into one of the National Broadband Networks service providers and numerous other businesses and websites in Australia and overseas since May. hacker | cyber security | cyber crime | computers | techn ology Click to listen to radio show NCS 7/26/11 - Jul 26,2011: President Obama unveiled his plans to combat what the United States is calling "Transnational Organized Crime" in a paper released by the White House Tuesday morning. The document focuses primarily on encouraging more international cooperation to target organized criminals dealing in smuggling people, smuggling drugs, committing acts of terror and online financial crime. U.S. Senator Charles E. Schumer announced his support for legislation to crackdown on counterfeit parts in weapons systems, airplanes, and other equipme nt that are essential to keeping our men and women in uniform safe, and to protect key defense contractors in Central New York. According to the Department of Defense, the rise in counterfeit aircraft parts alone are leading to a "5 to 15% percent decrease in weapons systems reliability" each year, putting additional troops lives at risk both at home and abroad. Police have identified phishing, pharming and spoofing as the three main cyber crimes that have cost losses amounting to millions. The Federal Internet Crimes unit head Deputy Superintendent in Singapore said the number of victims falling prey to such crimes, especially through online-banking scams, was also increasing yearly. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 7/25/11 - Jul 25,2011: Hackers have started to release gigabytes of secret documents stolen from an Italian cybercrime unit. The 8GB of files has allegedly been taken from the network of the Italian CNAIPIC which oversees the countrys critical IT infrastructure. In a message announcing the release, the Anonymous hacker group said it received the files fro m a source. To fight cyber crime, Michigan law enforcement officials are teaming up with the F.B.I. Theyve now established an office that will specifically target cyber crimes. By having this position with the F.B.I. Cyber Crime Task Force, it allows that officer to work specifically on those kinds of cases. So, the more experience, the better. The Communications Commission of Kenya has set up a computer incident response team to counter the rising cases of cyber crime in the country. Announcing the development last week, CCK.s Director General said the team would coordinate the response to cyber security incidents nationally and collaborate with relevant actors locally. Also, tune in for the job of the day. hacker | technology | cyber crime | cyber security | computers Click to listen to radio show NCS 7/22/11 - Jul 22,2011: Just a few weeks after German authorities opened a national Cyber Defense Centre in Bonn, it was attacked by hackers and now officials are struggling to arrest all of those involved. While security authorities reported they had arrested two members of the hacking group linked to the attacks, the group r eleased a statement saying that only its leader was under arrest. Researchers at the security firm Kaspersky Lab have spotted phishing scams that attempt to gain illegal access into the accounts of airlines in order to steal the frequent flyer miles accumulated by the companys customers. The attacks come in the form of emails that promise either prizes or more points in customers frequent flyer programs; recipients are asked to enter their login information on a fake website, and doing so effectively hands over users account details to the scammers. Computer and software vendor financial results came in this week, including reports from IBM, Intel, Apple and Microsoft. Those results revealed some record quarterly results and a healthy market for business technology. Economic worries, including concerns about unemployment, the housing market and European debt crisis battered tech stocks along with the rest of the market over the past few months, sending shares of IT companies below their levels at the start of the year. hacker | cyber security | cyber crime | technology | computers Click to listen to radio show NCS 7/21/11 - Jul 21,2011 : As a part of its ongoing AntiSec campaign Anonymous hackers have reportedly breached NATOs cyber security making-off with one gigabyte of stolen data. Like its previous attacks, the hack was reported on the groups Twitter page. Anonymous has since released two PDFs containing a portion of the data stolen, linking to them via two tweets. The US and India have signed a non-binding memorandum of understanding (MOU) to collaborate on cyber security. The MOU was signed in New Delhi by Jane Lute, deputy secretary for the US Department of Homeland Security, and the secretary of Indias Department of Information Technology, according to U.S. reports. The Arlington-based Air Force Association is continuing its effort to educate young people on the importance of cyber security by meeting students where they are: on Facebook. On Friday, the nonprofit associations Cyber Patriot office launched a social media game called CyberVille, in which players defend their virtual town from attacks against that towns wired infrastructure, including banks, restaurants, and police and fire departments. hackers | cyber crime | cyber security | computers | technology Click to listen to radio show NCS 7/20/11 - Jul 20,2011: Apple released the latest version of its computer operating system named Lion. So far, the response has been positive. Many are saying it is a great leap forward in usability and security. Apple has changed the computer world in the last few years with their mobile operating systems and Lion represents the beginnings of the merger of touch-based mobile OS and their desktop OS. Google has identified traffic patterns consistent with infection, and it.s letting users know that they need to take action. The malware in question routes Google traffic through a small number of proxies, according to the official blog entry. If Google.s search engine detects that you.re coming to them through these intermediaries, it.ll display a banner notification in hopes that you.ll fix the problem. The federal government plans to shut 40 percent of its computer centers over the next four y ears to reduce its hefty technology budget and modernize the way it uses computers to manage data and provide services to citizens. The chief information officer for the government, said cloud computing could save the country billions of dollars. We will also have the job of the day. Make sure you check it out! hacker | cyber security | cyber crime | technology | computers Click to listen to radio show NCS 7/19/11 - Jul 19,2011: The recent rash of hackings may start to slow down soon as law officers continued to crack down on those they believe are responsible. Sixteen suspected members of "Anonymous" were arrested this morning in states including Florida, New Jersey and California, in what appears to be a nationwide takedown of the notorious hacking group according to reports. Rupert Murdochs British newspaper group told staff to change their passwords and tighten security, sources said on Tuesday, after hackers attacked the website of his tabloid The Sun. Hackers on Monday redirected The Suns online readers to a fake page that reported Murdoch had been found dead in his garden. Members of the hacking group LulzSec, who recently announced they had disbanded, took responsibility for the attack in messages posted via the social networking site Twitter and said they were preparing more online assaults. If you.ve seen the movie Minority Report, you might be able to relate to this story The Ohio Bureau of Criminal Identification and Investigation have been utilizing advanced computer technology/programs called predictive analysis and geographic profiler to help solve crimes. Predictive analysis provides law enforcement officials with a time and location regarding the next crime in a probable sequence. Also make sure you tune in for the job of the day. