<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0"><id>tag:blogger.com,1999:blog-1591641974933932474</id><updated>2026-03-22T06:42:25.371+12:00</updated><category term="cybersecurity"/><category term="cyber security"/><category term="cyber attack"/><category term="cyberattack"/><category term="Hackers"/><category term="China"/><category term="malware"/><category term="anonymous"/><category term="Cyber attacks"/><category term="security"/><category term="CISPA"/><category term="cyber warfare"/><category term="cyber war"/><category term="cybersecurity news"/><category term="Iran"/><category term="Cyberwar"/><category term="cyber threats"/><category term="cybersecurity news digest"/><category term="cyberwarfare"/><category term="SOPA"/><category term="cyberattacks"/><category term="online security"/><category term="Obama"/><category term="Stuxnet"/><category term="cyber threat"/><category term="cybercrime"/><category term="cyberthreat"/><category term="hacking"/><category term="Flame"/><category term="Huawei"/><category term="NSA"/><category term="network hackers"/><category term="passwords"/><category term="privacy"/><category term="Anonymous group"/><category term="cyber crime"/><category term="cyber defense"/><category term="infected pc"/><category term="Al-Qaeda"/><category term="Facebook"/><category term="Google"/><category term="US"/><category term="Anonymous group hacktivists"/><category term="Chinese cyber attack"/><category term="DHS"/><category term="Internet"/><category term="Megaupload"/><category term="North Korea"/><category term="PIPA"/><category term="Pentagon"/><category term="SEC"/><category term="Spam"/><category term="White House"/><category term="cyber espionage"/><category term="cyberthreats"/><category term="encryption"/><category term="espionage"/><category term="fraud"/><category term="hacker"/><category term="hacktivists"/><category term="internet freedom"/><category term="java"/><category term="2012 Cybersecurity Trends"/><category term="Al Qaeda"/><category term="Banks"/><category term="Botnets"/><category term="Chicago"/><category term="Cyber Criminals"/><category term="Cyber-attack"/><category term="Cybersecurity Act of 2012"/><category term="Cyberspace"/><category term="DNSChanger"/><category term="DOD"/><category term="FBI"/><category term="Gmail"/><category term="Government"/><category term="Homeland security"/><category term="Israel"/><category term="LulzSec"/><category term="NIST"/><category term="Power Grid"/><category term="Russia"/><category term="Senate Cybersecurity Bill"/><category term="Sweden"/><category term="WikiLeaks"/><category term="censorship"/><category term="cyber monday"/><category term="cyber spying"/><category term="cyber weapons"/><category term="cyber-espionage"/><category term="data theft"/><category term="hack"/><category term="hacked"/><category term="hacktivism"/><category term="infrastructure"/><category term="news digest"/><category term="outsourcing"/><category term="phishing"/><category term="spying"/><category term="steal"/><category term="surveillance"/><category term="10-K"/><category term="2012"/><category term="2012 review"/><category term="ATMs"/><category term="Adobe Reader X zero-day"/><category term="Alexander"/><category term="Anonymous Retaliates"/><category term="Anonymous cyber-attack"/><category term="Anonymous. NSA"/><category term="AntiSec"/><category term="Apple"/><category term="Armed Forces"/><category term="Arms Vendors"/><category term="Attackers"/><category term="Azerbaijan"/><category term="BAE"/><category term="BBC"/><category term="Backdoor.AndroidOS.Obad.a"/><category term="Bill"/><category term="Bill to force cops to get a warrant before reading your e-mail"/><category term="Boeing"/><category term="Booz Allen Hamilton"/><category term="Bulgarian sleuth"/><category term="CONNECT"/><category term="Capability"/><category term="China cyber attack"/><category term="China cyber security report"/><category term="China's Trade War"/><category term="Chinese cyberattacks"/><category term="Chinese hackers"/><category term="Chrome browser"/><category term="Cisco"/><category term="Cloaking Email"/><category term="Code name Verax"/><category term="Communications"/><category term="Computer Security Predictions"/><category term="Contract Worker goes Rogue"/><category term="Conundrum"/><category term="Critical Infrastructure"/><category term="Cyber Command"/><category term="Cyber Funding"/><category term="Cyber Operations Pillar Contract"/><category term="Cyber Spies"/><category term="Cyber Weapon Friendly Fire"/><category term="Cyber attacks growing more advanced"/><category term="Cyber risk"/><category term="Cyber-Security Industry"/><category term="Cyberattack is SecDef's nightmare"/><category term="Cybersecurity 2.0"/><category term="Cybersecurity tweets"/><category term="DARPA"/><category term="DDoS"/><category term="DNSmalware"/><category term="DOCTRINE"/><category term="DOJ"/><category term="Data Breach Infographic"/><category term="Data Privacy Day"/><category term="Data Swaps"/><category term="Decoys"/><category term="Department of Defense"/><category term="Deterrence"/><category term="Dmitri Alperovitch"/><category term="Eastern Europeans"/><category term="El Al"/><category term="Emergency Alert System"/><category term="FBI partner"/><category term="FBI warning"/><category term="FISC"/><category term="Facebook Attack"/><category term="Facebook botnet"/><category term="FinSpy"/><category term="Finland"/><category term="Flame virus"/><category term="Flashback Trojan"/><category term="Foreign Hackers"/><category term="GAO"/><category term="GSA"/><category term="Gamma Group"/><category term="General in leak probe quit Pentagon post suddenly"/><category term="Global Network of Hackers"/><category term="GoDaddy"/><category term="Google privacy"/><category term="Guantanamo"/><category term="Guy Fawkes Day"/><category term="Hacked Accounts"/><category term="Hacker Tactics"/><category term="Honeywords"/><category term="Huawei ban"/><category term="Huawei banned"/><category term="Huge attack on WordPress sites"/><category term="ID Theft"/><category term="INDIA"/><category term="IT"/><category term="IT security experts"/><category term="ITU"/><category term="Identity Theft"/><category term="Instagram Food Photo"/><category term="Internet Governance Forum"/><category term="Interpol website"/><category term="Iran Cyber Attack BBC"/><category term="Iranian Hackers"/><category term="Iranian terror group"/><category term="Ixquick"/><category term="Jihad"/><category term="Kaspersky"/><category term="Kaspersky Lab"/><category term="Live Chat Representatives"/><category term="London 2012"/><category term="Malware Infographic"/><category term="Marines"/><category term="Microsoft"/><category term="Morta Security"/><category term="NBN"/><category term="NCSA"/><category term="NDAA"/><category term="NIST Cybersecurity Center"/><category term="NSA Nightmare"/><category term="NYSE"/><category term="National Cyber Security Alliance"/><category term="Nato cybersecurity"/><category term="Olympics"/><category term="Online Identities"/><category term="Online Security Threats"/><category term="Online Shopping safety"/><category term="OpNoShow"/><category term="Order"/><category term="POS"/><category term="Panetta"/><category term="Pearl Harbor"/><category term="Peter G. Neumann"/><category term="Petraeus Mission Impossible"/><category term="Port of Baltimore"/><category term="Priorities"/><category term="Private Threats"/><category term="Public Threats"/><category term="QinetiQ"/><category term="RandD"/><category term="Recruiting Session"/><category term="Reid"/><category term="Republican Critics"/><category term="Ron Wyden"/><category term="Russian"/><category term="SDA report"/><category term="SOCA"/><category term="SRD"/><category term="STOP"/><category term="Safely shop online"/><category term="Scotland Yard"/><category term="Secret Courts"/><category term="Securing Your Accounts"/><category term="Security Defence Agenda"/><category term="Security tips"/><category term="Senate"/><category term="Senators"/><category term="Siemens"/><category term="Smart"/><category term="Snowden knew the risks"/><category term="Social Networks"/><category term="Solutions"/><category term="South Korea"/><category term="Spies"/><category term="Sprint"/><category term="Spy Chief"/><category term="StartPage"/><category term="Stole"/><category term="Students"/><category term="Stuxnet Computer worm"/><category term="Swiss spy data leak"/><category term="Syrian Electronic Army"/><category term="THINK"/><category term="Telecom"/><category term="Telecom Immunity"/><category term="Terrorist Cyber Attacks"/><category term="The China Dream"/><category term="The Onion"/><category term="Titan Rain"/><category term="Trawling the Internet"/><category term="Trends"/><category term="Tumblr"/><category term="U.S."/><category term="UN"/><category term="US Army"/><category term="US Cybersecurity Debate"/><category term="US Senate"/><category term="US Spy Chief"/><category term="US Stealth Drone"/><category term="US dams"/><category term="US military"/><category term="US prison contractor"/><category term="Utility"/><category term="Vatican Website"/><category term="Vodafone"/><category term="WCIT"/><category term="Websites"/><category term="What I Need To Know"/><category term="What It Means to Be An NSA Target"/><category term="Zynga"/><category term="active response"/><category term="advanced persistent threats"/><category term="apps"/><category term="awareness"/><category term="biometrics"/><category term="blowback"/><category term="browser"/><category term="budgetcuts"/><category term="canada"/><category term="checkup"/><category term="children"/><category term="children and hackers"/><category term="chinese"/><category term="chinese cyberattack"/><category term="civil liberties"/><category term="cloudcomputing"/><category term="code"/><category term="computers"/><category term="contractor"/><category term="cooperation"/><category term="credit card data"/><category term="cvyber peace"/><category term="cyber"/><category term="cyber  cyber attack"/><category term="cyber Mafia"/><category term="cyber army"/><category term="cyber breach"/><category term="cyber crisis"/><category term="cyber infection"/><category term="cyber issues"/><category term="cyber planner"/><category term="cyber security news"/><category term="cyber targets"/><category term="cyber-preparedness"/><category term="cyber-risk"/><category term="cyber-terror apocalypse"/><category term="cyber-threats"/><category term="cyberd efense"/><category term="cyberlaw"/><category term="cyberplanner tool"/><category term="cybersecurity bill"/><category term="cybersecurity insurance"/><category term="cybersecurity legislation"/><category term="cyberspace security"/><category term="data privacy"/><category term="deface homepages"/><category term="defcon"/><category term="defenders"/><category term="executive order"/><category term="fear-mongering"/><category term="feds"/><category term="first strike of a global war"/><category term="four horsemen"/><category term="france"/><category term="free speech"/><category term="freedom"/><category term="gauss"/><category term="hacktivist"/><category term="iMessage"/><category term="identity"/><category term="insurance"/><category term="intellectual property"/><category term="intelligence failure"/><category term="intercept"/><category term="internet control"/><category term="investigation"/><category term="laws"/><category term="lock your screen"/><category term="movie industry"/><category term="national security"/><category term="new era of warfare"/><category term="notification"/><category term="online"/><category term="open Internet"/><category term="passé"/><category term="patches"/><category term="podcasts"/><category term="point-of-sale terminals"/><category term="power grids"/><category term="protected"/><category term="regulation"/><category term="sabotage"/><category term="safe online"/><category term="safety"/><category term="scams"/><category term="security online"/><category term="security threat"/><category term="security update"/><category term="shopping online"/><category term="skype"/><category term="small business"/><category term="social media"/><category term="spy"/><category term="startup"/><category term="stratfor"/><category term="surveillance state"/><category term="symbols"/><category term="targeted attacks"/><category term="technology"/><category term="technology trends"/><category term="terrorists"/><category term="thunderstruck"/><category term="tracking"/><category term="unlawful surveillance"/><category term="verizon"/><category term="virtual world"/><category term="virus"/><category term="vulnerability"/><category term="what to do"/><category term="what you need to know"/><category term="wire fraud"/><category term="wiretap"/><category term="worm"/><category term="yahoo"/><category term="your webcam"/><category term="zero-day flaw"/><title type="text">sobeq.org</title><subtitle type="html">cybersecurity</subtitle><link href="http://www.sobeq.org/feeds/posts/default" rel="http://schemas.google.com/g/2005#feed" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default?redirect=false" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/" rel="alternate" type="text/html"/><link href="http://pubsubhubbub.appspot.com/" rel="hub"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default?start-index=26&amp;max-results=25&amp;redirect=false" rel="next" type="application/atom+xml"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author><generator uri="http://www.blogger.com" version="7.00">Blogger</generator><openSearch:totalResults>537</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-2742426994936095936</id><published>2013-12-14T06:39:00.003+12:00</published><updated>2013-12-14T06:39:59.238+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity tweets"/><title type="text">Cybersecurity tweets</title><content type="html">&lt;a class="twitter-timeline" data-widget-id="411565814282588160" href="https://twitter.com/search?q=cybersecurity"&gt;Tweets about "cybersecurity"&lt;/a&gt;&lt;br /&gt;
&lt;script&gt;!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+"://platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;
&lt;/i&gt;&lt;/b&gt; &lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt; &lt;script src="http://platform.twitter.com/widgets.js" type="text/javascript"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/2742426994936095936" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/2742426994936095936" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/12/cybersecurity-tweets.html" rel="alternate" title="Cybersecurity tweets" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-8948911785577382257</id><published>2013-09-16T00:00:00.000+12:00</published><updated>2013-09-16T00:00:02.543+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="encryption"/><category scheme="http://www.blogger.com/atom/ns#" term="Ixquick"/><category scheme="http://www.blogger.com/atom/ns#" term="StartPage"/><title type="text">StartPage, Ixquick, Encryption</title><content type="html">&lt;a href="https://www.ixquick.com/eng/press/pr-pfs.html"&gt;StartPage and Ixquick Deploy Newest Encryption Standards against Mass Surveillance&lt;/a&gt;: "SSL encryption has been proven to be an effective tool for protecting sensitive online traffic from eavesdropping and surveillance. However, security researchers now worry that SSL encryption may not provide adequate protection if Government agencies are scooping up large amounts of encrypted traffic and storing it for later decryption.

