CIMIP - Center for Identity Management and Information Protection

February 2010 News Archive

February 26, 2010

Inmate Leaves Prison by Impersonating Cellmate

Authorities in Maryland were searching Friday for an inmate serving three life terms who walked out of a Baltimore prison after impersonating his cell mate. full article

Twitter hits fan as scams smite banks, cabinet ministers

The Twitter phishing attacks from earlier this week stepped up a gear on Friday with huge volumes of spam from compromised accounts, some of which belonged to UK cabinet minsters and even a bank. full article

Latvian hacker tweets hard on banking whistle

A hacker has become a popular hero in the Baltics, and scourge to the authorities, by leaking information on the finances of banks and state-run firms to Latvian TV. full article

Theft-proofing your identity

On Monday, tough new regulations to protect personal information collected from consumers will take effect in Massachusetts, and companies throughout the US are scrambling to get ready. full article

Man charged in identity theft incident

Johnson City police accused a Boston man of using the identity of another person to make unlawful purchases in the village. full article

ID theft rises exponentially in Albuquerque area

A once-obscure crime has jumped nearly 5,000% over the past ten years. ID theft has jumped that much in Bernalillo County, and the district attorney says it's up to all of us to stop it. full article

Identity theft, burglary charges filed in alleged theft of Social Security number

A 20-year-old man was arraigned Thursday on charges of identity theft and burglary after using another man's Social Security number to obtain an auto loan and a department store credit card. full article

Facebook Glitch Sends Email to Wrong Recipients

Facebook Inc. said a glitch with a software update caused some email messages to be sent to the wrong recipients for "a short time" late Wednesday, raising questions about privacy on the site. full article

Britain all atweet over Twitter phishing attack

The latest phishing attack on Twitter users swept the U.K. overnight claiming several prominent users. full article

Students suspended for Facebook pranks

Australia's prime minister said Friday he would consider appointing an online ombudsman to investigate complaints about Internet bullying after a string of incidents on social network sites. full article

Facebook e-mails go to wrong inboxes

Facebook inadvertently routed e-mails to the wrong addresses Wednesday night, a problem the social networking site said was quickly resolved, but not before the messages landed in the inboxes of strangers. full article

FTC Issues Report of 2009 Top Consumer Complaints

The Federal Trade Commission today released a report listing top complaints consumers filed with the agency in 2009. It shows that while identity theft remains the top complaint category, identity theft complaints declined 5 percentage points from 2008. full article

Pwn2Own: Hacker busts IE8 on Windows 7 in 2 minutes

Dutch researcher bypasses DEP, ASLR to bring down Microsoft's browser

Two researchers yesterday won $10,000 each at the Pwn2Own hacking contest by bypassing important security measures of Windows 7. full article

February 25, 2010

Guilty plea for hacker who took Comcast off Web

IDG News Service - A member of a telephone hacking group known as Kryogeniks has pleaded guilty to taking Comcast's Web site offline in May 2008. full article

Twitter hit by another round of phishing attacks

Twitter users are being targeted by another phishing campaign, according to Webroot malware researcher Andrew Brandt. full article

ATM Skimming: How to Recognize Card Fraud

Criminals are increasingly turning to card skimming as a profitable way to steal cash. Would you know what to look for at your local ATM? full article

Court order helps Microsoft tear down Waledac botnet

IDG News Service - With the help of a U.S. federal judge, Microsoft has struck a blow against one of the Internet's worst sources of spam: the notorious Waledac botnet. full article

Intel admits it is under constant attack from hackers

Intel regularly faces cyber attacks by intellectual property thieves and malicious hackers, the chip maker's latest report to the US Securities and Exchange Commission reveals. full article

The Intel Intrusion: When Is a Hack Just a Hack?

Intel has revealed it's been the victim of hacker, though it's making considerably less fuss about it than Google did when its system was compromised several weeks ago. The Intel break-in happened around the same time, but Intel says it sees no evidence that any intellectual property was stolen, and it's not saying for sure whether its hacker problem was in any way related to Google's. full article

Microsoft launches 'phone home' anti-piracy update

Critic says Windows 7 users should block KB971033, now arriving via Windows Update full article

Baidu: Registrar 'incredibly' Changed our E-Mail for Hacker

A hacker who took down top Chinese search engine last month broke into its account with a U.S. domain name registrar by pretending to be from Baidu in an online chat with the registrar's tech help, according to a lawsuit filed by Baidu. full article

Do Companies Need Fed Cybersecurity Intervention?

The former U.S. director of national intelligence was the latest in a long line of intel gurus telling Congress how woefully under-protected America's infrastructure is from cyberattacks. The Senate is currently mulling the U.S. Cybersecurity Amendment Act of 2009 and considering how much new regulation the government may need to introduce in the name of national security. full article

Officials: Mom Sold Dead Son's Identity To Pakistani Man

NEW YORK (WPIX) - A Staten Island mom is accused of selling her dead son's identity to a Pakistani man, officials announced Wednesday. full article

NSW Govt ousts web developer over security breach

The NSW Government has terminated its relationship with the developers of the state's transport blueprint website after they admitted a security lapse - rather than hack - was the cause of a document leak. full article

Large-scale credit card data robbery in Helsinki

The data from as many as 100,000 credit cards were endangered by a security breach, the financial paper Kauppalehti reports. full article

UW medical records compromised

SEATTLE - An alarming letter was sent to Charles Tomaras from the UW Medical Center letting him know that someone had stolen his personal information, including his Social Security number, credit card number, birthdate and address. full article

Cyber-whistleblower stuns Latvia with tax heist

RIGA, Latvia (AP) — Latvian officials struggled Wednesday to come to grips with an enigmatic group that stole millions of classified tax documents from government computers in a purported effort to expose waste and graft in Europe's weakest economy. full article

Dubai murder suspects climb to 26

Police announced 15 new suspects in the January killing of a Hamas leader at a Dubai hotel, bringing to 26 the number of people suspected of involvement in his death. full article

February 24, 2010

Comcast (finally) brings security extensions to DNS

Comcast - one of the largest ISPs in the US - has deployed new technology designed to protect the internet against a well-known form of attack that allows attackers to surreptitiously lure end users to impostor websites. full article

Six more British passports used in Dubai assassination of Mahmoud al-Mabhouh

The alleged Mossad hit squad that killed a Hamas leader in Dubai used a further six British passports in the assassination — bringing the total involved to twelve. full article

FTC Warns Of Widespread Data Breaches

The Federal Trade Commission on Monday said that it had notified almost 100 organizations in both the public and private sector that they need to review their security practices. full article

Former Decker employee faces theft charges

A 38-year-old New Berlin woman charged with embezzling more than $46,000 from her employer over three years is scheduled to make her initial court appearance next month, according to online court records. full article