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 7/18/11 - Jul 18,2011: Superstar Lady Gaga might be singing the blues after her website was hacked. The group SwagSec allegedly broke into the singer.s website late last month and stole thousands of personal details including e-mail addresses. Financial details were not stolen according to Universal Music. Toshiba announced that it was one of the latest victims of hackers also. The company says a server be longing to its U.S. unit was a target, with hackers getting the information of more than 75 hundred customers. The stolen information was comprised of a small number of email addresses and other data but information like credit card and social security numbers was not stolen. The hacking group Anonymous says it doesn.t need Google+ and has decided to start its own social networking site. Google+ dumped the group from its site for violating its community standards. Anonymous. site is under construction now. So far, it consists of an explanation of how it came to be and a promise to be up and running soon. We will also have the job of the day. Make sure you check it out. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 7/15/11 - Jul 15,2011: Russia and the U.S. are working to reduce chances for a cyber security incident that could damage the countries relationship, according to the top cyber security adviser to U.S. President Barack Obama. Howard Schmidt, the White House cyber security adviser, wrote about a recent meeting with Russian officials where the two countries agre ed to exchange technical information on problems such as botnets and have "crisis prevention" communications links by the end of the year. Thousands of Sydney, Australia households are placing their personal information at risk and inadvertently protecting fraudsters by not securing their home Wi-Fi networks, a newspaper investigation has shown. NSW Police have prosecuted individuals for crimes involving fraud and child exploitation material who were using unsecured wireless internet networks to commit offences, said Bruce Van Der Graaf from the NSW Police fraud squad. When being questioned by officers Wednesday, a Lousiana man told investigators from the Lafayette Police Department that he downloaded more than 100 videos containing inappropriate pictures with a child in the last year. According to a Affidavit for Warrant of Arrest signed by the LPD, 26 year-old William Patrick D.Arcy confessed to downloading the videos using the search term "13 year old" to find the e xplicit material. Also, we will have the job of the day. Make sure you tune in. hacker | cyber security | cyber crime | technology | computers Click to listen to radio sh ow NCS 7/14/11 - Jul 14,2011: The Pentagon said today that a foreign government was behind a cyber attack that led to 24,000 files being stolen from military computers. William Lynn, the deputy secretary of defense, disclosed that attack during a speech outlining the Defense Departments cyber security strategy. Googlelaunched an entirely new user interface for its mobile platform Tuesday, completely changing the layout of the application portal. The new Market client is designed to better showcase top apps and games, engage users with an improved UI, and provide a quicker path to downloading or purchasing your products. Sprint Nextel will confirm its network-sharing agreement with LightSquared in conjunction with its earnings announcement on July 28, according to people familiar with the situation. The agreement, in which Sprints network will be used as the infrastructure backbone to LightSquareds upcoming 4G Long-Term Evolution network, will shed some light on wh ere Sprint wants to head with its own 4G ambitions. hacker | cyber security | cyber crime | computers | identity theft Click to listen to radio show NCS 7/13/ 11 - Jul 13,2011: A U.S. man who hacked into his neighbors Wi-Fi network and tried to frame them with threatening emails to the U.S. vice president has been sentenced to 18 years in jail. U.S. District Judge Donovan Frank sentenced Barry Ardolf, 46, on Tuesday after listening to the tearful testimony of the victim. Hacker group Anonymous on July 11 released a trove of military email addresses and passwords it claimed to have plundered from the network of U.S. defense consulting firm Booz Allen Hamilton. Anonymous made available a file containing more than 90,000 email addresses and other information it said in online messages that it stole from an unprotected server at Booz Allen. Verizon Wireless will hit the century mark with its 4G LTE next week, covering 100 markets with its speedy next-generation network. Tulsa, Okla., will be the 100th market covered by Verizons new network, which will officially be announced on July 21. hackers | cyber security | computers | cyber crime | technology Click to listen to radio show NCS 7/12/11 - Jul 12,2011: The U.S. is taking a much harder look at cyber warfare and how it can af fect the U.S. and how such attacks can be stopped. The Department of Defense is set to release the unclassified version of its cyber war-fighting strategy this week. The strategy was finalized months ago and has multiple goals to thwart attacks. The plan calls for the treatment of cyberspace as a domain which the military needs to protect and defend U.S. interests inside. For U.S. Army troops, smart phones could become requisite field gear, along with boots, guns and ammunition. The Army is wrapping up a six-week program to test the viability of using touch screen phones and tablets in combat. The pilot program began on June 6 within the White Sands and Fort Bliss training areas in New Mexico and Texas. This dry run has proved so encouraging that Army officials say they expect the first wave of smart phone-equipped soldiers could be shipped overseas later this year. Rhode Island officials on Monday unveiled a new team of law enforcement, emergency planners, academics and pri vate businesses aimed at taking down threats to cyber security and tackling cyber attacks when they happen. Members of the new Rhode Island Cyber Disruption Team said the partnership is a model for other states trying to pool resources from inside and outside of government to address cyber-security problems. Make