With SSL alone, if a target website's "private key" can be obtained once in the future - perhaps through court order, social engineering, attack against the website, or cryptanalysis - that same key can then be used to unlock all other historical traffic of the affected website. For larger Internet services, that could expose the private data of millions of people.

StartPage and Ixquick have now deployed a defense against this known as "Perfect Forward Secrecy," or PFS." (read more at link above)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8948911785577382257" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8948911785577382257" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/09/startpage-ixquick-encryption.html" rel="alternate" title="StartPage, Ixquick, Encryption" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-2741655390346209180</id><published>2013-09-12T23:19:00.002+12:00</published><updated>2013-09-12T23:19:30.027+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="What It Means to Be An NSA Target"/><title type="text">What It Means to Be An NSA Target</title><content type="html">&lt;a href="https://www.eff.org/deeplinks/2013/07/what-it-means-be-target-or-why-we-once-again-stopped-believing-government-and-once" rel="nofollow" target="_blank"&gt;What It Means to Be An NSA "Target": New Information Shows Why We Need Immediate FISA Amendments Act Reform | Electronic Frontier Foundation&lt;/a&gt;: "We’ve written before about the word games the government plays in describing its surveillance practices: “acquire,” “collect,” and “content” are all old government favorites. The New York Times report proves Feinstein statement is false, and it's clear it’s time to add “target” to the list of word games as well."&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/2741655390346209180" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/2741655390346209180" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/09/what-it-means-to-be-nsa-target.html" rel="alternate" title="What It Means to Be An NSA Target" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-7453209942503777785</id><published>2013-08-13T00:00:00.000+12:00</published><updated>2013-08-13T00:00:04.662+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Booz Allen Hamilton"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Operations Pillar Contract"/><title type="text">Booz Allen Hamilton Wins Major Integrated Cyber Operations Pillar Contract </title><content type="html">&lt;a href="http://online.wsj.com/article/PR-CO-20130802-908767.html" rel="nofollow" target="_blank"&gt;Booz Allen Hamilton Wins Major Integrated Cyber Operations Pillar Contract to Support C4ISR, Cybersecurity Programs - WSJ.com&lt;/a&gt;: "August 02, 2013-- Booz Allen Hamilton today announced it has now won four of the Full and Open Pillar contracts involving a range of full system lifecycle support activities for the Space and Naval Warfare Systems Center Atlantic (SCC Atlantic). Most recently, the firm won a contract with a total ceiling of nearly $900 million to support the integrated cybersecurity and Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance (C4ISR) operations of the Space and Naval Warfare Systems Center Atlantic (SCC Atlantic)."&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.google.com/url?q=http://www.nasdaq.com/article/cyber-security-company-fireeye-files-for-a-175-million-ipo-cm264316&amp;amp;ct=ga&amp;amp;cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNHwB5oVWyDrJ45e1CzE4teCDiil2A" rel="nofollow" target="_blank"&gt;Cyber security company FireEye files for a $175 million IPO&lt;/a&gt;&lt;br /&gt;
NASDAQ&lt;br /&gt;FireEye, which provides malware protection software to enterprises, filed on Friday with the SEC to raise up to $175 million in an initial public offering.&lt;br /&gt;
&lt;br /&gt;&lt;a href="http://www.google.com/url?q=http://www.radioworld.com/article/we-need-a-dialogue-on-cyber-security/220655&amp;amp;ct=ga&amp;amp;cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNEhmDXU1w6DnR8nNPclgeuk-ZzE6A" rel="nofollow" target="_blank"&gt;We Need a Dialogue on Cyber Security&lt;/a&gt;&lt;br /&gt;
Radio World&lt;br /&gt;Like it or not, cyber security will continue to be a fact of life for broadcasters and ... EAS systems for any potential indications of attack or unauthorized access.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;
&lt;script src="http://platform.twitter.com/widgets.js" type="text/javascript"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/7453209942503777785" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/7453209942503777785" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/08/booz-allen-hamilton-wins-major.html" rel="alternate" title="Booz Allen Hamilton Wins Major Integrated Cyber Operations Pillar Contract " type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-1235685992983600332</id><published>2013-08-10T00:00:00.000+12:00</published><updated>2013-08-10T00:00:04.190+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Funding"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><title type="text">Cyber Security, Cyber Funding</title><content type="html">&lt;a href="http://www.google.com/url?q=http://www.govtech.com/Cyber-Funding-Under-Our-Noses.html&amp;amp;ct=ga&amp;amp;cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNE9RMuTowDtF0AREZot2CemZdeBWg" rel="nofollow" target="_blank"&gt;Cyber Funding Under Our Noses&lt;/a&gt;&lt;br /&gt;
Government Technology&lt;br /&gt;The recent leaks detailing the U.S. National Security Agency's extensive monitoring ... development for state and local governments and our overall cyber health.&lt;br /&gt;&lt;img src="http://t2.gstatic.com/images?q=tbn:ANd9GcTww0TeHoY_sqSI5IrjOxlg2K99kjEsCBmd2eO2argBsjI2WGtl8edQ_yx52A" /&gt;&lt;br /&gt;Government Technology&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.google.com/url?q=http://www.metrocorpcounsel.com/articles/24691/tensions-and-overlaps-between-cyber-and-data-security&amp;amp;ct=ga&amp;amp;cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNHOSR32YUmT61I9cSYw2prPspwmag"&gt;The Tensions And Overlaps Between Cyber And Data Security&lt;/a&gt;&lt;br /&gt;
Metropolitan Corporate Counsel&lt;br /&gt;The U.S. Food and Drug Administration (FDA) warns about the risk of cyber attacks on medical devices. The White House is implementing an Executive Order ...&lt;br /&gt;
&lt;br /&gt;&lt;a href="http://www.google.com/url?q=http://www.scmagazine.com/defcon-former-dhs-cyber-official-to-private-sector-govt-cant-help-you-with-intelligence/article/305953/&amp;amp;ct=ga&amp;amp;cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNFUWd39nExTULvCh-U-pHJlnmvzEw"&gt;DefCon: Former DHS cyber official to private sector: Gov't can't help ...&lt;/a&gt;&lt;br /&gt;
SC Magazine&lt;br /&gt;The former deputy undersecretary for cyber security at the Department of ... can't act quickly enough to help private companies defend against a possible attack.&lt;br /&gt;
&lt;br /&gt;&lt;a href="http://www.google.com/url?q=http://www.echopress.com/event/article/id/106572/group/homepage/&amp;amp;ct=ga&amp;amp;cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNGUJ_SWZdntFNzHVk1bdCQafTuGaQ"&gt;Klobuchar wants to reduce risk of cyber attacks to infrastructure&lt;/a&gt;&lt;br /&gt;
Alexandria Echo Press&lt;br /&gt;The Cybersecurity Act of 2013 aims to help secure the nation from cyber threats by providing NIST, a non-regulatory agency within the Department of Commerce ...&lt;br /&gt;
&lt;br /&gt;&lt;a href="http://www.google.com/url?q=http://crave.cnet.co.uk/software/bt-and-vodafone-helped-uk-cyber-spying-effort-report-claims-50011883/&amp;amp;ct=ga&amp;amp;cd=MTA3MjI2OTY2MDM2Nzk0NTYyMzk&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNHv-QaO9C6TcgqEWlcvDdVCvuD-bQ"&gt;BT and Vodafone helped UK cyber-spying effort, report claims&lt;/a&gt;&lt;br /&gt;
CNET UK&lt;br /&gt;Snowden is a former National Security Agency (NSA) contractor who leaked the US ... Questions related to national security are a matter for governments not ...&lt;br /&gt;&lt;img src="http://t3.gstatic.com/images?q=tbn:ANd9GcRsjcTr2XHBcaS0H-fqHiGYDj92bc7m5CXm0tfmbGwzRJpPZFyIJ0NKVu8TPw" /&gt;&lt;br /&gt;CNET UK&lt;br /&gt;
&lt;br /&gt;&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;
&lt;script src="http://platform.twitter.com/widgets.js" type="text/javascript"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/1235685992983600332" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/1235685992983600332" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/08/cyber-security-cyber-funding.html" rel="alternate" title="Cyber Security, Cyber Funding" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-208937944704013430</id><published>2013-08-08T00:00:00.000+12:00</published><updated>2013-08-08T00:00:05.945+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cybercrime"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><title type="text">Cybersecurity, Cybercrime</title><content type="html">&lt;a href="http://www.google.com/url?q=http://economictimes.indiatimes.com/tech/internet/cyber-criminals-try-to-steal-fin-data-using-fake-tax-ads-mcafee/articleshow/21597866.cms&amp;amp;ct=ga&amp;amp;cd=OTEzMDYzMDMxMDU2MTI2NDk1MA&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNFTpJDQKEZVGtVtcQv5ZUw--BaYfg" rel="nofollow" target="_blank"&gt;Cyber criminals try to steal fin data using fake tax ads: McAfee&lt;/a&gt;&lt;br /&gt;
Economic Times&lt;br /&gt;Cyber criminals are busy using phishing e-mails and fake ads to steal confidential financial data of users, cyber security firm McAfee said today. NEW DELHI: As ...&lt;br /&gt;&lt;img src="http://t1.gstatic.com/images?q=tbn:ANd9GcR0HeFzbRZ6kzREX7kKPevMTS-XCnDRIl6wTrZJt20qOvSrOqOWcgp0cx0" /&gt;&lt;br /&gt;Economic Times&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.google.com/url?q=http://www.fiercefinanceit.com/story/nasdaq-faces-huge-cyber-security-challenges/2013-08-01&amp;amp;ct=ga&amp;amp;cd=OTEzMDYzMDMxMDU2MTI2NDk1MA&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNHjbcjwucs9ET2UstEChi_uoIVbzg"&gt;Nasdaq faces huge cyber-security challenges&lt;/a&gt;&lt;br /&gt;
FierceFinanceIT&lt;br /&gt;Nasdaq faces huge cyber-security challenges.... To be sure, all financial services companies are under attack these days. But the especially ...&lt;br /&gt;
&lt;br /&gt;&lt;a href="http://www.google.com/url?q=http://leadership.ng/news/040813/uba-advocates-increased-cyber-security-vigilance-banks&amp;amp;ct=ga&amp;amp;cd=OTEzMDYzMDMxMDU2MTI2NDk1MA&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNF7XpW7jLqQlSNGVqCj8PqzRYN1mQ"&gt;UBA Advocates Increased Cyber-security Vigilance By Banks&lt;/a&gt;&lt;br /&gt;
Leadership Newspapers&lt;br /&gt;UBA Advocates Increased Cyber-security Vigilance By Banks ... particular case, the probability of attack would be very high and the consequence, very severe.&lt;br /&gt;&lt;img src="http://t0.gstatic.com/images?q=tbn:ANd9GcQWDujU8je3TuoW535kyl3pnsH_msWnhHIgzj8WQIYXonAVXS34yEXOjKOAng" /&gt;&lt;br /&gt;Leadership Newspapers&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;
&lt;script src="http://platform.twitter.com/widgets.js" type="text/javascript"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/208937944704013430" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/208937944704013430" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/08/cybersecurity-cybercrime.html" rel="alternate" title="Cybersecurity, Cybercrime" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-8197575849733038867</id><published>2013-08-06T00:00:00.000+12:00</published><updated>2013-08-06T00:00:07.284+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber-espionage"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><title type="text">CEO concerns about malware attacks and cyber-espionage</title><content type="html">&lt;a href="http://www.google.com/url?q=http://www.eweek.com/small-business/cyber-security-confidence-lacking-among-executives/&amp;amp;ct=ga&amp;amp;cd=MTM1MzAzMDgwNzg2NzkzNTc0Nzc&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNFYvUnwhueaZGSNvxI1firKoq2rMA" target="_blank"&gt;Cyber-Security Confidence Lacking Among Executives&lt;/a&gt;&lt;br /&gt;
eWeek&lt;br /&gt;A whopping 97 percent of enterprises with annual security budgets totaling more than ... reported concerns about malware attacks and cyber-espionage tactics. ... in five say their biggest concern is not knowing whether an attack is underway, ...&lt;br /&gt;
