Displaying items by tag: Law Enforcement

In what could be called a fantastic move, global law enforcement agencies attacked and took down LockBit’s infrastructure. The day of the event was filled with much celebration on X (Twitter) LinkedIn, Facebook and elsewhere. The memes flowed freely and even the usual naysayers could not dampen the enthusiasm over this significant event. Especially since it all appears to have been due to an unpatched vulnerability in PHP 8.x.

Published in Security Talk

2022 has been a busy year for the information security industry on both sides of the playing field. We have seen an increase in target attacks on businesses, a larger number of Zero-Day vulnerabilities disclosed that were being actively exploited in the wild, several major companies had data stollen and leaked, and we cannot forget the threat actor war going on over the Russian Invasion of Ukraine. With all these items, law enforcement agencies have also been very busy with the seizure and shut down of two major “hacker” marketplaces, Hydra and RaidForums.

Published in Security Talk

The Dark Web (whispered in Letterkenny) is a playground for all kinds of illegal activity. One well traded item is Personal Information including Credit Card numbers. Due to the state of security in most organizations (Stuart!) there is no shortage of personally identifying information and credit cards for sale. There is a lot of money that trades hands around this as well, so it has been and will continue to be a target for law enforcement in the constant battle against the financial threat actor groups.

Published in Security Talk
fbi-logo

The FBI and a few other groups would like to put a law in place which would allow them to fine companies that refuse to hand over information regardless of the reasons for not choosing to do so. This plan is part of an increasing effort to force companies to share user information with the government. On the surface the idea looks pretty straight forward. Law Enforcement and other Government Agencies want to be able to track down people that might be using the internet and internet communication services to commit crimes. Sounds legit right?

Published in News
Sunday, 05 August 2012 19:56

Wozniak reluctant to use the Cloud

cloud

From the very beginning it was certain that the main concern about Cloud computing would be security. No one can feel comfortable about placing his private data in remote storage, no matter how high of a security level is promised by the service provider. This weekend we could see security issues coming into the spotlight as Gizmodo's twitter feed god hacked, after one of their former writers, Mat Honan, had his Cloud penetrated by a group calling themselves Clan W3. They sent racist and offensive tweets to around 415,000 followers, luckily Gizmodo managed to quickly regain control of it's account.

Published in News

oct-5-demo-029Yesterday we wrote an article where we described how a military drone could be hacked through the use of GPS spoofing. This morning we received an email from one of the people involved in the actual event with some clarifications. First despite original reports (and some addition information we were given) the drone that was used for the demonstration was not a military class drone. It was one that the University of Texas purchased. It is still fairly sophisticated and is the same kind used by law enforcement. The team did this to point out serious issues with commercial drones before there is a rewrite of the FAA rules governing this new class of vehicles. You can check out the original story about for more information on the hack.

**********UPDATE 7/1/2012 - We have heard from Both Vanguard Defense Industries and Todd Humphreys from the University of Texas. The Drone in quesstion was NOT purchased from Vanguard. The University of Texas declined to state how they did purchase it from, but commented that the vulnerability exists in any drone that uses Civil GPS systems. ******************

Published in News