IDENTITY THEFT by Daniel Nyari, Illustrator

“This poster design was inspired by the idea that our identities are heavily linked with an online presence. The thumb print acts as the metaphor of identity and each friction ridge extending outwards transforms into computer cables indicating our immediate connection to cyberspace.”

From director Michael Mann, Blackhat stars Chris Hemsworth as a furloughed convict hunting a high-level cybercrime network.


The U.S. wants to slap sanctions on cybercriminals. President Obama issued an executive order Wednesday creating the nation’s first sanctions program to combat “malicious” cyberattacks and cyberspying.

President Obama said cyberthreats pose one of “the most serious economic and national security challenge” to the U.S., and that the executive order offers a “targeted tool” for countering that threat.

The sanctions would apply to individuals and groups involved in cyberattacks that harm or compromise critical infrastructure, steal trade secrets and hobble computer systems, among other things.

U.S. Creates First Sanctions Program Against Cybercriminals

Thomas Trutschel/Photothek via Getty Images

wow so scarlett johansson is going to play major kusanagi in some hollywood travesty of ghost in the shell.

which ghost in the shell exactly? nobody really knows. something based off shirow’s original manga? oshii’s two film versions? the multiple television series? 

is this movie just going to be a vehicle for johansson’s boobs? i’m thinking of GITS SAC Major’s bustier outfit, which only the bravest and most dedicated cosplayers ever attempted to do (gravity defying corset making and body hair waxing for “accuracy”,  employ a lavender hued material or white?, to do the thong or not, etc)….

and here we go with some shitty vehicle for american white supremacist state surveillance propaganda just as real world cybercrime is normalizing itself in united states newsrooms…


if anyone ever wants to do a meditation with me on probably everything the hollywood version will aggressively erase from the series canon, hmu and we can chill and watch that shit.

Middle Schooler Charged With Felony For Changing His Teacher's Computer's Wallpaper

Middle Schooler Charged With Felony For Changing His Teacher’s Computer’s Wallpaper

An eighth grade student from Holiday, Florida, has been charged with serious cybercrimes after he “hacked” his teacher’s school computer and changed the background image as a joke.

According to the Pasco County Sheriff’s Office, the young boy named Domanik Green was charged with an “offense against a computer system and unauthorized access,” a charge normally reserved for hackers and classified…

View On WordPress

Biggest Databreaches & Cyber Attacks of 2014

2014 becomes the year of biggest cyber attacks & world’s giant websites were compromised due to these cyber attacks. These attacks have steal millions of records and money by data breach.

Figure : Top Data Breaches Per Year

Biggest Databreaches and Cyber Attack occurred in 2014

1. eBay Data Breach : World’s biggest online retailer Ebay’s employee’s login credentials have been compromised and around 145M user’s have been affected, eBay have solve this and urge users to change their passwords.

2. Michaels Stores : The POS (Point of Scale System) at Michaels and Aaron Brothers stores have been compromised due to unsophisticated malware, as per company’s report 2.6 Million Credit card number & expiration date information have been stolen.

3. Montana Department of Public Health and Human Services : Some suspicious activity found on “Montana Department of Public Health and Human Services”, around 1.3 Million people’s name, address, birth date & social credentials have been stolen.

4. Variable Annuity Life Insurance Co. : About 774273 customer data of Variable Annuity Life Insurance Co. have been stolen.

5. Spec’s : Texas’s biggest retailer network Spec’s was compromised due to cyber attack, customer name, address, credit card credentials (Expiration date, security code, banking info) were stolen.


REUTERS/Rick Wilking

Seventeen fake cellphone towers were discovered across the U.S. last week, 

according to a report in Popular Science.

Rather than offering you cellphone service, the towers appear to be connecting to nearby phones, bypassing their encryption, and either tapping calls or reading texts. 

Les Goldsmith, the CEO of ESD America, used ESD’s CryptoPhone 500 to detect 17 bogus cellphone towers. ESD is a leading American defense and law enforcement technology provider based in Las Vegas. 

With most phones, these fake communication towers are undetectable. But not for the CryptoPhone 500,  a customized Android device that is disguised as a Samsung Galaxy S III but has highly advanced encryption.

Goldsmith told Popular Science: “ Interceptor use in the U.S. is much higher than people had anticipated. One of our customers took a road trip from Florida to North Carolina and he found eight different interceptors on that trip. We even found one at South Point Casino in Las Vegas.”

The towers were found in July, but the report implied that there may have been more out there.

Although it is unclear who owns the towers, ESD found that several of them were located near U.S. military bases. 

"Whose interceptor is it? Who are they, that’s listening to calls around military bases? Is it just the U.S. military, or are they foreign governments doing it? The point is: we don’t really know whose they are," Goldsmith said to Popular Science.

It’s probably not the NSA — that agency can tap all it wants without the need for bogus towers, VentureBeat reported:

Not the NSA, cloud security firm SilverSky CTO/SVP Andrew Jaquith told us. “The NSA doesn’t need a fake tower,” he said. “They can just go to the carrier” to tap your line.

ComputerWorld points out that the fake towers give themselves away by crushing down the performance of your phone from 4G to 2G while the intercept is taking place. So if you see your phone operating on a slow download signal while you’re near a military base … maybe make that call from somewhere else.

In an amazing coincidence, police departments in a handful of U.S. cities have been operating "Stingray” or “Hailstorm” towers, which — you guessed it — conduct surveillance on mobile phone activity. They do that by jamming mobile phone signals, forcing phones to drop down from 4G and 3G network bands to the older, more insecure 2G band.

Cybercriminals are sneaking past security protections to access online accounts across 34 banks in Switzerland, Sweden, Austria and Japan. And in doing so, experts say, the hackers are defeating what’s often touted as one of the more effective online security protocols.

The attack can get past two-factor authentication, which requires customers to type in a code sent to their cellphone or inbox to ensure the user is who he or she claims to be, by convincing customers to download a malicious smartphone app, according to a report released Tuesday by the security firm Trend Micro. The researchers dubbed the technique “Emmental” — like the Swiss cheese — because they say it shows the security flaws in online banking. So far, funds “in the seven figures” have been taken from bank accounts, according to Trend Micro spokesman Thomas Moore.

Read More

What can you do about ebooks-tree stealing your stuff?

Send a formal order to take down the work from your official email, or the one tied to your pen-name. They have no right to repost your work without your permission, even if it is fanfiction.

You need to make yourself heard, and make them aware you know, though. If you publish fiction or fanfiction on AO3 or other sites, check to see if they have pirated your works, and then inform them to remove it if it’s there. You can also report cybercrime to many government organizations, from the IRS to the FBI. Take action!

Cyber Criminals taking advantage of Malaysia Airlines Flight MH17 Plane Crash News to Bait Users

Recently Malaysian Airlines flight MH17 was crashed by a ground-to-air missile, 283 passenger & 15 crew member were died.

Now, Cyber criminals are taking advantage of this MH17 flight crash news to spread malware and miscellaneous threats.

Cyber researchers of one of the leading antivirus firms “Trend Micro” have first discovered that specious activity on social networking giant Twitter. As Twitter supports #(Hashtag) functionality to trend something world wide, hackers have made use of #MH17 hashtag to lure users who are looking to read news that are related to Malaysian Airlines Flight MH17.

Hundreds of users have twitter and retwitted that spam Tweet which is infected with malware/threats.

Spam Tweet 1

Spam Tweet 2

We are requesting users not to click on this kind of spammy links.