&lt;br /&gt;&lt;a href="http://www.google.com/url?q=http://www.abc.net.au/news/2013-07-29/calls-for-government-to-develop-a-cyber-security-white-paper/4850754&amp;amp;ct=ga&amp;amp;cd=MTM1MzAzMDgwNzg2NzkzNTc0Nzc&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNEiYSxxt3PtURXRk1LU8Jb8knRD0A"&gt;Report recommends cyber-security white paper within a year&lt;/a&gt;&lt;br /&gt;
ABC Online&lt;br /&gt;A new report by the Australian Strategic Policy Institute recommends the incoming government develop a white paper focusing on the country's cyber-security ...&lt;br /&gt;
&lt;br /&gt;&lt;a href="http://www.google.com/url?q=http://targetjobs.co.uk/graduate-jobs/jobs/324555-bae-systems-detica-graduate-cyber-security-consultant&amp;amp;ct=ga&amp;amp;cd=MTM1MzAzMDgwNzg2NzkzNTc0Nzc&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNFZk4-1ZDaMsBPr-ZdZrPJr_0s7HA"&gt;Graduate Cyber Security Consultant&lt;/a&gt;&lt;br /&gt;
TARGETjobs&lt;br /&gt;We are looking for talented Graduates to join BAE Systems Detica's Cyber Security Business Unit (BU). The Cyber Security BU supports our clients to identify, ...&lt;br /&gt;
&lt;br /&gt;&lt;a href="http://www.google.com/url?q=http://www.afr.com/p/technology/cyber_and_security_of_nbn_emerging_z5XhDhlYbUDj4G9jncQM8J&amp;amp;ct=ga&amp;amp;cd=MTM1MzAzMDgwNzg2NzkzNTc0Nzc&amp;amp;cad=CAEYAA&amp;amp;usg=AFQjCNFdFzLmoo41wPAuZEk8zLYQCKPU2g"&gt;Cyber and security of NBN emerging as election issues&lt;/a&gt;&lt;br /&gt;
The Australian Financial Review&lt;br /&gt;“It's disappointing Australia doesn't have a national cyber security policy,” the institute's Tobias Feakin said. “This directly weakens our ability to respond to and ...&lt;br /&gt;
&lt;br /&gt;&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;
&lt;script src="http://platform.twitter.com/widgets.js" type="text/javascript"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8197575849733038867" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8197575849733038867" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/08/ceo-concerns-about-malware-attacks-and.html" rel="alternate" title="CEO concerns about malware attacks and cyber-espionage" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-4482943065200367713</id><published>2013-08-03T00:00:00.000+12:00</published><updated>2013-08-03T00:00:12.160+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Botnets"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><title type="text">Malware, Botnets</title><content type="html">&lt;a href="http://www.staysafeonline.org/stay-safe-online/keep-a-clean-machine/malware-and-botnets" rel="nofollow" target="_blank"&gt;Malware &amp;amp; Botnets | StaySafeOnline.org&lt;/a&gt;: "MALWARE &amp;amp; BOTNETS

The Internet is a powerful and useful tool, but in the same way that you shouldn’t drive without buckling your seat belt or ride a bike without a helmet, you shouldn’t venture online without taking some basic precautions."&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Viruses&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;
Viruses are harmful computer programs that can be transmitted in a number of ways. Although they differ in many ways, all are designed to spread themselves from one computer to another through the Internet and cause havoc. Most commonly, they are designed to give the criminals who create them some sort of access to those infected computers.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Spyware&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
The terms "spyware" and "adware" apply to several different technologies. The two important things to know about them is that:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;They can download themselves onto your computer without your permission (typically when you visit an unsafe website or via an attachment)&lt;/li&gt;
&lt;li&gt;They can make your computer do things you don't want it to do. That might be as simple as opening an advertisement you didn't want to see. In the worst cases, spyware can track your online movements, steal your passwords and compromise your accounts.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Botnets&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Botnets are networks of computers infected by malware (computer virus, key loggers and other malicious software) and controlled remotely by criminals, usually for financial gain or to launch attacks on website or networks.&lt;br /&gt;
&lt;br /&gt;
If your computer is infected with botnet malware, it communicates and receives instructions about what it’s supposed to do from “command and control” computers located anywhere around the globe. What your computer does depends on what the cybercriminals are trying to accomplish. &lt;br /&gt;
&lt;br /&gt;
Many botnets are designed to harvest data, such as passwords, social security numbers, credit card numbers, addresses, telephone numbers, and other personal information.  The data is then used for nefarious purposes, such as identity theft, credit card fraud, spamming (sending junk email), website attacks, and malware distribution.  For more information on botnets, visit the &lt;a href="http://stopthinkconnect.org/campaigns/keep-a-clean-machine/"&gt;STOP. THINK. CONNECT. Keep a Clean Machine Campaign.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Protect Yourself with these STOP. THINK. CONNECT. Tips:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Keep a Clean Machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.&lt;/li&gt;
&lt;li&gt;When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.&lt;/li&gt;
&lt;li&gt;Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware.&lt;/li&gt;
&lt;li&gt;Plug &amp;amp; scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/4482943065200367713" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/4482943065200367713" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/08/malware-botnets.html" rel="alternate" title="Malware, Botnets" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-3383819041029545056</id><published>2013-08-01T00:00:00.000+12:00</published><updated>2016-08-13T23:10:09.006+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Spam"/><title type="text">Spam, Phishing</title><content type="html">&lt;a href="http://www.staysafeonline.org/stay-safe-online/keep-a-clean-machine/spam-and-phishing" rel="nofollow" target="_blank"&gt;Spam &amp;amp; Phishing | StaySafeOnline.org&lt;/a&gt;: "Cybercriminals have become quite savvy in their attempts to lure people in and get you to click on a link or open an attachment."&lt;br /&gt;
&lt;br /&gt;
The email they send can look just like it comes from a financial institution, e-commerce site, government agency or any other service or business. &lt;br /&gt;
&lt;br /&gt;
It often urges you to act quickly, because your account has been compromised, your order cannot be fulfilled or another matter. &lt;br /&gt;
&lt;br /&gt;
If you are unsure whether an email request is legitimate, try to verify it with these steps:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Contact the company directly.&lt;/li&gt;
&lt;li&gt;Contact the company using information provided on an account statement or back of a credit card.&lt;/li&gt;
&lt;li&gt;Search for the company online – but not with information provided in the email.&lt;/li&gt;
&lt;li&gt;SpamSpam is the electronic equivalent of junk mail.  The term refers to unsolicited, bulk – and often unwanted – email.&lt;/li&gt;
&lt;/ul&gt;
Here are ways to reduce spam:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Enable filters on your email programs: Most ISPs (Internet Service Providers) and email providers offer spam filters. However, depending on the level you set, you may wind up blocking emails you want. It’s a good idea to occasionally check your junk folder to ensure the filters are working properly.&lt;/li&gt;
&lt;li&gt;Report spam: Most email clients offer ways to mark an email as spam or report instances of spam.  Reporting spam will also help to prevent the messages from being directly delivered to your inbox.&lt;/li&gt;
&lt;li&gt;Own your online presence: Consider hiding your email address from online profiles and social networking sites or only allowing certain people to view your personal information.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
PhishingPhishing attacks use email or malicious websites (clicking on a link) to collect personal and financial information or infect your machine with malware and viruses.&lt;br /&gt;
&lt;br /&gt;
Spear PhishingSpear phishing is highly specialized attacks against a specific target or small group of targets to collect information of gain access to systems.&lt;br /&gt;
&lt;br /&gt;
For example, a cybercriminal may launch a spear phishing attack against a business to gain credentials to access a list of customers. From that attack, they may launch a phishing attack against the customers of the business. Since they have gained access to the network, the email they send may look even more authentic and because the recipient is already customer of the business, the email may more easily make it through filters and the recipient maybe more likely to open the email.&lt;br /&gt;
&lt;br /&gt;
The cybercriminal can use even more devious social engineering efforts such as indicating there is an important technical update or new lower pricing to lure people.&lt;br /&gt;
&lt;br /&gt;
Spam &amp;amp; Phishing on Social NetworksSpam, phishing and other scams aren’t limited to just email. They’re also prevalent on social networking sites. The same rules apply on social networks: When in doubt, throw it out. This rule applies to links in online ads, status updates, tweets and other posts.&lt;br /&gt;
&lt;br /&gt;
Here are ways to report spam and phishing on social networks:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.facebook.com/help/?faq=%20205730929485170&amp;amp;in_context" rel="nofollow" target="_blank"&gt;Reporting spam and phishing on Facebook&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://support.twitter.com/groups/33-report-a-violation/topics/122-reporting-violations/articles/64986-how-to-report-spam-on-twitter" rel="nofollow" target="_blank"&gt;Reporting spam on Twitter&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://support.google.com/youtube/bin/request.py?contact_type=abuse&amp;amp;hl=en-US" rel="nofollow" target="_blank"&gt;Reporting spam and phishing on YouTube&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
How Do You Avoid Being a Victim?&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Don’t reveal personal or financial information in an email, and do not respond to email solicitations for this information. This includes following links sent in email.&lt;/li&gt;
&lt;li&gt;Before sending sensitive information over the Internet, check the security of the website.&lt;/li&gt;
&lt;li&gt;Pay attention to the website's URL. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com versus .net).&lt;/li&gt;
&lt;li&gt;If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Contact the company using information provided on an account statement, not information provided in an email. Information about known phishing attacks is available online from groups such as the &lt;a href="http://www.apwg.org/" rel="nofollow" target="_blank"&gt;Anti-Phishing Working Group&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Keep a clean machine. Install and maintain anti-virus software, firewalls, and email filters to reduce spam.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
What to Do if You Think You are a Victim?&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity.&lt;/li&gt;
&lt;li&gt;If you believe your financial accounts may be compromised, contact your financial institution immediately and close the account(s).&lt;/li&gt;
&lt;li&gt;Watch for any unauthorized charges to your account.&lt;/li&gt;
&lt;li&gt;Consider reporting the attack to your local police department, and file a report with the &lt;a href="http://www.onguardonline.gov/phishing#report%20phishing%20emails" rel="nofollow" target="_blank"&gt;Federal Trade Commission&lt;/a&gt; or the &lt;a href="http://www.ic3.gov/" rel="nofollow" target="_blank"&gt;FBI's Internet Crime Complaint Center&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Additional Resources:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://apwg.org/consumer_recs.html" rel="nofollow" target="_blank"&gt;Anti-Phishing Working Group&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.us-cert.gov/cas/tips/ST04-014.html" rel="nofollow" target="_blank"&gt;United States Computer Emergency Readiness Team (US-CERT)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
