ISIS Exploiting Wordpress Vulnerabilities

On April 7th 2015 FBI reported that numerous Web site defacements have being perpetrated by ISIS sympathizers. Affected list of websites include news organizations, commercial entities, religious institutions, federal/state/local governments, foreign governments, and a variety of other domestic and international Web sites.

Hackers exploited known WordPress plug-in vulnerabilities, which allowed them to take control of an affected system.

Cyber Crimes Task Force Uses Technology to Catch Predators

BENTON, Mo. -- Pedophilia was around long before computers were invented. But "the Internet is what brought it to the forefront," said Det. Scott Phelps, investigations coordinator for the Southeast Missouri Cyber Crimes Task Force.

Before there were online chat rooms, predators had to physically approach children, often in public places, to lure them away from safety. Before digital images could be sent through email or downloaded from websites, child pornography collectors exchanged paper photographs and film reels.

Chardon Police online with computer forensics

Chardon Police Department is about to go more high-tech. The 17-officer agency in semirural Geauga County will be adding computer forensics to its repertoire this year.

Five-year officer Chuck Pirnat recently was trained in this specialization -- pertaining to recovery of electronic evidence found in computers and digital storage media -- and will be putting it to use once the $13,100 worth of equipment has arrived.

Institute of Electrical and Electronics Engineers (IEEE) Suffers Security Breach, Cautions Members

Recently, the Institute of Electrical and Electronics Engineers (IEEE), the world's largest and renowned technical professional association notified members of possible data breach. The association identified the unauthorized access to customer database in December. Computer forensics professionals were engaged to investigate the security breach incident. In February, the forensics investigators identified that a file containing customer data was deleted from the computers of IEEE in November last year.

Computer forensics expert takes stand at Twitchell trial

The jury in the Mark Twitchell murder trial has heard from a computer forensics expert who copied the laptop hard drive that was found in Twitchell's car.

While investigating, the court heard there was a key phrase the EPS constable came across that made him sit up and take notice.

Constable Michael Roszko plugged the laptop into his work computer which has a couple of forensics programs. He then found a deleted file that he told the jury he thought was relevant to the investigation.

Mobile Devices & Social Networks are Key Malware Targets

Consumers using Facebook and other social media sites, or using mobile devices, are among the key targets of malware according to the latest Internet Security Threat Report published by anti-virus company Symantec.

The company's 16th report still sees attacks in which specific industries or even individuals, are targeted as one of the main threats, but highlights the developing vulnerabilities that social media and mobile devices open up.

Microsoft sets mammoth Patch Tuesday, will fix 64 flaws

Microsoft today said it will patch a record 64 vulnerabilities in Windows, Office, Internet Explorer, Windows graphics framework, and other software next week, and tie a December 2010 record for the number of security updates it issues.

The 17 updates -- Microsoft calls them "bulletins" -- tie the count of December 2010. The bulletins that will ship next Tuesday will include 64 patches, Microsoft said, 15 more than the previous record of October 2010, and 24 more than the 40 of the former second-place collection of December 2010.

Breach leaked names and emails of thousands of shoppers

Baltimore - They're a company that sends out million of emails a year, but you've never heard of Epsilon until now. That's because this internet marketing company is recovering from a security breach that impacts you. ABC2 News Joce Sterman has the steps you need to take to protect yourself in this week's Scam Alert.

Chances are you've handed it over dozens of times to get your hands on a deal. Retailers often ask for your email so they can send you specials or coupons. But thanks to a security breach, something else could be headed to your inbox.

Subscribe to RSS - admin's blog