sure you listen in. We will also have the job of the day. hackers | cyber crime | cyber security | technology | computers Click to listen to radio show NCS 7/11/11 - Jul 11,2011: Former Prime Minister Gordon Brown believes journalists from The Sunday Times and The Sun newspapers tried to obtain private information from his financial records and telephone voice messages, a source close to Brown told reporters. The efforts date back 10 years, and include periods when Brown was prime minister and chancellor of the exchequer, the source confirmed. A Department of Homeland Security official worries that components used in computing devices could be infected with spy components from foreign manufacturers. Many of the chips that make e-devices work come from overseas manufacturers. Heres the latest Apple rumor: The company re portedly is working on a new iPad, due out later this year, that will have a higher-resolution screen. The new iPad is said to be a .pro. that could be used for high-end video editing and photography. And as always, we will have the job of the day. Make sure you listen. hackers | technology | computers | cyber security | cyber crime Click to listen to radio show NCS 7/8/11 - Jul 08,2011: Hackers have apparently been at it again. This time they targeted the Pacific Northwest National Laboratory which is a U.S. energy laboratory. It.s another, attack on governmental targets, while authorities struggle to crack down on cyber-crimes and prevent further damage. The Washington Post also felt the wrath of hackers. Thursday the Washington Post said the database of its jobs site had been breached by hackers who stole about 1.27 million users ids and email addresses. The company said on its website that the Washington Post company.s jobs website was breached twice last month. Top U.S. officials are looking into the government having its own internet in an effort to protect it from cyber attacks. Former CIA Director Michael Hayden, along with several lawmakers are considering the idea of creating a secure domain where fourth amendment rights to privacy are voluntarily foregone in order to keep that portion of the internet free of cyber criminals. hacker | cyber security | cyber crime | technology | computers Click to listen to radio show NCS 7/7/11 - Jul 07,2011: Tabloid News of the World in Britain will shut down after Sundays issue. The announcement follows accusations that the paper illegally eavesdropped on the phone messages of murder and terror victims, politicians and celebrities. News International chairman James Murdoch said the scandal "sullied" the newspaper and "has no place in our company". Lawmakers in Virginia are cracking down on cyber criminals. Starting this month, the state enacted what some are calling the nation.s first law that criminalizes phishing schemes. Phishing occurs when someone sends out bulk e-mail messages designed to trick consumers into revealing bank account passwords, social security numbers and other personal information. Facebook is getting into face to face interaction. The social networking gian t introduced a video-calling feature on Wednesday in partnership with Skype, the popular internet video-chat provider. hacker | cyber security | cyber crime | technology | computers Click to listen to radio show NCS 7/6/11 - Jul 06,2011: Microsoft Corp. and Google Inc. have been slammed with a lawsuit accusing them of violating a Louisiana companys patent covering mapping technology that helps computer users see locations in three dimensions, according to reports. Russia and the United States are co-sponsoring a resolution to pre-empt cyber attacks that an influential international body is expected to adopt this week. The proposal calls for member nations to exchange information about the way they intend to deploy cyber technology during military conflicts. A new study finds that kids can predict the future of technology. Researchers asked kids across the world to draw what they would like their computers or the internet to do that it cant do right now. The goal of the study was to catch a glimpse into possible futures for technology as seen by people who have always used some form of technology. As always we will have our job of the day. So, make sure you tune in. hacker | cyber security | cyber crime | technology | computers Click to listen to radio show NCS 7/5/11 - Jul 05,2011: The Fox News Politics. twitter account has been hijacked and used to post fake reports about President Obama being assassinated. The attack began with a message from the hacker that said: .Just regained full access to our twitter and email. Happy 4th.. Soon afterwards, the first Obama announcement was posted claiming that @barackobama has just passed. Hackers have not been slowing down at all. This latest attack targeted Apple. According to reports. the group, Antisec, posted a message to twitter on Sunday claiming to have gained access to private data from an Apple Inc. server. The fight against cyber crime needs to be stronger and have international legal framework according to one British official. The Minister for Crime and Security, James Brokenshire, says having that framework will enable perpetrators outside of the country of their victims to be tracked down and punished. Also, make sure you listen to hear the job of the day. hacker | cyber security | cyber crime | technology | computers Click to listen to radio show NCS 7/1/11 - Jul 01,2011: It seems that no place is safe when it comes to hackers, not e ven the church. St. Ambrose Cathedral in Des Moines, Iowa says that hackers swiped $680 thousand from them. They planned to use the money to help the homeless and abused women. German federal police say the country saw a nearly 20 percent rise in cyber crime last year, causing $89 million in damage. Federal criminal police officers say that the number of cyber crime incidents rose to 59,839 in 2010 from 50,254 in 2009. The increase is linked to greater consumer use of the internet for banking and purchases. Lockheed Martin is selling its military and intelligence expertise to electric utilities as the world.s largest defense contractor tries to exploit a U.S. push to guard power grids from terrorists and hackers. Lockheed plans to enter the projected $1.3 billion market for utility cyber security next month with Palisade, a software program developed in partnership with American electric power Co. Of Columbus, OHIO. And as always we will have the job of the day so make sure you tune in. hacker | technology | cyber crime | cyber security | computers Click to listen to radio show NCS 6/30/11 - Jun 30,2011: There.s plent y happening in the cyber world today. Twice in as many weeks the Arizona State Police were the target of hackers. Officials are reviewing the information released by a group called AntiSec. The hackings just seem to keep coming, this time allegedly from Turkish hackers. The latest attack targeted the Plain Township website along with others around the world. Those who visited the website this morning saw a white screen with the word "hacked". And it was a game to one hacker but police were not laughing after invading a Florida home. Apparently, a Canadian hacker got access to the X-Box in the home and used a handicapped line claiming someone had been stabbed and the parents and other people in the home were being held hostage at the house. However. it was a hoax. Also, we will have the job of the day. Make sure you tune in. hacker | cyber crime | cyber security | computers | technology Click to listen to radio show NCS 6/29/11 - Jun 29,2011: In the news today, people from all walks of life seem to be getting in on cyber crime. spying on people they know up close and personal. Researchers in India studied more than 35 cases from all over Punjab and they investigated into those caught in the last eight months. Experts say that a lack of patience. long distance relationships and a lack of respect for another person.s privacy are responsible for this new trend. An Atlanta man is headed to jail for defrauding two major companies as well as hundreds of credit card holders. 