Experts warn of catastrophe from cyberattacks

Computer-based network attacks are slowly bleeding U.S. businesses of revenue and market advantage, while the government faces the prospect of losing in an all-out cyberwar, experts told Senators in a hearing on Tuesday full article

February 23, 2010

Elvis Presley passport exposes security flaw

London, England (CNN) -- In the name of improved security a hacker showed how a biometric passport issued in the name of long-dead rock 'n' roll king Elvis Presley could be cleared through an automated passport scanning system being tested at an international airport. full article

Attackers going after end-users rather than servers

The Web traffic study also finds issues with botnets, corporate policies, and outdated browsers

Rather than targeting Web and email servers, attackers these days are prone to going after enterprises from the inside out, compromising end-user systems and then using them to access confidential data, according to a Web traffic analysis report by security-as-a-service provider Zscaler. full article

Poor governance at the heart of poor data security, says ICO

Information security, particularly in central government, is undoubtedly improving, but several common problems remain, says the Information Commissioner's Office (ICO). full article

Judge Tells School to Stop Taking Web Shots From Student Laptops

PHILADELPHIA (CN) - A federal judge late Monday ordered a suburban school district not to activate "any and all Web cams embedded in laptop computers issued to students" at Lower Merion School District, nor to take remote screen shots from them; and to preserve evidence; but not to contact any students or parents about the issues raised by a federal class action the families have filed. The class action came after a family claimed that an assistant principal told their son that the school district knew he "was engaged in improper behavior in his home, and cited as evidence a photograph from the Web cam embedded in minor plaintiff's personal laptop issued by the school district," according to the original complaint. full article

Two sentenced on mail theft charges

A Slater man has been sentenced in federal court for his role in a conspiracy to steal mail, bank fraud and identity theft in numerous counties, including Callaway County. full article

Woman charged with identity theft

A 22-year-old Sheboygan woman has been charged with seven counts of identity theft for allegedly stealing credit card information from patrons of the motel where she worked and using it to reserve rooms at other motels, to buy movie tickets and to have food delivered. full article

PIX Exclusive: DMV Identity Theft Ring Busted

NEW YORK (WPIX) - PIX News has learned that federal, state and city authorities have busted a sophisticated identity theft plot to sell drivers licenses for the right price. full article

Physical Security Risk and Countermeasures: Effectiveness Metrics

Is your security program working? Here's how to establish metrics for systematic measurement and improvement of countermeasures. full article

Criminals Hide Payment-Card Skimmers Inside Gas Station Pumps

Wave of recent bank-card skimming incidents demonstrate how sophisticated the scam has become

Criminals hid bank card-skimming devices inside gas pumps -- in at least one case, even completely replacing the front panel of a pump -- in a recent wave of attacks that demonstrate a more sophisticated, insidious method of stealing money from unsuspecting victims filling up their gas tanks. full article

Phishers target Blogger users

Users of Google's Blogger, a free blog publishing tool, are the targets of the latest phishing email campaign. full article

Alarming breach in privacy investigated at London school

PRIVACY: The Medix School is investigating after files containing personal information were discovered near a mall dumpster

An armload of personal documents -- health records and criminal record checks among them -- was found carelessly tossed out by a private vocational school in London, an alarming breach of security, the school's director says. full article

Rise of the Point-and-Click Botnet

In 2005, a Russian hacker group known as UpLevel developed Zeus, a point-and-click program for creating and controlling a network of compromised computer systems, also known as a botnet. Five years of development later, the latest version of this software, which can be downloaded for free and requires very little technical skill to operate, is one of the most popular botnet platforms for spammers, fraudsters, and people who deal in stolen personal information. full article

Credit card skimming attacks on pay-at-the-pump petrol stations

According to US media reports, criminals have launched large-scale attacks on petrol pumps with built-in card payment systems to gain access to card data. Similar attacks that involve the attachment of special skimming devices over the legitimate equipment to copy card data, have previously only targeted cash points. Attackers often obtain the PIN with a hidden camera or a secondary PIN pad placed over the machine's original keyboard. More details on this method of attack can be found in The H Open article "Manipulated ATMs - Attack of the card cloners". full article

IT Firm Loses $100,000 to Online Bank Fraud

A New Hampshire-based IT consultancy lost nearly $100,000 this month after thieves broke into the company’s bank accounts with the help of 10 co-conspirators across the United States. full article

February 22, 2010

Credit card relief is here, but watch out for new traps

NEW YORK ( -- If you haven't heard, big changes are here for the credit card industry. On Monday the CARD act goes into effect and consumers finally get some relief from such practices as "double-cycle billing" and arbitrary rate increases. full article

Video: Twitter users targeted by Chinese phishing attacks

Twitter users are being targeted by a phishing campaign designed to steal passwords and use hijacked accounts to spread money-making spam campaigns. full article

Irate Parents in Pa. Say Schools Use 'peeping Tom Technology'

The parents of a Pennsylvania high school student want a federal judge to bar school district personnel from switching on cameras in school-issued MacBook laptops, calling the security feature "peeping tom technology." full article

EU data protection chief slams secret ACTA talks

IDG News Service - The anti-counterfeiting trade agreement (ACTA) being negotiated in secret by the U.S., E.U. and others potentially runs roughshod over European data protection requirements, European data protection supervisor (EDPS) Peter Hustinx said Monday. full article

Video: Cyber attacks cost large enterprises £1.4m a year, study reveals

Cyber attacks cost large enterprises an average of £1.4m a year, according to the Symantec 2010 State of Enterprise Security study. full article

Chinese schools deny role in Google hack

Cyber attacks on Google were reportedly traced to computers at two schools in China

Two schools in China where computers were reportedly linked to cyber attacks on Google and other companies have denied involvement in the hack, Chinese state media said Sunday. full article

Data security breaches often triggered by carelessness

For physicians, a lost smartphone or forgotten laptop can mean a long, arduous process of notifying patients -- and the risk of penalties under HIPAA.

Often the biggest threat to your practice and patient data is not an outside hacker or a snooping employee -- it's somebody's forgetfulness. full article

The Snitch in Your Pocket

Law enforcement is tracking Americans' cell phones in real time—without the benefit of a warrant.