Protect Yourself with these STOP. THINK. CONNECT. Tips:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.&lt;/li&gt;
&lt;li&gt;Think before you act: Be wary of communications that implores you to act immediately, offers something that sounds too good to be true, or asks for personal information.&lt;/li&gt;
&lt;li&gt;Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site.&lt;/li&gt;
&lt;li&gt;Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.&lt;/li&gt;
&lt;li&gt;Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/3383819041029545056" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/3383819041029545056" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/08/spam-phishing.html" rel="alternate" title="Spam, Phishing" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-8784918874416004021</id><published>2013-07-30T00:00:00.000+12:00</published><updated>2013-07-30T00:00:04.359+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacked Accounts"/><category scheme="http://www.blogger.com/atom/ns#" term="what to do"/><title type="text">Hacked Accounts, what to do</title><content type="html">&lt;a href="http://www.staysafeonline.org/stay-safe-online/keep-a-clean-machine/hacked-accounts" rel="nofollow" target="_blank"&gt;Hacked Accounts | StaySafeOnline.org&lt;/a&gt;:&lt;br /&gt;
&lt;br /&gt;
If your account has been compromised or hacked, here are ways to regain control.&lt;br /&gt;
&lt;br /&gt;
How do I know if my email or social network account has been hacked?&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;There are posts you never made on your social network page. These posts often encourage your friends to click on a link or download an App.&lt;/li&gt;
&lt;li&gt;A friend, family member or colleague reports getting email from you that you never sent.&lt;/li&gt;
&lt;li&gt;Your information was lost via a data breach, malware infection or lost/stolen device.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
If you believe an account has been compromised, take the following steps:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Notify all of your contacts that they may receive spam messages  that appear to come from your account.  Tell your contacts they shouldn’t open messages or click on any links from your account and warn them about the potential for malware.&lt;/li&gt;
&lt;li&gt;If you  believe your computer is infected, be sure your security software is up to date and scan your system for malware. You can also use other scanners and removal tools.&lt;/li&gt;
&lt;li&gt;Change passwords to all accounts that have been compromised and other key accounts ASAP. Remember, passwords should be long and strong and use a mix of upper and lowercase letters, and numbers and symbols. You should have a unique password for each account.&lt;/li&gt;
&lt;/ul&gt;
If you cannot access your account because a password has been changed, contact the web service immediately and follow any steps they have for recovering an account.&lt;br /&gt;
&lt;br /&gt;
Here are some resources:&lt;br /&gt;
&lt;br /&gt;
eBay&lt;br /&gt;
&lt;a href="http://pages.ebay.com/help/account/unwanted-email.html"&gt;Help with eBay mail violations&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://pages.ebay.com/help/account/securing-account.html"&gt;Help with a hacked account&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://pages.ebay.com/help/buy/report-trading.html"&gt;Help with inappropriate trading&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://pages.ebay.com/securitycenter/index.html"&gt;eBay Security Center&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
PayPal&lt;br /&gt;
&lt;a href="https://cms.paypal.com/us/cgi-bin/marketingweb?cmd=_render-content&amp;amp;content_ID=security/suspicious_activity#email_from_paypal"&gt;Help with suspicious emails&lt;/a&gt;&lt;br /&gt;
&lt;a href="https://cms.paypal.com/us/cgi-bin/?cmd=_render-content&amp;amp;content_ID=security/report_problem"&gt;Help with a hacked account &lt;/a&gt;&lt;br /&gt;
&lt;a href="https://cms.paypal.com/us/cgi-bin/marketingweb?cmd=_render-content&amp;amp;content_ID=security/online_security_center%20%20"&gt;PayPal Security and Protection Center&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Facebook&lt;br /&gt;
&lt;a href="http://www.facebook.com/help/?page=798"&gt;Help with cyberbullying and impostor profiles&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.facebook.com/#%21/help/?page=420"&gt;Help with a hacked account&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.facebook.com/help/"&gt;Facebook Help Center&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Gmail/Google&lt;br /&gt;
&lt;a href="https://mail.google.com/support/bin/answer.py?answer=50270&amp;amp;cbid=1uslv13hx7tyw&amp;amp;src=cb&amp;amp;lev=answer"&gt;Help with a hacked account&lt;/a&gt;&lt;br /&gt;
&lt;a href="https://www.google.com/support/accounts/bin/request.py?ara=1&amp;amp;hl=en&amp;amp;contact_type=ara&amp;amp;ctx=ara"&gt;Help with an inaccessible account&lt;/a&gt;&lt;br /&gt;
&lt;a href="https://support.google.com/mail/?hl=en"&gt;General safety tips&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Twitter&lt;br /&gt;
&lt;a href="http://www.staysafeonline.org/_admin/pages/body/%20https:/support.twitter.com/groups/33-report-a-violation/topics/122-reporting-violations/articles/31796-my-account-has-been-compromised"&gt;Help with a hacked account&lt;/a&gt;&lt;br /&gt;
&lt;a href="https://support.twitter.com/groups/33-report-a-violation/topics/122-reporting-violations/articles/185703-my-account-is-compromised-hacked-and-i-can-t-log-in"&gt;Help with an inaccessible account&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.staysafeonline.org/_admin/pages/body/%20https:/support.twitter.com/groups/33-report-a-violation/topics/166-safety-center/articles/76036-safety-keeping-your-account-secure"&gt;Twitter Safety Center&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Yahoo&lt;br /&gt;
&lt;a href="https://edit.yahoo.com/forgotroot/"&gt;Help with a hacked account &lt;/a&gt;&lt;br /&gt;
&lt;a href="http://help.yahoo.com/kb/index;_ylt=ArcKMoEOSzm64SJVDhLYNGQHjSN4?locale=en_US&amp;amp;y=PROD_ACCT&amp;amp;page=content&amp;amp;id=SLN3417%20%20"&gt;What to do if your account is sending spam&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://abuse.yahoo.com/"&gt;Help Center&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Hotmail&lt;br /&gt;
&lt;a href="http://windows.microsoft.com/en-US/hotmail/hacked-account-faq"&gt;Help with a hacked account&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://windows.microsoft.com/en-US/hotmail/account-temporarily-blocked-faq"&gt;Help with an inaccessible account&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://windows.microsoft.com/en-US/hotmail/help-center"&gt;Hotmail Help Center&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
YouTube&lt;br /&gt;
&lt;a href="http://www.google.com/support/youtube/bin/answer.py?hl=en&amp;amp;answer=126266"&gt;Help with cyberbullying&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.google.com/support/youtube/bin/answer.py?answer=83544"&gt;Help with flagging a spam-based video&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.google.com/support/youtube/bin/answer.py?hl=en&amp;amp;answer=76187"&gt;Help with a hacked account&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://support.google.com/youtube/bin/request.py?hl=en&amp;amp;contact_type=abuse&amp;amp;rd=1"&gt;YouTube Safety Center&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Protect Yourself with these STOP. THINK. CONNECT. Tips:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.&lt;/li&gt;
&lt;li&gt;Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.&lt;/li&gt;
&lt;li&gt;Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals.&lt;/li&gt;
&lt;li&gt;When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8784918874416004021" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8784918874416004021" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/hacked-accounts-what-to-do.html" rel="alternate" title="Hacked Accounts, what to do" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-8735775430739613855</id><published>2013-07-27T00:00:00.000+12:00</published><updated>2013-07-27T00:00:00.088+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cybercrime"/><category scheme="http://www.blogger.com/atom/ns#" term="fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="ID Theft"/><title type="text">ID Theft and Fraud: If you become a victim of cybercrime</title><content type="html">&lt;a href="http://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/id-theft-and-fraud" rel="nofollow" target="_blank"&gt;ID Theft &amp;amp; Fraud | StaySafeOnline.org&lt;/a&gt;: "ID THEFT, FRAUD &amp;amp; VICTIMS OF CYBERCRIME"*&lt;br /&gt;
&lt;br /&gt;
If you're the victim of cybercrime, you need to know what to do and respond quickly.&lt;br /&gt;
&lt;br /&gt;
The Realities of Cybercrime&lt;br /&gt;
When dealing with cybercrime, an ounce of prevention is truly worth a pound of cure. Cybercrime in all its many forms (e.g., online identity theft, financial fraud, stalking, bullying, hacking, e-mail spoofing, information piracy and forgery, intellectual property crime, and more) can, at best, wreak havoc in victims’ lives through major inconvenience and annoyance. At worst, cybercrime can lead to financial ruin and potentially threaten a victim’s reputation and personal safety.&lt;br /&gt;
&lt;br /&gt;
It’s always wise to do as much as possible to prevent cybercrime.&lt;br /&gt;
&lt;br /&gt;
One of the best ways to learn how to prevent cybercrime is to check out STOP. THINK. CONNECT. at &lt;a href="http://stopthinkconnect.org/tips-and-advice/" rel="nofollow" target="_blank"&gt;http://stopthinkconnect.org/tips-and-advice/.&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
But, despite our best efforts, our increasingly digital lives may put us in harm’s way. The fact remains that the bad guys continue to find new uses for ever-expanding—but easily accessible—online technologies to steal, harass, and commit all sorts of crime. If cybercrime happens to you, you need to know what to do and to respond quickly.&lt;br /&gt;
&lt;br /&gt;
Should I Report Cybercrime?&lt;br /&gt;
Cybercrime can be particularly difficult to investigate and prosecute because it often crosses legal jurisdictions and even international boundaries. And, many offenders disband one online criminal operation—only to start up a new activity with a new approach—before an incident even comes to the attention of the authorities.&lt;br /&gt;
&lt;br /&gt;
The good news is that federal, state, and local law enforcement authorities are becoming more sophisticated about and devoting more resources to responding to cybercrime. Furthermore, over the past several years, many new anti-cybercrime statutes have been passed empowering federal, state, and local authorities to investigate and prosecute these crimes. But, law enforcement needs your help to stop the nefarious behavior of cyber criminals and bring them to justice.&lt;br /&gt;
&lt;br /&gt;
Who to contact:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Local law enforcement. Even if you have been the target of a multijurisdictional cybercrime, your local law enforcement agency (either police department or sheriff’s office) has an obligation to assist you, take a formal report, and make referrals to other agencies, when appropriate. Report your situation as soon as you find out about it. Some local agencies have detectives or departments that focus specifically on cybercrime.&lt;/li&gt;