37 year old Jean- Daniel Perkins was convicted of bank fraud. credit card fraud and aggravated identity theft Tuesday. Millions of websites all over the world routinely are built with one of the most basic security flaws because software designers are not taught anything about security, according to cyber security experts. The flaw makes websites vulnerable to .SQL injection,. in which hackers take control of a site.s database. Also, we will have the job of the day. Make sure you tune in. hacker | cyber security | cyber crime | technology | computers Click to listen to radio show NCS 6/28/11 - Jun 28,2011: In the news today, it happened last month. but the effects of the Citi group hack can still be felt by the business and its custo mers. Monday, the banking group announced that nearly 3 million dollars had been funneled by hackers in the cyber crime that compromised customers. data. Also, the U.S. Department of Homeland Security ran a test this year to see how hard it was for hackers to corrupt workers and gain access to computer systems. It ended up being not too hard at all. Staff secretly dropped computer discs and USB thumb drives in the parking lots of government buildings and private contractors. And the Northern Ohio Violent Fugitive task force is offering a reward for information leading to the capture of fugitive Mustaffa Shabazz. He is wanted by the U.S. marshals, and the U.S. postal inspectors on charges of conspiracy to commit mail fraud/credit card fraud and identity theft. And always, we will have the job of the day. Make sure you tune in. hacker | technology | cyber crime | cyber security | computers Click to listen to radio show NCS 6/27/11 - Jun 27,2011: In cyber security news today, the hacking group LulzSec says they are calling it quits. They claimed they hacked into numerous companies including Sony PlayStation and PBS. While they are ending their hacking spree, LulzSec encouraged their twitter fans to follow the hacking group Anonymous. So far, more than 60,000 people began following them just in one day. Also, if you have been a victim of a hacker, there are several things you can do to protect yourself. You should check your credit information regularly to make sure there are not fraudulent posts. Also if your e-mail has been compromised, make sure you do not give out any information like your social security number or bank account information. hacker | cyber crime | cyber security | technology | computers Click to listen to radio show NCS 6/24/11 - Jun 24,2011: A cell phone used by Osama bin Laden.s courier appears to show that the al-Qaeda leader was aided by militants linked to Pakistani intelligence. Calls reportedly from the device were traced to a militant group linked to Pakistan.s powerful inter-services intelligence agency. NATO said one of its websites had come under cyber-attack, the latest in a spate of recent hacks. The agency said its public e-bookshop, which is operated by an outside company, had been breached, but it did not contain any classified data. Computer experts are trying to determine how an international group of hackers broke into the Arizona Department of Public Safety computers Thursday and downloaded and released hundreds of law-enforcement files. The hacking group LulzSec has claimed responsibility for the attack. And as always tune in for the job of the day. hacker | cyber security | cyber crime | computers | technology< a href='itpc://www.blogtalkradio.com/rss/tag/technology.rss'> Click to listen to radio show NCS 6/23/11 - Jun 23,2011: In cyber news today, President Obama signed rules for cyber warfare. The guidelines stress the need to fortify defenses and strengthen cyber networks. And you might be surprised to know that there hasnt been a huge surge in data breaches, at least according to one study. The reports does say that the way companies now report breaches as well as how fast they report breaches has changed and brought about more media attention. Also peer pressure and low self esteem seem to be behind younger children hacking. A new study says typically if one child is a cyber criminal, their friends tend to participate in the same activity. And as always, we will have the job of the day. hacker | technology | cyber crime | cyber security | computers Click to listen to radio show NCS 6/22/11 - Jun 22,2011: In the news today, its not just an American problem. Hackers are targeting companies and governments from around the world. Thats why Australia has proposed new legislation to crack down on cyber crime. Plus, Northrop Grumman says about a dozen separate legions of organized hackers try to steal sensitive information. The company says its not uncommon to see zero-day exploits coming in at 11- minute intervals. And a new study by Lockheed Martin says that most government information technology decision makers want to use cloud computing despite security concerns. Also, tune in for the job of the day. hackers | technology< /a> | cyber crime | cyber security | computers Click to listen to radio show NCS 6/21/11 - Jun 21,2011: The UK and the US have teamed up to make an arrest involving the recent rash of hackings. Law officers say a 19 year old man is behind bars. They would not confirm that the suspect is in the hacking group LulzSec. However, they did say they are investigating him for hackings that the group claimed responsibility for. Nokia has released a new smart phone. The Nokia 9 is all screen and is scheduled to hit stores later this year. Also, the Departmen t of Homeland Security has released a new cyber security guidance to help fight cyber crime. We will also have the job of the day. Make sure you tune in. cyber security | cyber crime | hackers | technology | computers Click to listen to radio show NCS 6/20/11 - Jun 20,2011: The hackers still dont appear to be slowing down. This time they targeted the Japanese company Sega. It is just one of several companies to become victims of hackers in the last couple of months. A group called Web Ninjas hopes to put the brakes on at least some of the hacking problems around the world. The group says it has very valuable information about the hacking group