"Botnet" Investigation Led by U.S. Secret Service’s Electronic Crimes Task Force and the Computer
Hacking and Intellectual Property Unit of the U.S. Attorney’s Office
SAN JOSE – United States Attorney Kevin V. Ryan announced that Anthony Scott Clark, 21, of Beaverton, Oregon, pleaded guilty...
The United States Attorney for the Northern District of California announced that Suibin Zhang, 37, of San Jose, California, was charged late yesterday by a federal grand jury in San Jose in a nine-count indictment alleging computer fraud; theft and unauthorized downloading of trade secrets; and the unauthorized...
Caused As Much As $20 Million in Losses to Software Industry
WASHINGTON, D.C.—The owner of one of the largest for-profit software piracy websites to operate in the United States has pleaded guilty to operating a software piracy website, Assistant Attorney General Alice S. Fisher for the Justice Department's...
Internet-related crime,
like any other crime, should be reported to appropriate law enforcement investigative
authorities at the local, state, federal, or international levels, depending
on the scope of the crime. Citizens who are aware of federal crimes
should report them to local offices...
Marcia Wilson- BankInfoSecurity.com Editor
In the year 2005, there were over 53 million individuals affected by security breaches wherein their personal information was compromised. The ChoicePoint incident was considered one of the first highly publicized events where notification to the individuals affected was...
Pete Boergermann - BankInfoSecurity.com Contributor Gone are the days when we could just throw a hub on a closet shelf, run a few network cables, connect some PCs and a server to it and have a network. Logs? What logs? Why would we want to look at them? Times have changed and most devices connected to your network...
Andrew Miller - BankInfoSecurity.com Editor
In October, the Federal Financial Institutions Examination Council (FFIEC) issued guidance for authentication in the Internet banking environment. Financial institutions are expected to achieve compliance by year-end 2006. The guidance states: "The agencies consider...
How likely are you to be wooed into a false sense of security by a friendly face or the promise of a cash prize?A friendly, wholesome-looking team of surveyors recently set up shop in New York’s Central Park on behalf of RSA Security to find out how much personal information consumers would give up while...
HISTORY
Nine additional units will be added to a program called CHIP (Computer
Hacking and Intellectual Property) that has proven successful in Northern
California. That project demonstrated the benefits of a unit of prosecutors
working closely with the FBI and other agencies to...
Enacted in the USA Patriot Act of 2001 - star rule
Section 202 Authority to Intercept Voice Communications in Computer Hacking Investigations
Previous law: Under previous law, investigators could not obtain a wiretap order to intercept wire communications (those involving the human voice) for violations of the...
In our ten years’ experience in detecting, locating, and prosecuting network intruders (hackers) we have seen that, as with many offline crimes, robust law enforcement alone cannot solve the network intruder problem. To be effective, any overall strategy must include the owners and operators of the...
To the Board of Directors Federal Deposit Insurance Corporation:
We reviewed information systems general controls[Footnote 1] in connection with our calendar year 2001 financial statement audits of the Federal Deposit Insurance Corporation’s (FDIC) Bank Insurance Fund, Savings Association Insurance...
In addition, GAO is committed to fulfilling the objectives of the Federal Financial Management Improvement Act of 1996. Although not subject to FFMIA, GAO voluntarily complies with its requirements. We believe that we have implemented and maintained financial systems that comply substantially with federal financial...
Think identity theft is the work of faceless cyber-crooks from foreign countries? Think again. Almost half of all ID theft is committed by relatives or close friends of the victim, new research shows.  The surprising information comes from a recent poll of 4,000 consumers conducted by a group led by the...
Give criminals credit for adapting. It has become clear that stealing personal information is easier, more profitable, and less risky than mugging or burgling them. Unfortunately, the effect of this realization on the criminal community is that phishing and identity theft continue their astonishing...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.