Amid all the furor over the Bush administration's warrantless wiretapping program a few years ago, a mini-revolt was brewing over another type of federal snooping that was getting no public attention at all. Federal prosecutors were seeking what seemed to be unusually sensitive records: internal data from telecommunications companies that showed the locations of their customers' cell phones—sometimes in real time, sometimes after the fact. The prosecutors said they needed the records to trace the movements of suspected drug traffickers, human smugglers, even corrupt public officials. But many federal magistrates—whose job is to sign off on search warrants and handle other routine court duties—were spooked by the requests. Some in New York, Pennsylvania, and Texas balked. Prosecutors "were using the cell phone as a surreptitious tracking device," said Stephen W. Smith, a federal magistrate in Houston. "And I started asking the U.S. Attorney's Office, 'What is the legal authority for this? What is the legal standard for getting this information?' " full article

Report: Most Organizations Now Suffer Cyber Attacks

Symantec's 2010 State of Enterprise Security finds three quarters of all enterprises have been hit by a cyber attack, and security is now more pressing than any other concern full article

IT pros divided about security of virtualization, cloud computing

Survey reveals one-third of enterprise security managers believe the technologies make security 'harder,' while one-third say it was 'easier' full article

Why it is all too easy to become a cybercriminal

The disclosure of Operation Aurora last month and the outing of the Kneber botnet gang’s stolen booty this week have much in common. full article

Losses from identity theft skyrocket

Victims forced to bear hefty salvage costs

CHICAGO — Identity theft and fraud have ruined Dave Crouse’s life. In less than six months, $900,000 in merchandise, gambling and telephone- service charges were siphoned out of his debit card. His attempts to salvage his finances have cost him nearly $100,000 and have bled dry his savings and retirement accounts. His credit score, once a strong 780, has been decimated. And his identity — Social Security number, address, phone numbers, even historical information — still is being used in attempts to open credit cards and bank accounts. full article

Javelin Study Finds Identity Fraud Reached New High in 2009, but Consumers are Fighting Back

Identity Fraud Affected 11 Million Americans in 2009; Proactive Measures by Financial Institutions, Businesses and Consumers Helped Decrease Costs; Increase in Prosecutions and Convictions full article

9 arrested at Scottsdale restaurant in identity-theft case

The Maricopa County Sheriff's Office arrested nine employees of a Scottsdale Mexican restaurant Friday on suspicion of identity theft and forgery. full article

Iowa drivers licenses to be sent in mail to prevent identity theft

DES MOINES, Iowa (AP) — State officials say Iowa drivers will be getting their drivers licenses in the mail later this year because of new security measures to prevent identity theft and other crimes. full article

EU condemns identity theft involved in Dubai killing

BRUSSELS (Reuters) - The European Union condemned on Monday the use of fraudulent EU passports and credit cards by assassins who killed a Palestinian militant in Dubai, but did not directly link Israel to the killing. full article

People's Republic of Hacking

'Panda' Exploit Offers Rare Inside Look at China's Cybercrime Networks

WUHAN, China—Some of today's biggest cybersecurity worries trace their roots to this central Chinese city, where a hacker with a junior high school education slapped cartoon pandas onto millions of computers to hide a destructive spy program. full article

Widespread Data Breaches Uncovered by FTC Probe

FTC Warns of Improper Release of Sensitive Consumer Data on P2P File-Sharing Networks

The Federal Trade Commission has notified almost 100 organizations that personal information, including sensitive data about customers and/or employees, has been shared from the organizations’ computer networks and is available on peer-to-peer (P2P) file-sharing networks to any users of those networks, who could use it to commit identity theft or fraud. The agency also has opened non-public investigations of other companies whose customer or employee information has been exposed on P2P networks. To help businesses manage the security risks presented by file-sharing software, the FTC is releasing new education materials that present the risks and recommend ways to manage them. full article

February 19, 2010

Czech Researchers Say 'Chuck Norris' Kicks Bots

Emerging botnet could redirect users to data-stealing sites, researchers say

Czech security experts say they have uncovered a global botnet that may be redirecting Web surfers to other sites for the purpose of stealing their data. full article

White Collar Defendant Sentenced to 309 Years in Prison

BATON ROUGE—U.S. Attorney David R. Dugas announced today that Chief U.S. District Judge Ralph E. Tyson sentenced Robert Thompson, also known as John Lawson, age 43, of Zachary, La., to a term of 309 years in prison. Thompson, the leader of a massive identity theft and bribery scheme, was sentenced based on charges of conspiracy, wire fraud, mail fraud, bank fraud, computer fraud, access device fraud, aggravated identity theft, money laundering, and obstruction of justice. This is the longest sentence of any white collar offender in the history of the Middle District of Louisiana. full article

FTC and States Take Aim at 9 Alleged Job Scam Artists

The Federal Trade Commission and state attorneys general took another swipe this week at scams that target unemployed people, jointly or separately filing nine new lawsuits against alleged "con artists" who charge victims for bogus job leads. full article

Thousands Of Organizations Worldwide Hit By Widespread Malware Attack

Botnet bearing the Zeus Trojan infected 75,000 systems worldwide in 2,500 enterprises, government agencies

Yet another sign that the Zeus Trojan isn't just for stealing consumer online banking credentials anymore: Some 2,500 enterprises and government agencies worldwide have been infiltrated by a botnet spreading the pervasive piece of malware, a security firm revealed today. full article

35 countries could be monitored for piracy

Copyright holders in the US have called for 35 countries to be put on a watch list for piracy and counterfeit activities and have singled out 10 for priority action. full article

Police: Duke Lacrosse Players' Accuser Assaulted Boyfriend

The woman who falsely accused three Duke University lacrosse players of rape nearly four years ago has been charged with attempted murder, arson and other counts after a fight with her boyfriend, police said. full article

Busted, Grilled by FBI, for Arabic-English Flashcards, Collegian Says

PHILADELPHIA (CN) - A Pomona College student says he was arrested, handcuffed and "abusively interrogated" at Philadelphia International Airport "solely because he passed through an airport screening checkpoint with a set of Arabic-English flashcards and a book critical of American foreign policy." Plaintiff Nicholas George, 22, of Pennsylvania, is a senior majoring in Middle Eastern Studies at the well-regarded California college. full article

Chinese school linked to Google attacks also linked to '01 attacks on White House site

A former U.S. Army officer linked '01 hacker to Shanghai Jiaotong University

Computerworld - One of two Chinese academic institutions identified in a New York Times report Thursday as the apparent source of the recent attacks against Google, has also been linked to a hacker who may have been involved with the takedown of in 2001. full article

February 18, 2010

Massive Windsor debit card scam even took credit union CEO Charles Janisse for $480

WINDSOR, ONT. -- No one was immune to the massive debit card fraud scheme that rattled Windsor over the weekend — not even the CEO of a local credit union. full article

Second person busted in case of stolen credit card data

A Cottage Grove woman turned herself in several days after police circulated surveillance photos of her as a suspect in a case of credit-card "skimming" that netted victims in the Twin Cities area and beyond. full article

Computer Breach At Southern Illinois University

Nearly one thousand former SIU students are at risk for identity theft. University officials say an old computer in the math department was hit by a virus last month. full article

La. man gets 309 years in prison for ID theft scam

BATON ROUGE, La. (AP) - A Louisiana man whom prosecutors said was the ringleader of an identity theft scheme with dozens of victims has been sentenced to 309 years in prison. full article