LulzSec. Well tell you what they know and how it could help law officers. Plus, cyber security is becoming a hot sale for some in Paris. Security companies there are taking advantage of all of the recent hackings and using it to make a profit. And as always, we will have the job of the day. Tune in. hacker | cyber security | cyber crime | computers | technology Click to listen to radio show NCS 6/17/11 - Jun 17,2011: Medicare is turning to technology to make sure it doesnt pay fraudulent claims. The upgrade is a screening technology much like whats used by credit card companies to stop fraud. Also, the Japanese are beefing up their security j ust like the United States. The country made it illegal to create or distribute computer viruses but some critics say the new law could infringe on privacy. And software widely used in China to help run weapons systems, utilities and chemical plants has bugs that hackers could exploit to damage public infrastructure. Sunway has developed software patches to plug the holes but it could take months for customers to install it. And as always we will have the job of the day. cyber security | hackers | technology | computers | cyber crime Click to listen to radio show NCS 6/16/11 - Jun 16,2011: In the news today, the Senate server was hacked yet again. The first attack took place over the weekend. Law officers say no personal data was taken in this latest hack. The Cybercrime Identity Bureau made 26 arrests, charging the suspects with using the internet to pass around graphic pictures of children. The ages of those arrested range from 18 to 63 and include a Harvard graduate and a piano tutor. Also, the Big Blue turns 100 today. IMB started off selling things like punch cards. It now makes super computers, among other things. technology | cyber security | computers | business | identity theft Click to listen to radio show NCS 6/15/11 - Jun 15,2011: The hacking group LulzSec is now taking requests to hack into systems. LulzSec has setup a hotline that you can call to suggest who they hack next. Google is stepping up its features to make the search engine easier for you to use. It will now offer voice recognition. Right now it is only offered on its Googles Chrome web browser. And good news for some iPhone users. Apple began selling an unlocked version of the GSM iPhone 4 in the United States. And as always, we have your job of the day. Make sure you listen in. cyber security | hackers | technology | computers | business< a href='http://www.blogtalkradio.com/rss/tag/business.rss'> Click to listen to radio show NCS 6/14/11 - Jun 14,2011: The hacking group LulzSec has been busy, allegedly hacking into a Senator server in Washington, DC. The Army has come up with another way to train its soldiers. It will use a game-like system to train and ultimately cut costs. Also, an Indian billionaire wants to provide i-Pads to people in his country for just $32. And as always we will have the job of the day. technology | business | cyber | idenity theft | computers Click to listen to radio show NCS 6/13/11 - Jun 13,2011: Today on National Cyber Security Radio, hear more about the most recent hacking. This time the hackers targeted The IMF. Well tell you how that could impact the market and your money. Plus Anonymous claims to have struck again as well . This time they say they hacked into a Spanish Police website. More on that and the latest arrests from that group. And Verizon Wireless is pushing further into the mobile payments game with the announcement of a new partnership with Payfone. Well give the details of that potential deal. And as always we will feature the job of the day. technology | cyber | idenity theft | business | computers Click to listen to radio show NCS 6/10/11 - Jun 10,2011: The Spanish police say they have made arrests in the Sony PlayStation Network hacking. Police identified the tree men as the local leadership of the international network of computer hackers called Anonymous. Well tell you what they have been charged with and how much prison time they face. Also, the FBI is beefing up its staff to stop cyber crimes. The FBI security squad saw cyber crime surpass conventional crime in terms of its economic impact. Tune in to hear how many agents are now working to fight cyber crime. And, The cost of cyber crime is on the rise. Experts say it could potentially cost businesses and consumers as much as $1 trillion. And as always we will have the job of the day. Make su re you check it out. cyber | secuirty | technology | computers | identity theft Click to listen to radio show NCS 6/9/11 - Jun 09,2011: A Mac technician is behind bars afte r police say he installed spyware programs on laptops he fixed. According to police, 20 year old Trevor Harwell watched clients while the women took showers or changed their clothes. Police say they found thousands of images on Harwells computers. Despite an onslaught of hacking of major companies, law officers remain largely stumped when it comes to catching those responsible. The FBI wants businesses to take extra precautions when offering internet services for customers. And Facebooks computer systems will soon be able to recognize familiar faces. Facebook is making changes to the process for tagging friends in photos uploaded to the social network. As always we will have the job of the day. Check it out. cyber | technology | computers | idenity theft | business Click to listen to radio show NCS 6/8/11 - Jun 08,2011: Topping cyber and technology news today, social media can have a huge impact on your future and technology. Experts expect information collected on the internet could lead to businesses tracking and storing your information. It might give you less privacy but it could also make life easier for you. Well tell you how. Also, hackers have been very busy this year. A recent report shows that six million new malicious software programs were unleashed on the internet in the first three months of this year. Hear what that means for businesses, especially those in the healthcare industry. And new technology is helping pave the way to understanding history better. Hear more about the first 700 years of England.s history and how experts were able to draw that timeline. As always well have the job of the day. Make sure to tune in. cyber | technology | computers | business | identity theft Click to listen to radio show NCS 6/7/11 - Jun 07,2011: Making news today, believe it or not but one in four criminal hackers turn to snitching for the government. US law officers are using those turncoats to put an end to hacking in general. Hear why it is still an uphill battle. Apple CEO, Steve Jobs says that PCs could be a thing of the past. His company, along with others, are looking to the clouds, or iClouds to make PCs obsolete. Hear more on what the company has planned and the future of technology. Thieves are turning to the dead to cash in. There is typically a six month window for financial institutions and government agencies to find out that someone has died. Well tell you what you need to know to protect your loved ones identity. cyber | secuirty | technology | computers | identity theft Click to listen to radio show NCS 6/6/11 - Jun 06,2011: The attacks just keep coming from the group Lulz Security. This time they claimed responsibility for hacking into a website that the FBI uses to share information between the government and businesses. Also, the US and UK hope to team up to fight cyber crimes. The two say the many attacks in the recent weeks is a sign that hackers are getting bolder. For them, they say that means they need to be prepared. And a new bill could make it a little easier for some teens accused of sexting. New York lawmakers are pushing a bill called Cyber Crime Youth Resuce and it would give judges more leeway in sentencing teens convicted of sexting. As always, we will have your job of the day. Make sure you check it out. technology | cyber | security | business | computers Click to listen to radio show NCS 6/3/11 - Jun 03,2011: Hackers have done it again to the Sony Corporation. This time the hackers claim to have stolen customer data to show that the companys syste m is still vulnerable to attack. Well have the very latest. Plus, Americans want the government to crack down on hackers. A recent poll says most of the country wants cyber attacks to be considered an act of war. Tune in to find out exactly how many people support that movement. And the co-founder of Apple says that humans will live the life of leisure in the future. Tune in to hear why. technology | cyber | computers | idenity theft | business Click to listen to radio show NCS 6/2/11 - Jun 02,2011: Coming up today, Google is the latest major company to announce that it was the target of hackers. It tapped into the e-mails of several hundred people including senior government officials, Chinese political activists, military personnel and journalists. Well have more information coming up. Plus, we will have more on the hacking of Congressman Anthony Weiner. Hear what he has to say about where the photo may have come from. And Lake Michigan officials are turning to technology to keep people safe in the water. Tune in to hear exactly what they are doing and how its keeping you healthy this summer. And as alwa ys, we will have the job of the day. Make sure you listen. technology | cyber | security | idenity theft | business Click to listen to radio show NCS 6/1/11 - Jun 01,2011: First up, with the country turning to technology more and more, its also setting itself up for more chances to become targets of cyber criminals. A North Carolina professor is working to fight the crooks with digital ants. Also, be careful if you go shopping online. It can be a potential den for criminals. Well tell you what you need to know to protect you and your information. And believe it or not, there are children out there with credit card bills, mortgages and car loans. Hear how they managed to rack up those bills and what law officers are doing to keep children from becoming victims. And as always, we will have the job of the day. Make sure you check it out! technology< img src='http://www.blogtalkradio.com/img/itunes_trans.png' border='0' /> | cyber | computers | idenity theft | business Click to listen to radio show NCS 5/31/11 - May 31,2011: Theres plenty to talk about in technology news today. Lockheed Martin was the latest victim of hackers. We will tell you when the company found out and what information the hackers took away. Plus, its Apple vs. Samsung. The two companies are battling it out in court to make sure the other isnt ta king technology or packaging ideas. Well have the latest on that feud. And the second largest computer show in the world is happening this week. Listen in to find out whats the hottest item that manufacturers are itching to promote. And as always we have the job of the day. Make sure you tune in. It will be a great show. technology | cyber | computers | idenity theft | business Click to listen to radio show NCS 5/27/11 - May 27,2011: Today on National Cyber Security Radio, Microsoft says it has patched a bug in its hotmail e-mail service that attackers were exploiting to silently steal confidential correspondences and user contacts from unsuspecting victims. Hear how Microsoft fixed the problem. Hackers have come up with another way to try and take you for a ride. Well tell you what they are trying to do this time and how you can protect yourself. Plus, youve heard the term brainy baby. Well some researchers hope to take that term to a new level and use what theyve found to improve future technology. Make sure you check us out. cyber | technology | computers | business | crime Click to listen to radio show NCS 5/26/11 - May 26,2011: Making the news today, criminals who commit tax fraud have milked victims out of millions of dollars since 2008. We will tell you how they did it and what some victims had to say to members of the US Senate. Plus, a Bank of America insider who sold customer data to criminals cost the bank at least 10 million dollars in losses. Well tell you how that trickled down to customers and what the bank is doing to prevent it from happening again. Also, President Obamas cyber bill is still getting mostly positive reaction but there are concerns. Tune in to hear whos complaining and what they want to do about it. technology | cyber | computers | business | crime Click to listen to radio show NCS 5/25/11 - May 25,2011: Tune in today to hear more about Black Diamond and its latest invention. It released the final version of its wearable computer for military use. It works even when you drop it. Plus identity theft is rampant these days. Well tell you what you need to know to protect yourself. Youll even hear more about how identity theft isnt just on the internet. And there will be news on the latest in a lawsuit against a major rent-to-own company. Software that allows you to monitor and shutdown computers if customers dont pay is in the spotlight. Hear what the designer of the software h ad to say about his invention thats catching a lot of heat. And as always we will have the job of the day to help you land that perfect IT job. Make sure you check us out. technology | business | cyber | idenity theft | computers Click to listen to radio show NCS 5/24/11 - May 24,2011: Today on National Cyber Security Radio, Sony apparently has been hacked again. This time the hacks happened mainly overseas but it is causing the company to take a beating. Hear what happened and what the company is trying to do to stop it. Also, this new invention could blow your mind. A California company is working on headset technology that you control with your mind. Hear what they have planned and when you can have one in your hands. Plus, President Obama is getting some positive feedback from some US Senators for his Cybersecurity Plan. Hear what they have to say and how soon the proposed legislation could become law. All that plus your job of the week. Tune in! technology | computers | cyber | business | identity theft Click to listen to radio show NCS 5/23/11 - May 23,2011: In todays news, its faster and could change the way you download on your computer. Its called Thunderbold and it allows you to connect everything