article thumbnail

US DoJ indicts Chinese hackers over state-sponsored cyber espionage

Security Affairs

aka Baobeilong, aka Zhang Jianguo, aka Atreexp, both nationals of the People’s Republic of China (China), with conspiracy to commit computer intrusions, conspiracy to commit wire fraud, and aggravated identity theft was announced today. , aka Afwar, aka CVNX, aka Alayos, aka Godkiller; and Zhang Shilong (???),

article thumbnail

Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe

Krebs on Security

A Minnesota cybersecurity and computer forensics expert whose testimony has featured in thousands of courtroom trials over the past 30 years is facing questions about his credentials and an inquiry from the Federal Bureau of Investigation (FBI). Lanterman’s LinkedIn profile that has a degree from Harvard University.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

Spamit), an invite-only community for Russian-speaking people in the businesses of sending spam and building botnets of infected computers to relay said spam. From January 2005 to April 2013, there were two primary administrators of the cybercrime forum Spamdot (a.k.a The Spamdot admins went by the nicknames Icamis (a.k.a.

article thumbnail

This is the old ChiefTech blog.: The Circle of Computing Life

ChiefTech

©2005-2009. Sunday, 1 July 2007 The Circle of Computing Life I came across a great book a few weekends ago, called A Computer Called LEO , that tells the story of the first computer to be used by business. However, you need to come over and see my new blog at chieftech.com.au.

article thumbnail

This is the old ChiefTech blog.: Explosion of electronic touch points

ChiefTech

©2005-2009. Wednesday, 31 January 2007 Explosion of electronic touch points I received an email today from someone and, as you typically find in a business email, the senders signature block included their contact details. However, you need to come over and see my new blog at chieftech.com.au. which country).

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

Quantum computing attacks already present a real threat to existing standards, making the continued development of encryption pivotal for years to come. Cryptology is the overarching field of study related to writing and solving codes, whereas encryption and decryption are the central processes driving the computer science discipline.

article thumbnail

New Class Action Complaint Alleges Privacy Violations by ISP Using NebuAd Device

Hunton Privacy

A class action complaint filed on December 9, 2009, in Illinois federal court alleges that WideOpen West, Finance, LLC ("WOW"), an Internet service provider, violated its users’ privacy by "installing spyware devices on its broadband networks." " Valentine v. WideOpen West (N.D. 1:09-cv-07653).

Privacy 40