&lt;li&gt;IC3. The Internet Crime Complaint Center (IC3) will thoroughly review and evaluate your complaint and refer it to the appropriate federal, state, local, or international law enforcement or regulatory agency that has jurisdiction over the matter. IC3 is a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center (funded, in part, by the Department of Justice’s Bureau of Justice Assistance). Complaints may be filed online at &lt;a href="http://www.ic3.gov/default.aspx"&gt;http://www.ic3.gov/default.aspx&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Federal Trade Commission. The FTC does not resolve individual consumer complaints, but does operate the Consumer Sentinel, a secure online database that is used by civil and criminal law enforcement authorities worldwide to detect patterns of wrong-doing, leading to investigations and prosecutions. File your complaint at &lt;a href="https://www.ftccomplaintassistant.gov/FTC_Wizard.aspx?Lang=en"&gt;https://www.ftccomplaintassistant.gov/FTC_Wizard.aspx?Lang=en&lt;/a&gt;. Victims of identity crime may receive additional help through the FTC hotline at 1-877-IDTHEFT (1-877-438-4388); the FTC website at&lt;a href="http://www.ftc.gov/IDTheft"&gt;www.ftc.gov/IDTheft&lt;/a&gt; provides resources for victims, businesses, and law enforcement.&lt;/li&gt;
&lt;li&gt;Your Local Victim Service Provider. Most communities in the United States have victim advocates ready to help following a crime. They can provide information, emotional support and advocacy as needed. Find local victims service providers here: &lt;a href="http://ovc.ncjrs.gov/findvictimservices/search.asp"&gt;http://ovc.ncjrs.gov/findvictimservices/search.asp&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Collect and Keep Evidence&lt;br /&gt;
Even though you may not be asked to provide evidence when you first report the cybercrime, it is very important to keep any evidence you may have related to your complaint. Keep items in a safe location in the event you are requested to provide them for investigative or prosecutive evidence. Evidence may include, but is not limited to, the following:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Canceled checks&lt;/li&gt;
&lt;li&gt;Certified or other mail receipts&lt;/li&gt;
&lt;li&gt;Chatroom or newsgroup text&lt;/li&gt;
&lt;li&gt;Credit card receipts&lt;/li&gt;
&lt;li&gt;Envelopes (if you received items via FedEx, UPS, or U.S. Mail)&lt;/li&gt;
&lt;li&gt;Facsimiles&lt;/li&gt;
&lt;li&gt;Log files, if available, with date, time and time zone&lt;/li&gt;
&lt;li&gt;Messages from Facebook, Twitter or other social networking sites&lt;/li&gt;
&lt;li&gt;Money order receipts&lt;/li&gt;
&lt;li&gt;Pamphlets or brochures&lt;/li&gt;
&lt;li&gt;Phone bills&lt;/li&gt;
&lt;li&gt;Printed or preferably electronic copies of emails (if printed, include full email header information)&lt;/li&gt;
&lt;li&gt;Printed or preferably electronic copies of web pages&lt;/li&gt;
&lt;li&gt;Wire receipts&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Additional Tips for Specific Types of CybercrimeOnce you discover that you have become a victim of cybercrime, your response will depend, to some degree, on the type and particular circumstances of the crime.  Here are useful tips to follow for some specific types of cybercrimes:&lt;br /&gt;
&lt;br /&gt;
In cases of identity theft:&lt;br /&gt;
Make sure you change your passwords for all online accounts. When changing your password, make it long, strong and unique, with a mix of upper and lowercase letters, numbers and symbols. You also may need to contact your bank and other financial institutions to freeze your accounts so that the offender is not able to access your financial resources.&lt;br /&gt;
Close any unauthorized or compromised credit or charge accounts. Cancel each credit and charge card. Get new cards with new account numbers. Inform the companies that someone may be using your identity, and find out if there have been any unauthorized transactions. Close accounts so that future charges are denied. You may also want to write a letter to the company so there is a record of the problem.&lt;br /&gt;
Think about what other personal information may be at risk. You may need to contact other agencies depending on the type of theft. For example, if a thief has access to your Social Security number, you should contact the Social Security Administration.  You should also contact your state Department of Motor Vehicles if your driver's license or car registration are stolen.&lt;br /&gt;
File a report with your local law enforcement agency.  Even if your local police department or sheriff’s office doesn’t have jurisdiction over the crime (a common occurrence for online crime which may originate in another jurisdiction or even another country), you will need to provide a copy of the law enforcement report to your banks, creditors, other businesses, credit bureaus, and debt collectors.&lt;br /&gt;
If your personal information has been stolen through a corporate data breach (when a cyberthief hacks into a large database of accounts to steal information, such as Social Security numbers, home addresses, and personal email addresses), you will likely be contacted by the business or agency whose data was compromised with additional instructions, as appropriate. You may also contact the organization’s IT security officer for more information.&lt;br /&gt;
If stolen money or identity is involved, contact one of the three credit bureaus to report the crime (Equifax at 1-800-525-6285, Experian at 1-888-397-3742, or TransUnion at 1-800-680-7289).  Request that the credit bureau place a fraud alert on your credit report to prevent any further fraudulent activity (such as opening an account with your identification) from occurring. As soon as one of the bureaus issues a fraud alert, the other two bureaus are automatically notified.&lt;br /&gt;
&lt;br /&gt;
For additional resources, visit the Identity Theft Resource Center at &lt;a href="http://www.idtheftcenter.org/"&gt;www.idtheftcenter.org&lt;/a&gt;or the Federal Trade Commission at&lt;a href="http://www.ftc.gov/bcp/edu/microsites/idtheft/tools.html"&gt;http://www.ftc.gov/bcp/edu/microsites/idtheft/tools.html&lt;/a&gt;. &lt;br /&gt;
&lt;br /&gt;
In cases of Social Security fraud:&lt;br /&gt;
If you believe someone is using your social security number for employment purposes or to fraudulently receive Social Security benefits, contact the Social Security Administration’s fraud hotline at 1-800-269-0271. Request a copy of your social security statement to verify its accuracy.&lt;br /&gt;
&lt;br /&gt;
For additional resources, visit the Social Security Administration at&lt;a href="http://oig.ssa.gov/report-fraud-waste-or-abuse"&gt;http://oig.ssa.gov/report-fraud-waste-or-abuse&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
In cases of online stalking:&lt;br /&gt;
In cases where the offender is known, send the stalker a clear written warning saying the contact is unwanted and asking that the perpetrator cease sending communications of any kind. Do this only once and do not communicate with the stalker again (Ongoing contact usually only encourages the stalker to continue the behavior).&lt;br /&gt;
Save copies of all communication from the stalker (e.g., emails, threatening messages, messages via social media) and document each contact, including dates, times and additional circumstances, when appropriate.&lt;br /&gt;
File a complaint with the stalker’s Internet Service Provider (ISP) and yours. Many ISPs offer tools that filter or block communications from specific individuals.&lt;br /&gt;
Own your online presence. Set security and privacy settings on social networks and other services to your comfort level of sharing.&lt;br /&gt;
Consider changing your email address and ISP; use encryption software or privacy protection programs on your computer and mobile devices. (You should consult with law enforcement before changing your email account. It can be beneficial to the investigation to continue using the email account so law enforcement can also monitor communication.)&lt;br /&gt;
File a report with local law enforcement or contact your local prosecutor’s office to see what charges, if any, can be pursued. Stalking is illegal in all 50 states and the District of Columbia.&lt;br /&gt;
&lt;br /&gt;
For additional resources, visit the Stalking Resource Center at &lt;a href="http://www.ncvc.org/src"&gt;www.ncvc.org/src&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
In cases of cyberbullying:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Tell a trusted adult about what’s going on.&lt;/li&gt;
&lt;li&gt;Save any of the related emails, texts, or messages as evidence.&lt;/li&gt;
&lt;li&gt;Keep a record of incidents.&lt;/li&gt;
&lt;li&gt;Report the incident to the website’s administrator; many websites including Facebook and YouTube encourage users to report incidents of cyberbullying.&lt;/li&gt;
&lt;li&gt;Block the person on social networks and in email.&lt;/li&gt;
&lt;li&gt;Avoid escalating the situation: Responding with hostility is likely to provoke a bully.  Depending on the circumstances, consider ignoring the issue. Often, bullies thrive on the reaction of their victims. If you or your child receives unwanted email messages, consider changing your email address. The problem may stop. If you continue to get messages at the new account, you may have a strong case for legal action.&lt;/li&gt;
&lt;li&gt;If the communications become more frequent, the threats more severe, the methods more dangerous and if third-parties (such as hate groups and sexually deviant groups) become involved—the more likely law enforcement needs to be contacted and a legal process initiated.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
For more information, visit &lt;a href="http://www.stopcyberbullying.org/"&gt;www.stopcyberbullying.org&lt;/a&gt; and &lt;a href="http://www.ncpc.org/cyberbullying"&gt;www.ncpc.org/cyberbullying&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
How Did This Happen To Me? A Word about Malware.Many cybercrimes start with malware—short for “malicious software.” Malware includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent—you may have downloaded the malware without even realizing it! These programs can cause your device to crash and can be used to monitor and control your online activity. Criminals use malware to steal personal information and commit fraud. If you think your computer has malware, you can file a complaint with the Federal Trade Commission at &lt;a href="http://www.ftc.gov/complaint"&gt;www.ftc.gov/complaint&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Avoid malware with the following tips from the STOP. THINK. CONNECT. campaign:&lt;br /&gt;
Keep a clean machine by making sure your security software, operating system and web browser are up to date.&lt;br /&gt;
When in doubt throw it out. Don’t click on any links or open attachments unless you trust the source.&lt;br /&gt;
Make your passwords long and strong and unique. Combine capital and lowercase letters with numbers and symbols to create a more secure password. Use a different password for each account.&lt;br /&gt;
Set your browser security high enough to detect unauthorized downloads.&lt;br /&gt;
Use a pop-up blocker (the links in pop-up ads are notorious sources of malware).&lt;br /&gt;
Back up your data regularly (just in case your computer crashes).&lt;br /&gt;
Protect all devices that connect to the Internet. Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from malware.&lt;br /&gt;
Make sure all members of your family follow these safety tips (one infected computer on a home network can infect other computers).&lt;br /&gt;
&lt;br /&gt;