from displays and keyboards t o hard drives and digital cameras to you computer at a fraction of the time. Plus, KOBO announced that it has a new product as well the E-Reader Touch edition. It is small and can fit in the back pocket of a pair of jeans. The company says it allows for easier access to the touch screen device. And if you are looking for a job, technology may be the way to go. IT jobs are becoming in high demand. Tune in to find out which states are looking to hire the most people. And as always we will have the job of the day so make sure you tune in. technology | computers | cyber | crime | ident ity theft Click to listen to radio show NCS 5/20/11 - May 20,2011: This episode features several stories, including the US Embassy in Estonia will soon house an office of the US Secret Service. The group there will focus on cyber crimes and security. A beauty queen has turned into an identity thief, at least according to police. The Miss Wisconsin beauty queen faces several charges of identity theft. If found guilty, she could spend up to six years in prison. And more people are choosing technology over actual books according to Amazon. com. The company announced that since April, it has sold more Kindle e-books over print books. And as always, we have the job of the day. Cyber | Crime | security | technology | business Click to listen to radio show NCS 5/19/11 - May 19,2011: In the news today, Hewlett- Packard announces some not so good news. The recent earthquake in Japan along with other factors, forced the company to lower its 2011 revenue guidance range. Also Mac users could be the latest targets of cyber criminals. As the computers become more popular, they are also becoming more open to malicious software. And cyber bullying and sexting are on the rise. About half of teens say they have been a victim of bullying either online or through text message. Tune in to find out how you can keep your child safe. All that, plus your job of the day. Make sure you listen in! cyber | crime | technology | business | identity theft Click to listen to radio show NCS 5/17/11 - May 17,2011: Topping the news today is a story about how fast technology evolves. If you are always buying the latest big technology item, you will want to hear what a recent report says about how technology changes and how that can help you keep some change in your pockets. Plus, a new invention wants you to put your whole body into using you r computer. Forget the touch screen, now its all about the air screen. Well tell you how it works and how it can make your life easier. Before a baby is even born, he/she could be the target of identity thieves. The crooks have new technology that can steal social security numbers before your child even makes it into the world. Tune in to hear what you should do to prevent it from happening to you. And as always we have your job of the day. Make sure you tune in! Technology | Cyber crime | Identity Theft | computers | business Click to listen to radio show NCS 5/16/11 - May 16,2011: In todays headlines, the Sony PlayStation Network is back up and running but there are several things you must do in order to start playing again. Well tell you exactly what you need to do. Also, it could be a deal of a lifetime. A British designer has created a computer that will likely fit most peoples budget. Tune in to hear just how cheap it is and who he hopes will get those computers. And theres a camp to warn kids about the dangers online. Camp organizers say all sorts of criminals are hooked up to the internet. They hope to arm children with knowledge to prevent them from becoming victims. cyber | computers | crime | business | technology Click to listen to radio show NCS 5/13/11 - May 13,2011: O n todays show, you may be playing with your PlayStation consoles sooner than you think. The company shutdown the gaming network after a hacker managed to get into the system. Hear when you may be able to play your favorite games again. Also, cyber criminals are trying to outsmart you as you continue to learn their ways. With the hacking of major companies, consumers have started to wise up but now you may need to learn a few more tricks to prevent becoming a victim of a hacker. And because of those recent hackings, big businesses are turning more to ethical hackers. Well tell you what that means and what you need to know before you use one. Tune in! cyber | computer | technology | crime | business Click to listen to radio show NCS 5/12/11 - May 12,2011: Todays show is packed with information. First, President Obama releases his plan to combat cyber crime. Next, Ford and Google have teamed up to make your daily commute much easier. And we have a few tips for you to help you keep up with the ever- changing world of technology. And as always we have your job of the day. Stay tuned! cyber< a href='http://www.blogtalkradio.com/rss/tag/cyber.rss'> | computer | technology | criminal | business Click to listen to radio show NCS 5/11/11 - May 11,2011: Todays episode is packed with information. A major company spent major bucks to purchase Skype. Tune in to hear the huge price tag. P lus, its a new way to power up ideas. Data centers are coming up with alternatives to electricity. Well tell you what they are. And you might not need to be up close and personal to get a kiss from your significant other. This new invention will certainly have you talking. Tune in! cyber | security | technology | computers | business Click to listen to radio show NCS 5/10/11 - May 10,2011: Todays show features several stories in technology. First, the FBI is in an ongoing battle against spammers. Find out why they say its hard to keep up with criminals using spam to crash your computer. Also, children are on the computer more. Todays episode will tell you how that can help and hurt them. Plus, tune in to hear the featured job of the day. cyber | hacker | security | technology | computers Click to listen to radio show NCS 5/9/11 - May 09,2011: Todays episode is packed with information. Up first, hear how some criminals are taking advantage of the death of Osama Bin Laden. Plus, you know that hackers have been targeting big companies like Sony recently but now they have their sights on smaller businesses as well. Well tell you what to do to prevent yourself and your company from becoming their next victim. And a Pennsylvania couple has taken the furniture and electronic rental store, Aarons Incorporated, to court. T hey say the company used software that invaded their privacy. hacker | security | cyber | technology | crime Categories Announcements App Exclusive Application Security Bluetooth Security Breaking News Business Security Cell Phone Security Child Safety Online Cloud Security Computer Forensics Computer Hacking Conferences Credit Card Fraud/Scams Cyber Bully Cyber Crime Cyber Extortion/Sextortion/Sexting Cyber Fraud Cyber Security Alert Cyber Security Industry Watch Cyber Stalking Cyber Terrorism Watch Cyber Wars Cyber Wars (Anonymous) Cyber Wars (LulzSec) Email/Phishing Alerts & Scams Ethical Hacking Events and Conferences FBI Scam & Fraud Alerts Featured Stories General Government