US Cybersecurity Hypothetically Pathetic

Earlier this week, Cyber ShockWave, a simulated cyberattack on America, once again showed that the U.S.'s cybersecurity is not up to the task of protecting the country's infrastructure. full article

Ex-Army man cracks popular security chip

Hardware hacker Christopher Tarnovsky just wanted to break Microsoft's grip on peripherals for its Xbox 360 game console. In the process, he cracked one of the most heavily fortified chips ever put into a consumer device. full article

Almost 2,500 firms breached in ongoing hack attack

Criminal hackers have penetrated the networks of almost 2,500 companies and government agencies in a coordinated campaign that began 18 months ago and continues to steal email passwords, login credentials, and other sensitive data to this day, a computer security company said. full article

Mozilla Releases Security Advisories

The US-CERT Current Activity web page is a regularly updated summary of the most frequent, high-impact types of security incidents currently being reported to the US-CERT. full article

A third of laptops are stolen from homes

More laptops are stolen from homes than on public transport, in coffee shops or at airports, according to new research from YouGov. full article

Man wracks up $100,000 in medical expenses with fake identification

BOCA RATON -- A man who twice checked himself into the hospital and wracked up more than $100,000 in medical expenses with a fake insurance identification has been arrested. full article

You’ve Got A Mole Giving Away Your Sensitive Data

Retailers everywhere are losing sensitive information to their competitors every day. It’s not because some hacker has compromised the corporate database or because some corporate espionage team has gone dumpster diving after a corporate meeting. No, the people responsible for this breach are actually your own customers. full article Solicits Social Theft

The Web site gathers tweets and online posts about people who are away from home to emphasize the risk posed by advertising one's location. full article

China to crackdown on porn transmitted through mobile phones

Chinese authorities have unveiled tougher measures to clean up the telecommunications industry in the country, and said offensive material transmitted through mobile phones will be the main target of a crackdown on Internet porn. full article

Stolen Goldman computer code is still MIA

Prosecutors going after former Goldman Sachs computer whiz Sergey Aleynikov for theft say they haven't yet found the allegedly pilfered code on his new employers' computers -- potentially blowing a hole in their case. full article

Local Man's High-Tech Invention Aims To Stop ID Theft

Identity theft can cost hundreds or thousands of dollars and can lead to a lot of headaches, but a San Diego man's new invention could help stop thieves before they strike. full article

Court denies appeal in identity theft case

The state Intermediate Court of Appeals has upheld the 2007 conviction and prison sentence of Henry Calucag Jr. for stealing the identity and land of a Kauai businessman who was found slain in the Philippines. full article

Britain Gets Tough with Mossad over Identity Theft

“Britain has cut ties with Mossad in the past, and will do so again if the Israelis are found to be acting against British interests.” These were the stern words of a British Foreign Office official speaking on allegations that the Mossad agents suspected of assassinating a Hamas leader in Dubai could have used the identities of British ex-pats to gain access to the emirate. full article

Britain: Israel must 'cooperate fully' in fake passport probe

British Foreign Secretary David Miliband on Thursday demanded Israel's full cooperation in investigating of the fraudulent use of U.K. passport by the killers of a Hamas official in Dubai. full article

February 17, 2010

Wipro investigates alleged $4 million fraud by employee

IDG News Service - Indian outsourcer Wipro said Wednesday it is investigating the embezzlement of $4 million from the company after an employee allegedly obtained a colleague's online password. full article

Military To Tighten Vendor Cybersecurity Policies

The Department of Defense is setting the stage for changes in how vendors handle unclassified military data.

The Department of Defense has signaled its intention to develop new policies requiring its vendors to meet increased standards for cybersecurity for unclassified military information residing on or being carried over private sector systems and networks. full article

New Report Examines Malware's Origins, Motivations

Nearly every day, industry analysts and security researchers warn IT professionals about the skyrocketing proliferation of malware. A simple Web search turns up many reports that dissect the technical nature of malicious software, how it works, and how it affects its victims. full article

Cybercriminals exploiting luger's death, Winter Olympics

Cybercriminals have been capitalizing on the world's interest in the Winter Olympics in Vancouver to spread malware, experts warned. full article

US jury convicts Nigerian on wire fraud charges

IDG News Service - A 31-year-old Nigerian man could face up to 20 years in prison after being convicted Tuesday of charges related to running advance free fraud scams for five years, according to the U.S. Department of Justice. full article

Dayton woman gets up to 42 years for identity theft

A 31-year-old Dayton woman who began an identity theft enterprise in Washoe County shortly after her 2008 release from a Nevada prison on fraud felonies, was sentenced to up to 42 years in prison Wednesday. full article

ID theft ring that targeted church-goers busted

A group of alleged identity thieves who targeted people who attended churches along the Front Range have been indicted by the State Grand Jury. full article

Mock cyber attack shows US unpreparedness

During the simulated cyber attack that took place yesterday in Washington and was recorded by the CNN, one thing became clear: the US are still not ready to deflect or mitigate such an attack to an extent that would not affect considerably the everyday life of its citizens. full article

EMV hack may be overstated

Researchers at the University of Cambridge in the UK released a report claiming to have identified vulnerabilities with the EMV payment scheme. Industry organizations are meanwhile defending the technology, saying the hack would be difficult to pull off in the real world. full article

State of Alaska Fears the Worst for Possible Identity Theft Victims

The accounting firm, Pricewaterhouse Coopers, LLC, is in hot water after the Attorney General finds out that the company knew of a data breach since early December 2009, but just recently released the information. full article

West Memphis Police Department's computer network compromised

WEST MEMPHIS, AR (WMC-TV) - The FBI is investigating a Mid-South police officer suspected of accessing fellow officers' personal information. full article

Man wracks up $100,000 in medical expenses with fake identification

BOCA RATON -- A man who twice checked himself into the hospital and wracked up more than $100,000 in medical expenses with a fake insurance identification has been arrested. full article

St. Petersburg telemarketer eavesdropped to steal credit card numbers, authorities say

ST. PETERSBURG — A St. Petersburg man has been charged with stealing customers' credit card numbers from a marketing company he worked for to buy nearly $30,000 in dinners, limos and other luxuries. full article

February 16, 2010

Hackers at Pwn2Own to compete for $100K in prizes

Contest targets to include iPhone, Droid and BlackBerry, IE, Firefox and Chrome

Computerworld - A hacking contest next month will award cash prizes of $15,000 to anyone who can break into an iPhone, BlackBerry Bold, Droid or Nokia smartphone. full article

Orange users angered over response to e-mail data breach

The Information Commissioner's Office (ICO) has received complaints from Orange users whose e-mail addresses were accidently disclosed in a marketing letter from its customer relations division. full article

