IDENTITY THEFT by Daniel Nyari, Illustrator

“This poster design was inspired by the idea that our identities are heavily linked with an online presence. The thumb print acts as the metaphor of identity and each friction ridge extending outwards transforms into computer cables indicating our immediate connection to cyberspace.”

From director Michael Mann, Blackhat stars Chris Hemsworth as a furloughed convict hunting a high-level cybercrime network.


The U.S. wants to slap sanctions on cybercriminals. President Obama issued an executive order Wednesday creating the nation’s first sanctions program to combat “malicious” cyberattacks and cyberspying.

President Obama said cyberthreats pose one of “the most serious economic and national security challenge” to the U.S., and that the executive order offers a “targeted tool” for countering that threat.

The sanctions would apply to individuals and groups involved in cyberattacks that harm or compromise critical infrastructure, steal trade secrets and hobble computer systems, among other things.

U.S. Creates First Sanctions Program Against Cybercriminals

Thomas Trutschel/Photothek via Getty Images
gulflive.comVancleave woman scammed out of $2300 by threatening phone callSunHerald.comJACKSON COUNTY – A Vancleave woman was the victim of a phone scam Monday by a number with a Virginia area code, authorities said. Sheriff Mike Ezell said the woman received a call from 804-818-6401 by a man who identified himself as Kevin Miller.Vancleave woman loses thousands in IRS phone (blog)all 2 news articles »

wow so scarlett johansson is going to play major kusanagi in some hollywood travesty of ghost in the shell.

which ghost in the shell exactly? nobody really knows. something based off shirow’s original manga? oshii’s two film versions? the multiple television series? 

is this movie just going to be a vehicle for johansson’s boobs? i’m thinking of GITS SAC Major’s bustier outfit, which only the bravest and most dedicated cosplayers ever attempted to do (gravity defying corset making and body hair waxing for “accuracy”,  employ a lavender hued material or white?, to do the thong or not, etc)….

and here we go with some shitty vehicle for american white supremacist state surveillance propaganda just as real world cybercrime is normalizing itself in united states newsrooms…


if anyone ever wants to do a meditation with me on probably everything the hollywood version will aggressively erase from the series canon, hmu and we can chill and watch that shit.

Middle Schooler Charged With Felony For Changing His Teacher's Computer's Wallpaper

Middle Schooler Charged With Felony For Changing His Teacher’s Computer’s Wallpaper

An eighth grade student from Holiday, Florida, has been charged with serious cybercrimes after he “hacked” his teacher’s school computer and changed the background image as a joke.

According to the Pasco County Sheriff’s Office, the young boy named Domanik Green was charged with an “offense against a computer system and unauthorized access,” a charge normally reserved for hackers and classified…

View On WordPress

REUTERS/Rick Wilking

Seventeen fake cellphone towers were discovered across the U.S. last week, 

according to a report in Popular Science.

Rather than offering you cellphone service, the towers appear to be connecting to nearby phones, bypassing their encryption, and either tapping calls or reading texts. 

Les Goldsmith, the CEO of ESD America, used ESD’s CryptoPhone 500 to detect 17 bogus cellphone towers. ESD is a leading American defense and law enforcement technology provider based in Las Vegas. 

With most phones, these fake communication towers are undetectable. But not for the CryptoPhone 500,  a customized Android device that is disguised as a Samsung Galaxy S III but has highly advanced encryption.

Goldsmith told Popular Science: “ Interceptor use in the U.S. is much higher than people had anticipated. One of our customers took a road trip from Florida to North Carolina and he found eight different interceptors on that trip. We even found one at South Point Casino in Las Vegas.”

The towers were found in July, but the report implied that there may have been more out there.

Although it is unclear who owns the towers, ESD found that several of them were located near U.S. military bases. 

"Whose interceptor is it? Who are they, that’s listening to calls around military bases? Is it just the U.S. military, or are they foreign governments doing it? The point is: we don’t really know whose they are," Goldsmith said to Popular Science.

It’s probably not the NSA — that agency can tap all it wants without the need for bogus towers, VentureBeat reported:

Not the NSA, cloud security firm SilverSky CTO/SVP Andrew Jaquith told us. “The NSA doesn’t need a fake tower,” he said. “They can just go to the carrier” to tap your line.

ComputerWorld points out that the fake towers give themselves away by crushing down the performance of your phone from 4G to 2G while the intercept is taking place. So if you see your phone operating on a slow download signal while you’re near a military base … maybe make that call from somewhere else.

