Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 5 declined, 8 accepted (13 total, 61.54% accepted)

Security

Submission + - Banks Faulted for Fake Antivirus Scourge (krebsonsecurity.com)

krebsonsecurity writes: "Merchant banks that process credit card payments for fake antivirus or "scareware" exhibit a distinctive pattern of card processing that could be used by Visa and MasterCard to weed out the rogue processors, according to a new study by the University of California, Santa Barbara. From the study: "The UCSB team found that the fake AV operations sought to maximize profits by altering their refunds according to the chargebacks reported against them, and by refunding just enough to remain below a payment processor’s chargeback limits. Whenever the rate of chargebacks increased, the miscreants would begin issuing more refunds. When the rate of chargebacks subsided, the miscreants would again withhold refunds." The study also highlights how few customers ever request a refund, and how affiliates pushing this junk software made more than $133 million."
Security

Submission + - Rogue Anti-virus Victims Rarely Fight Back (krebsonsecurity.com)

krebsonsecurity writes: One big reason why rogue anti-virus continues to make major bucks for scam artists? Relatively few victims ever ask their credit card company or bank to reverse the charges for the phony security software — even when the victims don't even receive the worthless software they were promised. I recently found several caches of data for affiliates of a rogue anti-virus distribution program, and the data showed that in one set of attacks only 367 out of more than 2,000 scammed disputed the charge. A second rogue anti-virus campaign scammed more than 1,600 people, and yet fewer than 10 percent fought the charges.

Submission + - Cybercrooks Surpassed Old School Bankrobbers in 09 (krebsonsecurity.com)

krebsonsecurity writes: Organized cyber criminal gangs stole $25 million in the 3rd quarter alone last year, by pilfering the online bank accounts of small to midsized businesses, the FDIC reported last week. In contrast, traditional bank robbers hauled just $9.4 million in 1,184 bank robberies during that same period, according to an analysis of FBI bank crime statistics by krebsonsecurity.com. From that story: "The federal government sure publishes a lot more information about physical bank robberies that it makes available about online stick-ups. Indeed, the FBI’s bank crime stats are extraordinarily detailed. For example, they can tell you that in the 3rd quarter of last year, bank robbers were more likely to hold up their local branch between the hours of 9 a.m. and 11 a.m. on a Wednesday than at any other time or day of the week; they can tell you the number of tear gas and dye packs taken with the loot, the number of security cameras activated, the number of food stamps taken, even what percentage of suspected perpetrators had illegal drug habits at the time of the robberies. About the only thing the stats don’t tell you is what brand of jeans the perpetrators were wearing and whether the getaway car had cool vanity plates. What do we get about e-crime statistics from the federal government? One guy from the FDIC giving a speech at the RSA conference.
Security

Submission + - Mariposa Botnet Authors Unlikely to See Jail Time (krebsonsecurity.com)

krebsonsecurity writes: Three Spanish men were arrested last month for allegedly building an international network of more than 12 million hacked PCs that were used for everything from identity theft to spamming. But according to Spanish authorities and security experts who helped unravel the crime ring, the accused may very well never see the inside of a jail cell even if they are ultimately found guilty, due to insufficient cyber crime legislation in Spain, writes krebsonsecurity.com. From the article: “It is almost impossible to be sent to prison for these kinds of crimes in Spain, where prison is mainly for serious crime cases,” said Captain Cesar Lorenzana, deputy head technology crime division of the Spanish Civil Guard.
Security

Submission + - Time Bomb May Have Destroyed 800 Norfolk City PCs (krebsonsecurity.com)

krebsonsecurity writes: The City of Norfolk, Virginia is reeling from a massive computer meltdown in which an unidentified family of malicious code destroyed data on nearly 800 computers citywide. The incident is still under investigation, but city officials say the attack may have been the result of a computer time bomb planted in advance by an insider or employee and designed to trigger at a specific date, according to krebsonsecurity.com. "We don't believe it came in from the Internet. We don't know how it got into our system," the city's IT director said. "We speculate it could have been a time bomb waiting until a date or time to trigger. Whatever it was, it essentially destroyed these machines.
Security

Submission + - Insecure Plugins Ding IE, Safari, Chrome, Opera (krebsonsecurity.com)

krebsonsecurity writes: The Web browser wars often focus on which browser is more secure, but the dirty secret is that insecure plugins are a serious threat to all browsers, both from a stability and security perspective. Krebsonsecurity.com features an interestingly look at the administration page for a popular browser exploit kit called Eleonora, which suggests that plugins like Adobe Reader and Java are leading to successful compromises for users surfing not just with Internet Explorer, but also Google Chrome, Firefox, Safari and Opera.
Security

Submission + - Firm to Drop 0day in Database, Web Server Apps (krebsonsecurity.com)

krebsonsecurity writes: January promises to be a busy month for Web server and database administrators alike: A security research firm in Russia says it plans to release information about a slew of previously undocumented vulnerabilities in several widely-used commercial software products, including Mysql, Tivoli, IBM DB2, Sun Directory, and a host of others, writes krebsonsecurity.com. From the blog: “After working with the vendors long enough, we’ve come to conclusion that, to put it simply, it is a waste of time. Now, we do not contact with vendors and do not support so-called ‘responsible disclosure’ policy,” Legerov said.
Security

Submission + - Alleged Ponzi Mastermind Stanford Pwned in Antigua (krebsonsecurity.com)

krebsonsecurity writes: Criminal hackers apparently involved in break-ins at several U.S. financial institutions also appear to have dug up dirt on Robert Allen Stanford, a man slated to go on trial this month for his alleged part in an $8 billion Ponzi scheme. From the story: "In early 2008, while federal investigators were busy investigating disgraced financier Robert Allen Stanford for his part in an alleged $8 billion fraudulent investment scheme, Eastern European hackers were quietly hoovering up tens of thousands customer financial records from the Bank of Antigua, an institution formerly owned by the Stanford Group.

Slashdot Top Deals

Never call a man a fool. Borrow from him.

Working...