Mobile Spy Web-site Shuts Down Among Privacy Concerns, Crime Allegations

Mobile spyware web-site was withdrawn by its owner Saturday after young lawyers warned that using the service is a violation of privacy and thus a crime. full article

Foreign Access to U.S. Banking Data Expanded

WASHINGTON (CN) - Banks must provide financial information on people suspected of funding terrorist activity or money laundering to European Union members who are signatories to the Agreement on Mutual Legal Assistance. The requirement is in a new Financial Crimes Enforcement Network rule amending the Bank Secrecy Act. The FinCEN and other federal law enforcement agencies will receive reciprocal access to European banking records. full article

February 15, 2010

Mayor Roefaro warning residents of scam involving Ebay

UTICA, N.Y. (WKTV) - Utica officials are warning residents of scam due to numerous complaints called into the Mayor's office. full article

Criminal hacker 'Iceman' gets 13 years

IDG News Service - A former security researcher turned criminal hacker has been sentenced to 13 years in federal prison for hacking into financial institutions and stealing credit card account numbers. full article

Microsoft says malware causing blue screen crashes

A sneaky rootkit is blamed for a problem that has sidelined some XP users following patches

A hard-to-detect rootkit may be causing Windows XP systems to crash following Microsoft's latest security updates. full article

Bail Set at $10 Million for Madoff's Former Finance Chief

Bail was set at $10 million Thursday for jailed financier Bernard Madoff's former finance chief, who has remained imprisoned since he pleaded guilty six months ago and cooperated with the government's investigation. full article

Microsoft's new 'phone home' anti-piracy practice unacceptable, says critic

'At what point is one free of this' perpetual checking, asks Lauren Weinstein

Computerworld - The Internet advocate who blasted Microsoft in 2006 over the daily "phone home" habits of its anti-piracy software took the company to task again today for a new practice that will examine consumers' Windows 7 PCs every 90 days to make sure they're running legitimate copies of the OS. full article

Researchers find huge weakness in European payment cards

IDG News Service - Hundreds of millions of payment cards throughout Europe have a flaw that could allow criminals with a stolen card to enter any random PIN to complete a transaction, according to researchers from the University of Cambridge. full article

Twitter Application Grader.Com Hacked

A popular Twitter application used to measure the influence of Twitter users has been hacked and used to send spam messages. full article

European Parliament blocks US access to SWIFT data

As reported by the BBC and others, today the European Parliament voted to block further US access to SWIFT banking data. Despite intensive US lobbying the motion to block was approved with 378 votes in favor, 196 against and 31 abstentions. full article

Abuse of personal data in Bulgaria continues, official says

Companies are continuing to collect more personal data than absolutely necessary, Bulgarian Commission for Personal Data Protection (CPDP) chairperson Veneta Shopova said. full article

Government invests £4.3m in crackdown on cybercrime

The government is to invest £4.3m to fight criminals who use e-mails and websites to con UK consumers out of £3.5bn a year. full article

Deadline Looms for Mass. Data Protection Law

After more than a year of delay and several modifications, a contentious Massachusetts data protection regulation appears set to go into effect March 1. full article

Second Californian Pleads Guilty to False Tax Refund Conspiracy

WASHINGTON – Ather Ali of Diamond Bar, Calif., pleaded guilty today to conspiracy to defraud the United States, the Justice Department and Internal Revenue Service (IRS) announced. full article

February 12, 2010

9 claim tax return ID theft

The IRS and police in northwest Indiana are looking into allegations of identity theft of people who claimed someone had filed tax returns for them before they filed their own returns. full article

District investigates computer security breach

The Broward County School District in South Florida is investigating whether students at several schools were able to change grades by hacking into computers. full article

Employee Misuse of Computer Access Ruled Not a Crime

Using a password-accessed workplace computer in violation of company rules or policies may get you disciplined, but it's not enough to be prosecuted in New Jersey, says a Mercer County judge in a published case of first impression. full article

Google Buzz Gives Spammers a New Sweet Spot

Google's new Gmail-based social network, Buzz, is raising hackles among security experts who see it as fertile new ground for propagators of malware and spam. "In the industry's haste to create the next 'Big Thing' for users," said Authenware President Tom Helou, "what results is a one-stop-shop for even amateur hackers to create an imitation identity and get access to sensitive information." full article

Internet Governance in a World of Cyberwarcraft

Google's ongoing fight with the government of China brings dozens of issues to the table, not the least of which are human rights, censorship and trade and fairness issues. full article

Adobe pushes out Flash security fix

Adobe has published a cross-platform update for Flash that addresses a potentially serious security flaw. full article

Chip and PIN security busted

Security researchers have demonstrated a gaping security hole in Chip and PIN credit card authorisations which undermines trust in the technology as a means to verify retail purchases full article

February 11, 2010

Customers' Personal Information Found In Macy's Dumpster

Homeless Man Using Papers With Credit Card And Social Security Numbers As A Bed

A surprising find outside the downtown St. Louis Macy's store. Documents containing personal information including social security numbers. full article

Online Robbery: Hackers Steal $50,000. Bank Says ‘Tough Luck’

It’s every technophobe’s nightmare, but this time its true. Some $50,000 was stolen from Fan Bao’s online bank account by Croatian computer hackers and the bank told him that the loss is not their problem. full article

Leader of ID theft ring sentenced

The leader of a mail- and identity-theft ring has been sentenced to more than 13 years in federal prison, the U.S. Attorney's Office in Denver said today. full article

Lawrence Welk Resort Furious with Visa

The Lawrence Welk Resort says a tech company disabled its computer security system, making 1,427 customers' credit cards vulnerable to ID theft. full article

Mozilla admits Firefox add-on malware false alarm

One item of AMO badness just a blank

Mozilla has admitted it erred in labelling one of the two Firefox add-ons offered for download from its official add-on site as malign last week. full article

FAFSA scams target student applicants

The State of Tennessee Office of Attorney General issued a warning to students last Thursday about possible financial aid scams. full article

February 9, 2010

Woman worms into D.C. taxpayer accounts

A mentally ill woman exploited a loophole in D.C. tax office online systems to gain unauthorized access to taxpayer accounts, establish herself as the owner of dozens of businesses and file returns on their behalf. full article

SSNs Printed On Nearly 50K Envelopes

Department Of Health Care Services Alerts Beneficiaries To Mistake

Envelopes sent to thousands of Californians who get benefits from the Department of Health Care Services contained Social Security numbers on the mailing labels. full article

AvMed: Data of 208,000 at risk after Gainesville theft

The theft of two company laptops from AvMed Health Plans' corporate offices in Gainesville may have compromised the personal information of more than 200,000 current and former subscribers, as well as their dependents, the company announced. full article