In an amazing coincidence, police departments in a handful of U.S. cities have been operating "Stingray” or “Hailstorm” towers, which — you guessed it — conduct surveillance on mobile phone activity. They do that by jamming mobile phone signals, forcing phones to drop down from 4G and 3G network bands to the older, more insecure 2G band.
The Rock River TimesMadigan sues companies of student loan debt scamsThe Rock River TimesIllinois’ Attorney General is suing five companies she says were involved in student loan debt scams. The scams snag victims with large upfront fees to settle their debt using programs that are widely available for free from the federal government …Illinois sues 5 companies for student loan repayment scams Belleville News-Democratall 48 news articles »

Cybercriminals are sneaking past security protections to access online accounts across 34 banks in Switzerland, Sweden, Austria and Japan. And in doing so, experts say, the hackers are defeating what’s often touted as one of the more effective online security protocols.

The attack can get past two-factor authentication, which requires customers to type in a code sent to their cellphone or inbox to ensure the user is who he or she claims to be, by convincing customers to download a malicious smartphone app, according to a report released Tuesday by the security firm Trend Micro. The researchers dubbed the technique “Emmental” — like the Swiss cheese — because they say it shows the security flaws in online banking. So far, funds “in the seven figures” have been taken from bank accounts, according to Trend Micro spokesman Thomas Moore.

Read More

New Post has been published on Premier Computer

New Post has been published on

How to protect yourself against cybercrime in 2015


How to protect yourself against cybercrime in 2015

There has always been the need to protect your computer from vicious malware and spyware attacks. In this age, cybercriminals are becoming increasingly sophisticated in the methods they use to steal data. Never before has computer security been so important.

Here are a few of the major cybercrime attacks to look out for in 2015:

1. Ransomware

Experts expect to see a rise in something called ‘ransomware’. This involves scammers locking your device and asking for a payment to unlock it.

2. Targeted attacks

An increase in more sophisticated, targeted attacks is also expected. In other words, criminals will hand-pick individuals corresponding to how much data they share online, rather than casting out a net and hoping that somebody will bite.

3. Social media malware

With the ever increasing use of social media, more and more criminals will abuse social media to scam people. This might be in the form of malicious videos, as well as malicious links within videos.

4. Open source code

Remember the Heartbleed and Shellshock attacks? Experts expect to see a similar incident happen again in 2015. Cybercriminals will seek vulnerabilities in source code to carry out their malicious activities.

5. Apple malware

Apple market themselves as being one of the safest providers around. But don’t get complacent because iOS users will also be vulnerable to attack this year.

However, there are several security measures that users can put into place to protect themselves against cybercrime:

• Install antivirus software and a firewall on your device
• Back up all of your files regularly using the cloud and remote storage
• Do not click on links that appear suspicious
• Make sure your passwords are strong
• Use encryption software to protect devices
• Enable remote wiping
• Keep devices somewhere thieves can’t get to them

As long as you follow these simple steps, you shouldn’t have a problem. Implement the measures above and be on the look out for the cybercrimes that are predicted for 2015 to make sure that you don’t become a victim.

The best way to protect data from prying eyes is to destroy them, this is the thought of criminals when law enforcement is investigating on them.

The best option for crooks it to completely wipe their electronic equipment before law enforcement seize them to conduct a forensic analysis. The last idea of criminal crews is to use the USBKill to quickly clean their machines from any evidence that could bring them in the jail.

Read Full Article Here

Follow us:  Hakon India Facebook |  Twitter |  Linkedin

Older internet folk (that is, people who have been on the internet for a while, not people who are old and on the internet) have the distinction in their minds that the internet is not real life and thus has different rules.

I grew up on the goddamn internet, I spent more of my free time on it than off it, and I don’t treat it like real life. The rules are different, the interactions are different, and the consequences are different.

The new generation, though, they don’t have the distinction in their minds for some reason. To them, the internet is the same as real life. I don’t know why they feel this, but they do. They never had the “this isn’t real so it doesn’t really matter” feeling that existed back then.

So most people on /v/ could, for example, call someone a cunt and threaten to burn their house down and rape their dog, or RECEIVE threats like that, and not treat it all seriously because it’s the internet and it doesn’t matter. But if you were out in the street and someone ran up and said it to your face, you’d treat it a lot more seriously.

The newer generation treat them both the same; you call someone a whore, or you insult them, or you threaten to kill them, and their brain registers it exactly the same as if you’d knocked on their door and shouted it in their face when they answered it.

The entire internet’s culture has changed to accommodate this new breed of internet user. It’s why people like Anita actually have an audience, it’s why server admins feel fully justified in banning someone for being mean, and it’s why the police are suddenly interested in taking action against online death threats even though, if anything, they’ve gotten LESS serious over the past decade.

—  /v/ Anon on the Internet versus Reality