Other Places to Find Resources or File a Complaint:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Anti-Phishing Working Group (&lt;a href="https://mail.google.com/mail/?view=cm&amp;amp;fs=1&amp;amp;tf=1&amp;amp;to=reportphishing@antiphishing.org"&gt;reportphishing@antiphishing.org&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Better Business Bureau (investigates disagreements between businesses and customers; &lt;a href="https://www.bbb.org/consumer-complaints/file-a-complaint/get-started"&gt;https://www.bbb.org/consumer-complaints/file-a-complaint/get-started&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;CyberTipLine, operated by the National Center for Missing &amp;amp; Exploited Children (investigates cases of online sexual exploitation of children; 1-800-843-5678 or &lt;a href="http://www.cybertipline.com/"&gt;www.cybertipline.com&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Electronic Crimes Task Forces and Working Groups (&lt;a href="http://www.secretservice.gov/ectf.shtml"&gt;http://www.secretservice.gov/ectf.shtml&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;The Secret Service (investigates fraudulent use of currency;&lt;a href="http://www.secretservice.gov/field_offices.shtml"&gt;http://www.secretservice.gov/field_offices.shtml&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;StopFraud.Gov Victims of Fraud Resources (&lt;a href="http://www.stopfraud.gov/victims.html"&gt;http://www.stopfraud.gov/victims.html&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;U.S. Computer Emergency Readiness Team (&lt;a href="http://www.us-cert.gov/"&gt;www.us-cert.gov&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;U.S. Department of Justice (&lt;a href="http://www.justice.gov/criminal/cybercrime"&gt;www.justice.gov/criminal/cybercrime&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;U.S. Postal Inspection Service (investigates fraudulent on-line auctions and other cases involving the mail;&lt;a href="https://postalinspectors.uspis.gov/contactus/filecomplaint.aspx"&gt;https://postalinspectors.uspis.gov/contactus/filecomplaint.aspx&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Your State Attorney General (the National Association of Attorneys General keeps a current contact list at  &lt;a href="http://www.naag.org/current-attorneys-general.php"&gt;http://www.naag.org/current-attorneys-general.php&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Ways to Prevent CybercrimeMany cybercrimes start with malware. Criminals use malware to steal personal information and commit fraud.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
Avoid malware with these STOP. THINK. CONNECT. Tips:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.&lt;/li&gt;
&lt;li&gt;Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option.&lt;/li&gt;
&lt;li&gt;Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware.&lt;/li&gt;
&lt;li&gt;Plug &amp;amp; scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them.&lt;/li&gt;
&lt;li&gt;Protect your $: When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “Http://” is not secure.&lt;/li&gt;
&lt;li&gt;Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely.&lt;/li&gt;
&lt;/ul&gt;
Additional Resources:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.ftc.gov/bcp/edu/microsites/idtheft/tools.html."&gt;Federal Trade Commission: Identity Theft Tools&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.identitytheftassistance.org/"&gt;Identity Theft Assistance Center&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.idtheftcenter.org%20/"&gt;Identity Theft Resource Center&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.ic3.gov/default.aspx"&gt;Internet Crime Complaint Center&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.naag.org/current-attorneys-general.php"&gt;National Association of Attorneys General&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://oig.ssa.gov/report-fraud-waste-or-abuse"&gt;Social Security Administration: Report Fraud, Waste or Abuse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.stopfraud.gov/victims.html"&gt;StopFraud.Gov Financial Fraud Enforcement Task Force&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;i&gt;*&lt;a href="http://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/id-theft-and-fraud" target="_blank"&gt;The National Cyber Security Alliance &lt;/a&gt;would like to thank the National Sheriffs’ Association and International Association of Chiefs of Police for their assistance in creating this resource. &lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8735775430739613855" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8735775430739613855" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/id-theft-and-fraud-if-you-become-victim.html" rel="alternate" title="ID Theft and Fraud: If you become a victim of cybercrime" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-1509982361444744978</id><published>2013-07-25T00:00:00.000+12:00</published><updated>2013-07-25T00:00:05.051+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="passwords"/><category scheme="http://www.blogger.com/atom/ns#" term="Securing Your Accounts"/><title type="text">Passwords and Securing Your Accounts</title><content type="html">&lt;a href="http://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/passwords-and-securing-your-accounts"&gt;Passwords &amp;amp; Securing Your Accounts | StaySafeOnline.org&lt;/a&gt;: " PASSWORDS &amp;amp; SECURING YOUR ACCOUNTS - Passwords are like keys to your personal home online. You should do everything you can prevent people from gaining access to your password. You can also further secure your accounts by using additional authentication methods."&lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
&lt;div&gt;
When creating a password, make sure it is long and strong, with a minimum of eight characters and a mix of upper and lowercase letters, numbers and symbols. &lt;br /&gt;
&lt;br /&gt;
You should also remember to:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Not share your password with others.&lt;/li&gt;
&lt;li&gt;Make your password unique to your life and not something that is easily guessed.&lt;/li&gt;
&lt;li&gt;Have a different password for each online account.&lt;/li&gt;
&lt;li&gt;Write down your password and store it in a safe place away from your computer.&lt;/li&gt;
&lt;li&gt;Change your password several times a year.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
Other Ways to Secure an Account -Typing a username and password into a website isn't the only way to identify yourself on the web services you use.&lt;br /&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Multi-factor authentication uses more than one form of authentication to verify an identity. Some examples are voice ID, facial recognition, iris recognition and fingerscanning.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Two-factor authentication uses a username and passowrd and another form of identifcation, often times a security code.  Over time, more websites will be adopting multi-factor authentication. In some cases, the services may be available, but are not required.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
Many email services offer two-step verification on an opt-in basis. Ask your financial institution and other online services if they offer multi-factor authentication or additional ways to verify your identity. &lt;br /&gt;
&lt;br /&gt;
Additional Resources:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://support.google.com/accounts/bin/answer.py?hl=en&amp;amp;topic=1056283&amp;amp;answer=180744&amp;amp;rd=1"&gt;Google: Two-step verification for Google accounts&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.rsa.com/go/authtree/auth-index.htm"&gt;RSA: The Authentication Decision Tree&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.us-cert.gov/cas/tips/ST04-002.html"&gt;US-CERT: Choosing and Protecting Passwords&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.ymailblog.com/blog/2011/12/yahoo-introduces-stronger-user-authentication-%E2%80%93-second-sign-in-verification/"&gt;Yahoo!: Second Sign-In Verification for Yahoo! accounts&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
STOP. THINK. CONNECT. Tips:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site.&lt;/li&gt;
&lt;li&gt;Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.&lt;/li&gt;
&lt;li&gt;Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals.&lt;/li&gt;
&lt;li&gt;Write it down and keep it safe: Everyone can forget a password. Keep a list that’s stored in a safe, secure place away from your computer.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/1509982361444744978" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/1509982361444744978" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/passwords-and-securing-your-accounts.html" rel="alternate" title="Passwords and Securing Your Accounts" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-9171443044528960403</id><published>2013-07-23T05:10:00.002+12:00</published><updated>2013-07-23T05:10:36.410+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyberwar"/><category scheme="http://www.blogger.com/atom/ns#" term="US Spy Chief"/><title type="text">US Spy Chief Leading US Into Cyberwar</title><content type="html">&lt;a href="http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/all/" rel="nofollow" target="_blank"&gt;NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar | Threat Level | Wired.com&lt;/a&gt;:&lt;i&gt; "And he and his cyberwarriors have already launched their first attack. The cyberweapon that came to be known as Stuxnet was created and built by the NSA in partnership with the CIA and Israeli intelligence in the mid-2000s. The first known piece of malware designed to destroy physical equipment, Stuxnet was aimed at Iran’s nuclear facility in Natanz. By surreptitiously taking control of an industrial control link known as a Scada (Supervisory Control and Data Acquisition) system, the sophisticated worm was able to damage about a thousand centrifuges used to enrich nuclear material." (read more at link above)&lt;/i&gt;

&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;a href="http://www.pcmag.com/article2/0,2817,2421971,00.asp" rel="nofollow" target="_blank"&gt;U.K. to Probe Huawei Cyber-Security Center | News &amp;amp; Opinion | PCMag.com&lt;/a&gt;: "The U.K. government will conduct a review of a cyber-security center run by Huawei to ensure that it is actually effective. The country's National Security Adviser will "carry out a review" of the center, which is known as the Cell, according to a new report from the U.K.'s Intelligence and Security Committee. The committee issued its report after Prime Minister David Cameron last month raised concerns in his own report to Parliament about Huawei's operations in the U.K."&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/9171443044528960403" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/9171443044528960403" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/us-spy-chief-leading-us-into-cyberwar.html" rel="alternate" title="US Spy Chief Leading US Into Cyberwar" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-7706240444951752245</id><published>2013-07-20T00:00:00.000+12:00</published><updated>2013-07-20T00:00:03.578+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Attackers"/><category scheme="http://www.blogger.com/atom/ns#" term="code"/><category scheme="http://www.blogger.com/atom/ns#" term="cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="defenders"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><title type="text">Attackers hide code to thwart defenders</title><content type="html">&lt;a href="http://www.darkreading.com/threat-intelligence/attackers-focus-on-increasing-defenders/240158154" rel="nofollow" target="_blank"&gt;How Attackers Thwart Malware Investigation -- Dark Reading&lt;/a&gt;: &lt;i&gt;" . . . Yet if the attackers find better ways of hiding their code and making analysis more difficult for defenders, it could result is less intelligence on attackers tools and techniques, ThreatGRID's De Beer says. "Ultimately, all of these things can be decoded and decrypted and figured out over time, whether it be through dynamic or static means, but the goal on the attackers' side is to increase the workload to the extent where it becomes a very difficult thing to scale," De Beer says. "If you can't scale your analysis and you can't scale your ability to produce actionable content and threat intelligence, then they have an advantage over you at any point in time."" (read more at link above)&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;
&lt;script src="http://platform.twitter.com/widgets.js" type="text/javascript"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/7706240444951752245" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/7706240444951752245" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/attackers-hide-code-to-thwart-defenders.html" rel="alternate" title="Attackers hide code to thwart defenders" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-3254511344877126786</id><published>2013-07-18T10:23:00.001+12:00</published><updated>2013-07-18T10:23:07.137+12:00</updated><title type="text">DDoS Attack Takes Down DNS Provider Network Solutions and Clients</title><content type="html">&lt;a href="http://threatpost.com/ddos-attack-knocks-network-solutions-website-clients-offline/101374"&gt;DDoS Attack Takes Down DNS Provider Network Solutions | Threatpost&lt;/a&gt;: "A distributed denial of service attack knocked the website of the domain name registrar Network Solutions LLC offline this morning and affected an unknown number of its clients’ sites as well.