Microscope-wielding boffins crack cordless phone crypto

Cryptographers have broken the proprietary encryption used to prevent eavesdropping on more than 800 million cordless phones worldwide, demonstrating once again the risks of relying on obscure technologies to remain secure. full article

Thieves invade Twitter

CYBER criminals are charging each other more than $1000 for stolen identity details that can be used to access Twitter accounts

The social networking phenomenon has not only proved a hit among users, but carved out a popular following among tech-savvy crooks because of the doors it can open. full article

FICO security lapse scary, but not part of larger problem

It is scary to learn someone is poking through your personal financial information and even more disturbing when you learn that they got it through the people who score your credit. full article

Ruling: FACTA Does Not Extend to E-Commerce Confirmations

Online merchants have dodged another bullet when it comes to the Fair and Accurate Credit Transactions Act (FACTA). In the recent case Shlahtichman v. 1-800 Contacts, Inc., a judge in the Northern District of Illinois ruled in December that FACTA does not apply to electronic displays or e-mail confirmations of Internet transactions. full article

Global gov's shrugging lets cybercrims frolic

Sex and drugs and Rickrolling in Madrid

Someone will have to die before governments take cybercrime as seriously as they take digital piracy, a panel on cybercrime and internet security was told last week. full article

Health care department breaches privacy

The Department of Health Care Services said Monday it has breached the privacy of 49,352 people who receive adult day-care services from the state. full article

Bradenton police warn of fake Verizon, Bright House workers

On Friday, a group of men showed up at The Palms apartment complex going door to door claiming to work for Verizon. full article

February 8, 2010

China: Large hacker training Web site shut down

Washington (CNN) -- Police in China shut down what officials think was the largest training Web site for computer hackers, local media said. full article

Internet rape case jolts Wyoming city

Victim's ex-boyfriend allegedly posted online that she had a rape fantasy

CASPER, Wyo. - Authorities say a Casper woman was assaulted at her front door, raped at knifepoint in her living room and left bound on the floor, and they say one of the men charged in the brutal attack claimed that he thought it was invited. full article

Mass injection web hacks yield to targeted attacks

Malware authors targeting websites have begun trading quantity for quality, according to web security firm Websense. full article

ShmooCon: P2P Snoopers Know What's In Your Wallet

Being security researchers and all, Larry Pesce and Mick Douglas thought it would be a hoot to take a look at some of the information people send out over peer-to-peer (P2P) networks. They were taken aback by what they found. full article

The Rise of Caller ID Spoofing

Applications that let users change or “spoof” their Caller ID are gaining in popularity in mobile phone app stores, even as Congress considers stalled legislation to outlaw particular uses of the technology, and criminals use it to engage in nefarious activity. full article

BlackBerry Spyware Can Intercept Texts, Email, Track User's Location

A security researcher demonstrated a spyware program at the ShmooCon conference on Sunday that is capable of intercepting and recording text messages, emails, Web traffic and other data sent to and from BlackBerry devices. full article

3rd Circuit to Mull Privacy of Cell Phone Data

Case offers rare glimpse into the mechanics of federal criminal investigations where nearly all documents are filed ex parte and stay under seal until indictments are handed up full article

City supe slaps bank for account compromise

A supervisor for the town of Poughkeepsie, New York lashed out at a local bank after someone siphoned $378,000 out of municipal coffers and transferred it to Ukraine. full article

February 5, 2010

Cybersecurity Enhancement Act passed by U.S. House

One week after having nearly 50 of its websites defaced by hackers, the U.S. House of Representatives on Thursday passed a bill that would seek to improve cybersecurity within the federal government and the public sector. full article

EU officials downplay carbon credit phishing scam

European Union officials have downplayed the seriousness of phishing attacks that enabled cybercriminals to steal carbon emissions permits worth £2.6m. full article

Mozilla confirms infected Firefox add-ons slipped through security

Malware hidden in two extensions threatens Windows users

Computerworld - Mozilla confirmed late Thursday that it failed to detect malware in a pair of Firefox add-ons, which may have infected up to 4,600 users. full article

FTC Returns $1.6 Million to Consumers Scammed by Bogus Debt Collector

The FTC will distribute $1.6 million to thousands of consumers who were scammed into paying money they did not owe by con artists who threatened, harassed and lied to them. full article

FTC Targets Scammers Pushing Phony Jobs, Bogus Money-Making Schemes

In conjunction with state law enforcement officials and other federal agencies, the Federal Trade Commission will hold a press conference on Tuesday, February 9, 2010, at 11 a.m., to announce a law enforcement sweep cracking down on job and work-at-home fraud fueled by the economic downturn. full article

February 4, 2010

Australian judge upholds ISP's defence against piracy claims

An Australian judge has upheld a "pure conduit" defence by an internet service provider against claims by copyright holders that it should have stopped illegal filesharing on its networks. full article

Venezuelan VoIP hacker pleads guilty

A Venezuelan man pleaded guilty in New Jersey federal court on Wednesday to hacking into the networks of voice over internet protocol (VoIP) providers and reselling internet-based phone services for profit, according to the U.S. Attorney's Office. full article

February 3, 2010

Expect highly targeted cyber attacks with inside help in 2010, businesses warned

Businesses face an increasing number of threats from cybercriminals, according to the latest internet security report by IT management software company CA. full article

U.S. Navy establishes new Cyber Command

The U.S Navy has joined the Air Force and Marines with the formation of a new command charged with overseeing cyberspace operations. full article

Class Claims Experian is Recidivist Cheat

LOS ANGELES (CN) - Experian's "free credit reports" are not free at all, but trick customers into signing up for a credit monitoring service that can cost up to $179 a year, consumers say in a federal class action. The class claims Experian does this despite promising the FTC in 2005 that it would "stop its fraud" - but all it did was change the name. full article

Old security flaws still a major cause of breaches, says report

Companies are overlooking obvious threats in the rush to tackle new ones, says TrustWave

Computerworld - An over-emphasis on tackling new and emerging security threats may be causing companies to overlook older but far more frequently exploited vulnerabilities, says a recent report. full article

House to Consider Cybersecurity Bill on Wednesday

The U.S. House of Representatives is scheduled to vote Wednesday on a proposed bill that is designed to bolster federal cybersecurity research and development activities, and stimulate the growth of a cybersecurity workforce in the country. full article

Twitter urges users to reset passwords after phishing alert

Twitter has asked some users to reset their passwords after a phishing attack. It has urged members who use the same password for other online services to take action to protect their privacy. full article

Accusations Fly Over Voice Encryption Hack

German encryption firm SecurStar has strenuously denied being behind an apparently independent test of voice encryption products that found many of its rivals could be hacked using a $100 phone-tapping program. full article