Cyber Wars Government Security Watch Hacker Gear Online Clothing Hackers In The News Hackers vs. Banks Hackers vs. Government Hacking Hacking Tools Identity Theft Watch Internet Cyber Law Internet Saftey IT Audit IT News and Information Laptop Security Law Internet / Cyber LIGATT Security In The News Moguls and Leaders National Cyber Security Radio Other Security News PCI and Compliance Penetration Testing Piracy . Software Piracy . Software, Music, and Movies PoliceOne Prison Time Product Announcements Security Jobs & Internships Security News Security Threats Security Tips Social Media Threats Spoofing Spyware and Malware Spyware/ Cyber Snooping Tech Jobs Twitter Uncategorized Video Library Virus/Malware/Worms VOIP Vulnerabilities/Exploits Wireless Security Recent Posts Road vehicles run on ISO standards Detecting VM sprawl in a private cloud John Kanen Flowers ProtectMyID: Keep the progress coming! Tips to make your resolutions stick: http://t.co/VeaO72Gj ProtectMyID: RT @InfosecurityMag: Most users have not installed security software on their smartphones, survey finds http://t.co/oFyrm0qb Network Administrator . TEKsystems . Tucson, Arizona 2011-12-27 . U.S. Department of Homeland Security National Cyber Security Division and Idaho National Laboratory win National Cybersecurity Innovation Award Beware of Shoulder Surfing Delco man arrested for 08. stabbing death of father Software Developer (Java) . The Rackspace Cloud / Rackspace / Austin, TX Texas school 911 call: .Put the gun down!. Facebook login details stolen by Ramnit worm Care2 resets millions of account credentials following security breach The year showbiz hit back at politics Hearing Delayed For Man Accused Of ID Theft Anonymous Spoofs Stratfor Head George Friedman, Sends Blast Email To All Clients Sr. Quality Engineer . The Rackspace Cloud / Rackspace / Blacksburg, VA Hackers May Have Compromised Gordon Brown.s eMail (January 2, 2012) Tag Cloud breaking-news conferences credit card fraud cyber crime cyber wars email ethical-hacking events exploits facebook Fraud hacker hackers hacking Help identity theft id theft interships iphone ipod Jailbreak jobs Malware movies music news other security personal piracy prision prison scam security security-news security-tips social media threats Software Spyware stolen computer touch twitter virus vulnerability wireless-security wormsTips: Identity Theft Ensure websites are secure prior to submitting your credit card number. Do your homework to ensure the business or website is legitimate. Attempt to obtain a physical address, rather than a P.O. box or maildrop. Never throw away credit card or bank statements in usable form. Be aware of missed bills which could indicate your account has been taken over. Be cautious of scams requiring you to provide your personal information. Never give your credit card number over the phone unless you make the call. Monitor your credit statements monthly for any fraudulent activity. Report unauthorized transactions to your bank or credit card company as soon as possible. Review a copy of your credit report at least once a year. Source: IC3.gov Tips: Internet Extortion Security needs to be multi-layered so that numerous obstacles will be in the way of the intruder. Ensure security is installed at every possible entry point. Identify all machines connected to the Internet and assess the defense that's engaged. Identify whether your servers are utilizing any ports that have been known to represent insecurities. Ensure you are utilizing the most up-to-date patches for your software. Source: IC3.gov Tips: Third Party Receiver of Funds Do not agree to accept and wire payments for auctions that you did not post. Be leery if the individual states that his country makes receiving these type of funds difficult. Be cautious when the job posting claims "no experience necessary". Be cautious when dealing with individuals outside of your own country. Tips: Auction Fraud Before you bid, contact the seller with any questions you have. Review the seller's feedback. Be cautious when dealing with individuals outside of your own country. Ensure you understand refund, return, and warranty policies. Determine the shipping charges before you buy. Be wary if the seller only accepts wire transfers or cash. If an escrow service is used, ensure it is legitimate. Consider insuring your item. Be cautious of unsolicited offers. Source: IC3.gov Tips: Phishing/Spoofing Be suspicious of any unsolicited email requesting personal information. Avoid filling out forms in email messages that ask for personal information. Always compare the link in the email to the link that you are actually directed to. Log on to the official website, instead of "linking" to it from an unsolicited email. Contact the actual business that supposedly sent the email to verify if the email is genuine. Source: IC3.gov Tips: Ponzi/Pyramid Scams If the "opportunity" appears too good to be true, it probably is. Beware of promises to make fast profits. Exercise diligence in selecting investments. Be vigilant in researching with whom you choose to invest. Make sure you fully understand the investment prior to investing. Be wary when you are required to bring in subsequent investors. Independently verify the legitimacy of any investment. Beware of references given by the promoter. Tips: SPAM Don't open spam. Delete it unread. Never respond to spam as this will confirm to the sender that it is a "live" email address. Have a primary and secondary email address - one for people you know and one for all other purposes. Avoid giving out your email address unless you know how it will be used. Never purchase anything advertised through an unsolicited email. Source: IC3.gov Tips: Employment/Business Opportunities Scams Employment/Business Opportunities Be wary of inflated claims of product effectiveness. Be cautious of exaggerated claims of possible earnings or profits. Beware when money is required up front for instructions or products. Be leery when the job posting claims "no experience necessary". Do not give your social security number when first interacting with your prospective employer. Be cautious when dealing with individuals outside of your own country. Be wary when replying to unsolicited emails for work-at-home employment. Research the company to ensure they are authentic. Contact the Better Business Bureau to determine the legitimacy of the company. Source: IC3.gov Tips: Credit Card Fraud Ensure a site is secure and reputable before providing your credit card number online. Don't trust a site just because it claims to be secure. If purchasing merchandise, ensure it is from a reputable source. Promptly reconcile credit card statements to avoid unauthorized charges. Do your research to ensure legitimacy of the individual or company. Beware of providing credit card information when requested through unsolicited emails. Source: IC3.gov Copyright HI TECH CRIME SOLUTIONS. All Rights Reserved. Hi Tech Crime Solutions | SPOOFEM | Am I Hacker Proof? | Locate PC | Gregory D. Evans | NerdsNStyle | I Spy U Spy If you would like to un-subscribe from this please click here.