Network Solutions announced on its Facebook page that it was experiencing a DDoS attack just before 11 a.m. EST, and then at 1:30 p.m. said the attack had been mitigated. Beyond that, the company has been relatively mum on the issue, angering its customers by failing to keep them adequately updated on its website and various social media channels."&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/3254511344877126786" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/3254511344877126786" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/ddos-attack-takes-down-dns-provider.html" rel="alternate" title="DDoS Attack Takes Down DNS Provider Network Solutions and Clients" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-9144247832493747770</id><published>2013-07-18T00:00:00.000+12:00</published><updated>2013-07-18T00:00:09.901+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Emergency Alert System"/><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><title type="text">Emergency Alert System Vulnerable to Hackers</title><content type="html">&lt;a href="http://www.pcmag.com/article2/0,2817,2421503,00.asp" rel="nofollow" target="_blank"&gt;Emergency Alert System Vulnerable to Hackers, Report Finds | News &amp;amp; Opinion | PCMag.com&lt;/a&gt;: "Hackers could have a field day with the Emergency Alert System (EAS), thanks to vulnerabilities with equipment used to transmit the alerts, according to a new report.&amp;nbsp;According to Seattle-based IOActive, the systems that intercept emergency messages from federal officials and then interrupt regular broadcasts to transmit the message - known as DASDEC - are susceptible to cyber attacks."&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;
&lt;script src="http://platform.twitter.com/widgets.js" type="text/javascript"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/9144247832493747770" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/9144247832493747770" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/emergency-alert-system-vulnerable-to.html" rel="alternate" title="Emergency Alert System Vulnerable to Hackers" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-8943638365561271507</id><published>2013-07-16T00:00:00.000+12:00</published><updated>2013-07-16T00:00:05.493+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="NSA"/><category scheme="http://www.blogger.com/atom/ns#" term="Recruiting Session"/><category scheme="http://www.blogger.com/atom/ns#" term="Students"/><title type="text">Students Question the NSA at Recruiting Session</title><content type="html">&lt;iframe frameborder="no" height="166" scrolling="no" src="https://w.soundcloud.com/player/?url=http%3A%2F%2Fapi.soundcloud.com%2Ftracks%2F99464422" width="100%"&gt;&lt;/iframe&gt;



&lt;a href="https://soundcloud.com/madiha-1/students-question-the-nsa-at?utm_source=soundcloud&amp;amp;utm_campaign=wtshare&amp;amp;utm_medium=Facebook&amp;amp;utm_content=https%3A%2F%2Fsoundcloud.com%2Fmadiha-1%2Fstudents-question-the-nsa-at" rel="nofollow" target="_blank"&gt;▶ Students Question the NSA at Recruiting Session by Madiha&lt;/a&gt;: &lt;br /&gt;
&lt;br /&gt;&lt;a href="http://www.google.com/url?sa=X&amp;amp;q=http://www.bloomberg.com/video/u-s-expands-role-in-cyber-defense-ZGg8E~TiTgaqvldmMB6l_g.html&amp;amp;ct=ga&amp;amp;cad=CAcQAhgAIAAoATACOAJAwZKHjwVIAVAAWABiBWVuLVVT&amp;amp;cd=zU_vnJJ-wek&amp;amp;usg=AFQjCNGk_iAfY_n9mrlxibmIh_rCl544Gw" rel="nofollow" target="_blank"&gt;US Expands Role in Cyber Defense&lt;/a&gt;&lt;br /&gt;Bloomberg&lt;br /&gt;Reports on chinese hacking activity -- let's bring in a chief security officer at a cyber security firm who has published several reports on chinese hacking activity. This is a fairly new program. It's important to realize that the information ...&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.google.com/url?sa=X&amp;amp;q=http://www.muscatdaily.com/Archive/Oman/Dramatic-increase-in-phishing-scams-as-criminals-target-Apple-IDs-2ep8&amp;amp;ct=ga&amp;amp;cad=CAcQAhgAIAAoATAHOAdAjuKLjwVIAVAAWABiBWVuLVVT&amp;amp;cd=yd2UoTD4RXY&amp;amp;usg=AFQjCNFuwMSbqFaqHg7d50QJUz-peOCe0Q"&gt;Dramatic increase in phishing scams as criminals target Apple IDs&lt;/a&gt;&lt;br /&gt;Muscat Daily&lt;br /&gt;Kaspersky Lab recently published a report that analysed increase in cyber criminal campaigns to steal users' Apple IDs and account information by creating fraudulent phishing sites that imitate the official Apple site (&lt;a href="http://www.apple.com/" rel="nofollow" target="_blank"&gt;www.apple.com&lt;/a&gt;). Cyber criminals ...&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;script src="http://platform.twitter.com/widgets.js" type="text/javascript"&gt;&lt;/script&gt;&lt;/div&gt;
</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8943638365561271507" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8943638365561271507" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/students-question-nsa-at-recruiting.html" rel="alternate" title="Students Question the NSA at Recruiting Session" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-1255217345231267699</id><published>2013-07-13T00:00:00.000+12:00</published><updated>2013-07-13T00:00:11.051+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Port of Baltimore"/><title type="text">Port of Baltimore vulnerable to cyber attack</title><content type="html">&lt;a href="http://www.google.com/url?sa=X&amp;amp;q=http://www.baltimoresun.com/business/bs-bz-port-security-20130703,0,5616600.story&amp;amp;ct=ga&amp;amp;cad=CAcQAhgAIAAoATAGOAZAgMPhjgVIAVAAWABiBWVuLVVT&amp;amp;cd=GwfCZJuSQ0c&amp;amp;usg=AFQjCNGbHReb8Qv6HOaq3o5L9EY2ttTmSQ" rel="nofollow" target="_blank"&gt;Port of Baltimore is vulnerable to cyber attack, Brookings study says&lt;/a&gt;&lt;br /&gt;Baltimore Sun&lt;br /&gt;&lt;i&gt;The port and the MDOT work with the FBI Baltimore Cyber Crime Unit and a liaison with the NationalSecurity Agency at Fort Meade to ensure the integrity of the computer network, he said. "We have the highest level of security available and a thorough ...read more at link above&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;
&lt;script src="http://platform.twitter.com/widgets.js" type="text/javascript"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/1255217345231267699" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/1255217345231267699" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/port-of-baltimore-vulnerable-to-cyber.html" rel="alternate" title="Port of Baltimore vulnerable to cyber attack" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-8470376434505900667</id><published>2013-07-11T12:50:00.000+12:00</published><updated>2013-07-11T12:50:00.116+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="China"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="US"/><title type="text">China and US to discuss cyber security at forum</title><content type="html">&lt;a href="http://www.google.com/url?sa=X&amp;amp;q=http://www.lasvegassun.com/news/2013/jul/06/as-china-us/&amp;amp;ct=ga&amp;amp;cad=CAcQAhgAIAAoATAHOAdAgMPhjgVIAVAAWABiBWVuLVVT&amp;amp;cd=GwfCZJuSQ0c&amp;amp;usg=AFQjCNE6PK-vMWqY5-J8h4hDL-awnk2BTA" rel="nofollow" target="_blank"&gt;China, US to discuss cyber security at forum&lt;/a&gt;&lt;br /&gt;
Las Vegas Sun&lt;br /&gt;&lt;i&gt;It will include the inaugural gathering of a U.S.-Chinese cyber security group. Beijing is under U.S. pressure to crack down on cyberspying after security consultants tracked a wave of hacking attacks to China. An assistant foreign minister, Zheng ...read more at link above&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;
&lt;script src="http://platform.twitter.com/widgets.js" type="text/javascript"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8470376434505900667" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8470376434505900667" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/china-and-us-to-discuss-cyber-security.html" rel="alternate" title="China and US to discuss cyber security at forum" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-7073736288775800774</id><published>2013-07-09T00:00:00.000+12:00</published><updated>2013-07-09T00:00:00.425+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber attacks growing more advanced"/><title type="text">Cyber attacks growing more advanced</title><content type="html">&lt;a href="http://www.google.com/url?sa=X&amp;amp;q=http://www.upstreamonline.com/live/article1331185.ece&amp;amp;ct=ga&amp;amp;cad=CAcQAhgAIAAoATAGOAZAx529jgVIAVAAWABiBWVuLVVT&amp;amp;cd=oLzThzoixMM&amp;amp;usg=AFQjCNFj2vAKi9nPKCRb1tQlGKfKQc5P7Q" rel="nofollow" target="_blank"&gt;Cyber attacks growing more advanced - report&lt;/a&gt;&lt;br /&gt;Upstream Online&lt;br /&gt;The threats posed by state-backed intelligence outfits, industry insiders and freelance hackers is evolving and could deal a blow to US national security and economic competitiveness, the non-partisan think tank said in a report this week. "Once in the ...&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.google.com/url?sa=X&amp;amp;q=http://news.xinhuanet.com/english/indepth/2013-06/29/c_132496730.htm&amp;amp;ct=ga&amp;amp;cad=CAcQAhgAIAAoATAHOAdAx529jgVIAVAAWABiBWVuLVVT&amp;amp;cd=oLzThzoixMM&amp;amp;usg=AFQjCNEk3ZIv2mj0P_64KMlYVvi-UKj9Aw" rel="nofollow" target="_blank"&gt;West must work with the rest to secure Internet&lt;/a&gt;&lt;br /&gt;Xinhua&lt;br /&gt;At a time when China and the US are striving to build a new type of relationship, it is imperative that both should be guided by good faith, one of the basic requirements of international relations of whichcyber security affairs is a part. They should ...&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.google.com/url?sa=X&amp;amp;q=http://english.vietnamnet.vn/fms/science-it/77926/nation-at-high-risk-of-cyber-attacks.html&amp;amp;ct=ga&amp;amp;cad=CAcQAhgAIAAoATAFOAVAx529jgVIAVAAWABiBWVuLVVT&amp;amp;cd=oLzThzoixMM&amp;amp;usg=AFQjCNEbH5Ooc-QUecp4VQwDwyL6Ncjg3w" rel="nofollow" target="_blank"&gt;Nation at high risk of cyber attacks&lt;/a&gt;&lt;br /&gt;VietNamNet Bridge&lt;br /&gt;The study, which was based on data from the Kaspersky Security Network cloud service, found that what was once a subset of spam has evolved into a rapidly growing cyber threat in its own right.Phishing is a form of internet fraud in which criminals ...&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;
&lt;script src="http://platform.twitter.com/widgets.js" type="text/javascript"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/7073736288775800774" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/7073736288775800774" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/cyber-attacks-growing-more-advanced.html" rel="alternate" title="Cyber attacks growing more advanced" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-5540936159279993243</id><published>2013-07-06T00:00:00.000+12:00</published><updated>2013-07-06T00:00:08.004+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="General in leak probe quit Pentagon post suddenly"/><title type="text">General in leak probe quit Pentagon post suddenly</title><content type="html">&lt;a href="http://www.google.com/url?sa=X&amp;amp;q=http://investigations.nbcnews.com/_news/2013/06/28/19191717-general-in-leak-probe-quit-pentagon-post-suddenly-citing-health-reasons&amp;amp;ct=ga&amp;amp;cad=CAcQAhgAIAAoATAIOAhAx529jgVIAVAAWABiBWVuLVVT&amp;amp;cd=oLzThzoixMM&amp;amp;usg=AFQjCNHJFcuFLRqGb6W9C4mZEVphYfX45w" rel="nofollow" target="_blank"&gt;General in leak probe quit Pentagon post suddenly, citing health reasons&lt;/a&gt;&lt;br /&gt;NBCNews.com (blog)&lt;br /&gt;“He was a crucial voice in communicating both the opportunities and dangers of cyber warfare,” said Peter Singer, a national security expert at the Brookings Institution think tank. More from NBC News Investigations: Report: Millions wasted on ...&lt;br /&gt;&lt;br /&gt;&lt;table border="0" cellpadding="0" cellspacing="0" style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: 13px; width: 600pxpx;"&gt;&lt;tbody&gt;&lt;/tbody&gt;&lt;/table&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;