Hackers paralyse emissions trading scheme

Emissions trading is considered the yardstick for reducing pollutant emissions. Using market-based mechanisms, it aims to encourage economies and businesses to gradually reduce their overall emissions, such as those caused by burning fossil fuels. Emissions permits that define a specific volume of a greenhouse gas such as carbon dioxide are assigned or purchased, allowing businesses which emit less than their permitted volume to sell excess permits on a trading platform specifically set up for the purpose. Businesses which produce more pollutants than they have permits for must obtain additional certificates. full article

Credit theft sours winery experience

It certainly wasn't the wine or the bowtie pasta at St. Clair Winery & Bistro that left a bad taste in Bianca Villani's mouth. It was the call from Visa, informing her that someone in Maryland was trying to put hundreds of dollars of purchases on her card and the cards of two of her other friends - who had also gone to the Dec. 11 dinner. full article

Mesilla man sentenced to 10 years in prison for child porn

A Mesilla Park man has been sentenced to 120 months in prison and lifelong supervision as a result of a national child pornography investigation. David Joseph Dube, 56, a former United States Army captain, worked as an information technology contractor at the time of the offenses, according to the FBI. full article

Wigan Council loses the data of 200 disabled residents

A Greater Manchester council has lost details of 200 disabled residents - a year after a previous security blunder. full article

Greensburg medical facility laptops stolen

Two laptop computers containing patient information were stolen from two Greensburg medical complexes over the weekend, city police said Tuesday. full article

Strangers Lose Personal Information in Non-Profit Mix-Up

A mistake by a not-for-profit group may put more than 200 landlords at risk for identity theft. The mistake sent tax forms and social security numbers to strangers. full article

University employee charged with felony

A University employee with access to sensitive student information was arrested and charged with one count of felony theft by extortion Monday evening, and police said they expect their investigation to lead them to more student victims. full article

Identity theft, forgery arrests

An alleged identity theft and forgery ring was disrupted in southeast Phoenix this week after deputies from the Maricopa County Sheriff’s Office executed warrants at two residences and arrested five illegal immigrants from Mexico. full article

iPhone vulnerable to remote attack on SSL

Apple's iPhone is vulnerable to exploits that allow an attacker to spoof web pages even when they're protected by the SSL, or secure sockets layer, protocol, a security researcher said. full article

Stubborn trojan stashes install file in Windows help

Can't muster rejection

Security researchers have spied malware that stashes a copy of itself in a Windows help file to ensure victim computers remain infected full article

Record year for online tax filing - and phishing mails

Scammers rev up for tax season

Her Majesty's Revenue and Customs is celebrating another record year for online tax returns, over six million people filed online this year. full article

Watch Out for Scam Toyota Recall Number

Some crafty scammers are playing the numbers game in hopes of cashing in on Toyota's massive recall. full article

ITRC Fact Sheet 140 – Social Security Number FAQs

The ITRC is frequently asked by consumers about the appropriate time and reason to provide one’s SSN. full article

Louisiana agent fined $100,000 amid numerous fraud-related charges

A Baton Rouge, La., preacher who allegedly used the identity of a 2-year-old to obtain an insurance license was ordered to stop conducting business by state regulators and fined $100,000. full article

Mo. insurance agent fined $5,000 for creating false proof of coverage

A Missouri man was fined $5,000 by FINRA for creating a false proof of insurance document for a customer. full article

Possible vendor’s breach may explain some BlackHat attendees being spammed

Earlier this week, was contacted by an individual who reported that after attending BlackHat 2009, he recently started receiving spam at a unique e-mail address he had created specifically for Breach Security. After receiving spam, he contacted them to change the e-mail address to another unique e-mail address, but within days, started getting spam at that address, too. The spam started on or about January 27. full article

How to keep your passwords super secure

Hands up who uses the same password for everything? Shame on you, and is there anyone out there who uses the same small clutch of passwords for everything? Yes, some shame on you people too. full article

February 2, 2010

Crooks try to romance users with Valentine's Day spam

Eat your heart out, cupid. Valentine's Day still is nearly two weeks away, but the lover's holiday is already attracting the attention of the web's criminal element. full article

Reports: Phishing attack hits Twitter

(CNN) -- If you're on Twitter, it may be a good idea to change your password this morning. full article

US gaming commission confirms 80,000 personal details exposed after outside attack on server

Around 80,000 Iowa employee names, birth dates and social security numbers have been exposed after a server was hacked full article

Most consumers reuse banking passwords on other sites

The majority of online banking customers reuse their online-banking login credentials on other websites, according to a new survey on password insecurity. full article

Manchester cops clobbered by Conficker

PCs' PCs still unplugged from PNC

Greater Manchester Police's computer network has been infected by the infamous Conficker worm, leaving beat cops unable to run computer checks on suspected criminals and vehicles for the last three days. full article

Incidents of identity theft up by 32pc

The recession has led to a surge in financial fraud with identity theft up by almost a third, latest industry figures have revealed.

A worrying trend is emerging where criminals take over the running of your bank account and transfer funds into an account they have set up to accept these bogus payments, according to CIFAS, the UK’s fraud prevention service. full article

Trail of Iowa computer hack points to China

owa investigators suspect a serious breach of a state government computer database last week originated in China, which a congressional panel says has increased its use of cyber espionage tactics. full article

Web attacks cripple Russia's biggest indie newspaper

Seven days and counting

The website of Russia's highest-profile independent newspaper on Monday suffered its seventh straight day of crippling denial-of-service attacks by unknown miscreants. full article

Cybercrime Checks Into The Hotel Industry

Hackers are increasingly targeting hotels and resorts, raiding more than the minibar.

Over the past year America's hotels have had some uninvited guests: a wave of increasingly sophisticated invasions by organized cybercriminals. full article

Identity thieves use sophisticated techniques to steal money

Leah Broadway was running on the treadmill at her Alexandria gym when someone stole her purse from her car parked outside. full article

Fla. agent sent to prison for taking more than $1 million in premiums

A Gainesville, Fla., insurance agent was sentenced to 21 months in state prison and 10 years of probation after pleading guilty to the theft of more than $1 million in premiums intended for businesses he had created. full article

Obama's $3.8 trillion proposed budget: Parsing the tech priorities

President Obama rolled out his $3.8 trillion proposed fiscal 2011 budget that’s teeming with technology projects throughout the Federal government’s departments and agencies. full article

The future of... data encryption

Digital memories are long. Emails, images, and documents sent today can resurface years from now, but new software could help ensure that what happens online, doesn’t have to live there eternally. full article

Chinese spies use cyber hacking and sexual blackmail...