&lt;script src="http://platform.twitter.com/widgets.js" type="text/javascript"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/5540936159279993243" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/5540936159279993243" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/general-in-leak-probe-quit-pentagon.html" rel="alternate" title="General in leak probe quit Pentagon post suddenly" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-933967782298149172</id><published>2013-07-04T00:00:00.000+12:00</published><updated>2013-07-04T00:00:10.856+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber threats"/><title type="text">Cyber threats are here to stay</title><content type="html">&lt;a href="http://www.google.com/url?sa=X&amp;amp;q=http://www.aspentimes.com/news/7115114-113/pawlenty-cyberwarfare-delaney-mcconnell&amp;amp;ct=ga&amp;amp;cad=CAcQAhgAIAAoATAJOAlAx529jgVIAVAAWABiBWVuLVVT&amp;amp;cd=oLzThzoixMM&amp;amp;usg=AFQjCNEf6JGVaRtH3ujxC03atViIF4XvPg" rel="nofollow" target="_blank"&gt;Panelists : Cyber threats are here to stay&lt;/a&gt;&lt;br /&gt;Aspen Times&lt;br /&gt;The two participated in a discussion called “The Cyber Threat to America's Economy, Infrastructure, and Security,” as a part of the Aspen Ideas Festival. ... So what's the motivation for this kind ofwarfare? ... “If there's a missile attack you have ...&lt;div&gt;
&lt;br /&gt;&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;
&lt;script src="http://platform.twitter.com/widgets.js" type="text/javascript"&gt;&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/933967782298149172" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/933967782298149172" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/cyber-threats-are-here-to-stay.html" rel="alternate" title="Cyber threats are here to stay" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-8318643579329464641</id><published>2013-07-02T00:00:00.000+12:00</published><updated>2013-07-02T00:00:12.337+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Gmail"/><category scheme="http://www.blogger.com/atom/ns#" term="NSA"/><category scheme="http://www.blogger.com/atom/ns#" term="skype"/><category scheme="http://www.blogger.com/atom/ns#" term="terrorists"/><category scheme="http://www.blogger.com/atom/ns#" term="verizon"/><title type="text">NSA wasting money and resources - Terrorists Don't Use Verizon. Skype or Gmail</title><content type="html">&lt;a href="http://motherboard.vice.com/blog/hey-nsa-terrorists-dont-use-verizon-or-skype-or-gmail" rel="nofollow" target="_blank"&gt;Sorry, NSA, Terrorists Don't Use Verizon. Or Skype. Or Gmail. | Motherboard&lt;/a&gt;: . . .&amp;nbsp;Or, as Bloomberg more bluntly puts it, the "infrastructure set up by the National Security Agency ... may only be good for gathering information on the stupidest, lowest-ranking of terrorists. The Prism surveillance program focuses on access to the servers of America’s largest Internet companies, which support such popular services as Skype, Gmail and iCloud. These are not the services that truly dangerous elements typically use."



Read more: &lt;a href="http://motherboard.vice.com/blog/hey-nsa-terrorists-dont-use-verizon-or-skype-or-gmail#ixzz2XLaWIu4z" rel="nofollow" target="_blank"&gt;http://motherboard.vice.com/blog/hey-nsa-terrorists-dont-use-verizon-or-skype-or-gmail#ixzz2XLaWIu4z&lt;/a&gt; 
Follow us: &lt;a href="http://ec.tynt.com/b/rw?id=djHJe-zZSr4PaFacwqm_6r&amp;amp;u=motherboard"&gt;@motherboard on Twitter&lt;/a&gt; | &lt;a href="http://ec.tynt.com/b/rf?id=djHJe-zZSr4PaFacwqm_6r&amp;amp;u=motherboardtv"&gt;motherboardtv on Facebook&lt;/a&gt;&lt;script&gt;!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="//platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs");&lt;/script&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8318643579329464641" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/8318643579329464641" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/07/nsa-wasting-money-and-resources.html" rel="alternate" title="NSA wasting money and resources - Terrorists Don't Use Verizon. Skype or Gmail" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-232214876135762458</id><published>2013-06-29T00:00:00.000+12:00</published><updated>2013-06-29T00:00:00.981+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="safety"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Networks"/><title type="text">Social Networks safety and security</title><content type="html">&lt;a href="http://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/social-networks"&gt;Social Networks | StaySafeOnline.org&lt;/a&gt;: "
SOCIAL NETWORKS

Facebook, Twitter, Google+, YouTube, Pinterest, LinkedIn and other social networks have become an integral part of online lives. Social networks are a great way to stay connected with others, but you should be wary about how much personal information you post."&lt;br /&gt;
&lt;br /&gt;
Have your family follow these tips to safely enjoy social networking:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Privacy and security settings exist for a reason: Learn about and use the privacy and security settings on social networks. They are there to help you control who sees what you post and manage your online experience in a positive way.&lt;/li&gt;
&lt;li&gt;Once posted, always posted: Protect your reputation on social networks. What you post online stays online. Think twice before posting pictures you wouldn’t want your parents or future employers to see. Recent research (&lt;a href="http://www.microsoft.com/privacy/dpd/research.aspx"&gt;http://www.microsoft.com/privacy/dpd/research.aspx&lt;/a&gt;) found that 70% of job recruiters rejected candidates based on information they found online.&lt;/li&gt;
&lt;li&gt;Your online reputation can be a good thing:  Recent research (&lt;a href="http://www.microsoft.com/privacy/dpd/research.aspx"&gt;http://www.microsoft.com/privacy/dpd/research.aspx&lt;/a&gt;) also found that recruiters respond to a strong, positive personal brand online. So show your smarts, thoughtfulness, and mastery of the environment.&lt;/li&gt;
&lt;li&gt;Keep personal info personal: Be cautious about how much personal information you provide on social networking sites. The more information you post, the easier it may be for a hacker or someone else to use that information to steal your identity, access your data, or commit other crimes such as stalking.&lt;/li&gt;
&lt;li&gt;Know and manage your friends: Social networks can be used for a variety of purposes. Some of the fun is creating a large pool of friends from many aspects of your life. That doesn’t mean all friends are created equal. Use tools to manage the information you share with friends in different groups or even have multiple online pages. If you’re trying to create a public persona as a blogger or expert, create an open profile or a “fan” page that encourages broad participation and limits personal information. Use your personal profile to keep your real friends (the ones you know trust) more synched up with your daily life.&lt;/li&gt;
&lt;li&gt;Be honest if you’re uncomfortable: If a friend posts something about you that makes you uncomfortable or you think is inappropriate, let them know. Likewise, stay open-minded if a friend approaches you because something you’ve posted makes him or her uncomfortable. People have different tolerances for how much the world knows about them respect those differences.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
Know what action to take: If someone is harassing or threatening you, remove them from your friends list, block them, and report them to the site administrator.&lt;br /&gt;
&lt;br /&gt;
Protect Yourself with these STOP. THINK. CONNECT. Tips:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.&lt;/li&gt;
&lt;li&gt;Own your online presence: When applicable, set the privacy and security settings on websites to your comfort level for information sharing. It’s ok to limit how you share information.&lt;/li&gt;
&lt;li&gt;Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.&lt;/li&gt;
&lt;li&gt;Unique account, unique password: Separate passwords for every account helps to thwart cybercriminals.&lt;/li&gt;
&lt;li&gt;When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cybercriminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.&lt;/li&gt;
&lt;li&gt;Post only about others as you have them post about you.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/232214876135762458" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/232214876135762458" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/06/social-networks-safety-and-security.html" rel="alternate" title="Social Networks safety and security" type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry><entry><id>tag:blogger.com,1999:blog-1591641974933932474.post-4400704243245889739</id><published>2013-06-27T00:00:00.000+12:00</published><updated>2013-06-27T00:00:01.137+12:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Backdoor.AndroidOS.Obad.a"/><category scheme="http://www.blogger.com/atom/ns#" term="malware"/><title type="text">Backdoor.AndroidOS.Obad.a, malware </title><content type="html">&lt;a href="http://www.techrepublic.com/blog/security/new-android-malware-should-be-wake-up-call-for-security-admins/9641?tag=nl.e019&amp;amp;s_cid=e019&amp;amp;ttag=e019&amp;amp;ftag=" rel="nofollow" target="_blank"&gt;New Android malware should be wake-up call for security admins | TechRepublic&lt;/a&gt;:&lt;i&gt; "Nicknamed Backdoor.AndroidOS.Obad.a, this malware used a hole in the code packing system to create an executable that should be found invalid, but still gets processed on an Android smartphone, by planting deliberate errors in the AndroidManifest file. Once there, it can get elevated to the Device Administrator status, but using a security hole in Android, it will not get listed in the apps listing, making it impossible to remove. And the complexity doesn’t stop there. The malware uses a lot of encryption to keep all of its variable names secret, and it will go out through a network connection, downloading a part of the Facebook home page, and use that as its encryption key, to ensure it is truly online and able to connect to its control servers. . . ." (read more at link above)&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;more news below&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;a class="twitter-follow-button" data-show-count="false" href="http://twitter.com/sobeqorg"&gt;Follow @sobeqorg&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/4400704243245889739" rel="edit" type="application/atom+xml"/><link href="http://www.blogger.com/feeds/1591641974933932474/posts/default/4400704243245889739" rel="self" type="application/atom+xml"/><link href="http://www.sobeq.org/2013/06/backdoorandroidosobada-malware.html" rel="alternate" title="Backdoor.AndroidOS.Obad.a, malware " type="text/html"/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image height="16" rel="http://schemas.google.com/g/2005#thumbnail" src="https://img1.blogblog.com/img/b16-rounded.gif" width="16"/></author></entry></feed>