The New York Times recently published a story that Britain’s spy agency, MI5, warned British business people doing business in China about spying attempts that made used of cyber hacking and attempted to ensnare people through blackmail “over sexual relationships and other improprieties.” full article

Why it’s easier today for a thief to guess your nine digits

Alessandro Acquisti is an associate professor of information technology and public policy at the Heinz College at Carnegie Mellon University. His work focuses on the economic and social impact of IT and in particular, the sweet spot between economics and individual privacy. full article

Tips to national insurance fraud group doubled in 2009

Tips from the public about insurance crimes to a national group doubled from 2008 to 2009, as people “lost their patience” with insurance fraud, the group said. full article

Indian internet users vulnerable to cyber fraud: Survey

New Delhi: A survey* of more than 5,000 active Internet users across 10 cities in India suggests that users are becoming increasingly concerned about online security. full article

Belarus orders Internet providers to collect personal user data

Minsk/Belarus' authoritarian government Monday ordered even tighter online controls, ordering internet providers to collect personal data and profiles of their users, according to the independent Belarusian news agency Belapan. full article

Use of Twitter, Facebook rising among gang members

When a gang member was released from jail soon after his arrest for selling methamphetamine, friends and associates assumed he had cut a deal with authorities and become a police informant. full article

Pressure mounts to phase out Internet Explorer 6

A Downing Street petition is calling for the UK government to drop Microsoft's Internet Explorer 6 (IE6) and move to a more modern browser. full article

Hackers turn to social media to attack companies

Social media is increasingly becoming fertile ground for hackers to attack companies with spam and malware, according to a report released Monday by a security firm. full article

February 1, 2010

Attacks on social networking sites up 70%

Malware and spam attacks against users of social networking sites such as Facebook and Twitter have increased by 70% in the past year, according to a report by Sophos. full article

Clash Over Student Privacy

WASHINGTON -- The U.S. Education Department has fired the top federal official charged with protecting student privacy, in what the dismissed official says was a conflict with the agency's political leaders over their zeal to encourage the collection of data about students' academic performance. full article

The personal details of 3.4 million Victorians continue to be abused by VicRoads staff despite a State Government bid to stamp out licensing fraud.

Seven VicRoads workers have been sacked or resigned for improperly accessing or releasing information from the authority's database in the past two years. full article

HMRC issues 'tax refund' phishing e-mail alert

HM Revenue and Customs (HMRC) has issued a warning about fake e-mails about tax refunds which are designed to steal personal information. full article

Privacy breached: Flow clients rail against directory listings

Subscribers to Flow's telephone service are demanding explanations at the sudden appearance of their private information in the national telephone directory, produced annually by a third party. full article

Home Office spawns new unit to expand internet surveillance

Exclusive The Home Office has created a new unit to oversee a massive increase in surveillance of the internet, The Register has learned, quashing suggestions the plans are on hold until after the election. full article

Firefox-based attack wreaks havoc on IRC users

World's first inter-protocol exploit, but not the last

Underscoring a little-known web vulnerability, hackers are exploiting a weakness in the Mozilla Firefox browser to wreak havoc on Freenode and other networks that cater to users of internet relay chat. full article

Laptops with Personal Info Stolen from Columbia

About 1,400 current, former and prospective students at Columbia University have been told that their personal information, including Social Security numbers, is vulnerable following a security breach. full article unmoved by Internet Explorer 6 security concerns

Google, NHS cast off exploited browser

Google and the NHS may soon be ditching support for Internet Explorer 6, but that hasn’t stopped UK government officials from declaring the browser doesn’t give them cause for concern, unlike their French and German counterparts. full article

CIA, PayPal under bizarre SSL assault

Plus hundreds of others

The Central Intelligence Agency, PayPal, and hundreds of other organizations are under an unexplained assault that's bombarding their websites with millions of compute-intensive requests. full article

Grandma endures wrongful ISP piracy suspension

All Cathi "Cat" Paradiso knew for sure, as she learned that her Web access was being shut off, was that she was losing her struggle to stay calm. full article

Military joint EHR office rapped for bad planning

WASHINGTON – The Government Accountability Office criticized the group directing the project to tie together the electronic health record systems operated by the Defense and Veterans Affairs departments in a recent report full article

Google censors 'Lolita,' but not 'bestiality'

It seems like only yesterday that news surfaced that naughty words were being replaced by hash marks on Android phones. full article

Health Professionals Petition FTC For Relief From Red Flags Rule

In light of a recent federal court decision, four national organizations representing dentists, physicians and veterinarians called on the Federal Trade Commission (FTC) today to exclude health professionals from controversial new regulation intended to combat identity thef full article

Medical files found in trash

Police on Tuesday turned up medical files in a trash bin near University Medical Clinics that contained information that could be used to commit identity theft, a police spokesman said Wednesday. full article

CIA, PayPal under bizarre SSL assault

e Central Intelligence Agency, PayPal, and hundreds of other organizations are under an unexplained assault that's bombarding their websites with millions of compute-intensive requests. full article

Stolen Twitter accounts can fetch US$1,000

According to researchers at Kaspersky Lab, cybercriminals are trying to sell hacked Twitter user names and passwords on-line for hundreds of dollars. full article

Cocoa Beach police find ATM skimmer

Someone attached a “skimming device” to an ATM at Bank of America on North Atlantic Avenue in Cocoa Beach, and police believe an unknown number of victims may be susceptible to identity theft. full article

Preying on the down-and-out

Con artists target victims with job-hunting schemes, 'free' trials

Unemployment, home foreclosures, rising debt. These problems set the stage for scams last year. full article

Body parts killer Stephen Marshall jailed for life

A man who admitted murdering a kitchen salesman, dismembering his body and dumping it, has been jailed for life. full article

Court Appearance Set for Tax Fraud Suspects

35-year-old Don Darrell Price from Jackson and 41-year-old Timothy Benjamin Taylor from Dacula, Georgia, are facing at least 484 counts of identity theft and tax fraud charges combined. full article

Alamo arrests linked to local identity theft victims

This week in Alamo, a multi-agency team of law enforcement officers arrested four adults on charges of identity theft, possession of a controlled substance and outstanding warrants. full article

New Twist in Dead Sea Scrolls Case

In the latest twist of a curious legal case involving allegations of identity theft, cyber-bullying, and two-millennia-old religious artifacts, a well-known University of Chicago professor has been implicated in a complex, Internet-based scheme to smear opponents of his work. full article

A Tale of Two Victims

When a computer virus infection at a business allows thieves to steal tens of thousands of dollars from the company’s commercial banking account, banks typically don’t reimburse the victim company. But the truth is, most banks make that decision on a case-by-case basis. full article

'Skimmer' Found Attached To Bank ATM

Technician Discovers Device At Cocoa Bank

A technician found the "skimmer" late Saturday afternoon at the Bank of America ATM located in the 4300 block of North Atlantic Avenue in Cocoa. full article


Contact Information

Center for Identity Management and
Information Protection
Dr. Donald Rebovich,
Executive Director
Utica College
1600 Burrstone Road
Utica, NY 13502