FOREX - Pennystocks :Follow me on Twitter . @jotuk6771
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
LGTT .0007/ ( Ligatt Security International )/ should turn the corner at this level ! IMO
Cheers ! ,0)
LGTT should turn the corner at this level , it's my pick for the challenge - Cheers ,lucy ;0)
Looks like even the Moderator lose faith ...
Sad ...
Top Cyber Security Risks Revealed 15-Sep-09 12:24 pm
Top Cyber Security Risks Revealed
More than half of all cyber attacks hit two key areas: unpatched client-side software and Web applications.
These findings, along with several others, come from a report titled "The Top Cyber Security Risks," which was compiled by The SANS Institute. The report is based on intrusion data from 6000 companies and government agencies using TippingPoint security hardware and on malware data from millions of PCs monitored by Qualys.
The report, to be released on Tuesday, observes that major organizations typically take twice as long to patch application vulnerabilities as operating system vulnerabilities, despite the lower number of attacks on operating system vulnerabilities.
"In other words the highest priority risk is getting less attention than the lower priority risk," the report states.
More than 60% of attack attempts on the Internet target Web applications, the report finds. When successful, subsequent attempts to infect visitors to the breached site become much easier because the users tend to trust the sites they're visiting and often willingly download files from trusted sites, oblivious to the danger of hidden malicious payloads.
More than 80% of the software vulnerabilities being found by security researchers involve Web application flaws that allow attack techniques like SQL injection or Cross-Site Scripting, the report says.
Despite ongoing reports about Web flaws of this sort, the report says, most Web site owners fail to scan effectively for these common vulnerabilities.
The report also notes that zero-day vulnerabilities -- flaws disclosed prior to the availability of a fix -- are becoming more common. "Worldwide there has been a significant increase over the past three years in the number of people discovering zero-day vulnerabilities, as measured by multiple independent teams discovering the same vulnerabilities at different times," the report says. "Some vulnerabilities have remained unpatched for as long as two years."
A shortage of skilled security researchers in both the security industry and in government organizations has made it harder for organizations to defend against these attacks. "So long as that shortage exists, the defenders will be at a significant disadvantage in protecting their systems against zero-day attacks," the report says.
At the same time, the number of people with security skills -- for good or ill -- worldwide is increasing. As evidence of that, the report cites MS08-031 (Microsoft (NSDQ: MSFT) Internet Explorer DOM Object Heap Overflow Vulnerability), which was found independently by three researchers using different approaches.
"The implication of increasing duplicate discoveries is fairly alarming, in that the main mitigation for vulnerabilities of this type is patching, which is an invalid strategy for protecting against zero-day exploits," the report says.
http://www.informationweek.com/news/gove...
HOT!!! Computer network experts test security at conference
HELENA — Brad Smith, director of the Helena-based Computer Institute of the Rockies, says there's a global war going on every day, though most of us are completely unaware of it.
That's because it doesn't involve bullets or bombs or even uniformed armies. But combatants from all corners of the globe are constantly on the attack — a cyber attack that is — on the information systems of our governments, military, corporations and private individuals.
"Computer security gets a D-minus in America," Smith said. "We really don't get security in this country."
This week, dozens of computer network experts from across the country representing a diverse array of interests, including the Montana National Guard, the Idaho National Laboratory, the Federal Reserve and the state Department of Labor and Industry to name a few, are taking part in the Computer Institute of the Rockies' annual Cyber Information Security conference.
"Most people are so naíve about the level of danger on their networks," Smith said. "That's why we bring them here and teach them how to do the attacks so they can learn to protect their networks from those attacks."
On Monday, teams of computer security experts tried their hand at wreaking a little network havoc of their own by taking part in a two-hour Cyber Combat Exercise at the Red Lion Colonial Hotel.
Smith created a simulated Internet environment on a closed network that participants set out to attack. Teams earned 25 points for mapping the network and identifying all of the computers, operating systems, open ports and services running. They got points for changing Web pages around, adding administrative users to Web pages, etc.
Meanwhile, in a room next door, members of the public, security experts and those who were just curious, watched the virtual action on a large project screen as Smith and other top-notch security experts explained how the "attacks" were happening.
Why would legitimate network security experts want to learn how to do a hacker's dirty work?
"Would you go to a prostitute or a Catholic priest for sex advice?" Smith said by way of explanation. "The goal is to show them how hackers attack their network by teaching them how to do it. Once they understand how to do the attacks, we show them how to protect themselves."
http://www.greatfallstribune.com/article...
LGTT - Kind regards , lucy ,0)
LGTT - Currently strongly undervalued - Market Capital $ 1 Million
Congratulations Closedoors, excellent initiative!
But I think that the basher is very too loose and has very too much fear of being identified to take up this challenge!... LMAO
With all my respect, Kind Regards ;0)
P.S : i'm a proud owner of 10,8 Millions shares !... ;0)
And they are not for sale !!!
Watchdog warns of increased cybercrime threat
International experts are sounding the alarm over the increased security risk to the country as it adapts to high speed internet brought home by fibre connectivity.
A new report released exclusively to Business Daily by Team Cymru, an American-based online security watch-dog, reveals that the number of malicious incidents reported on Kenyan sites has increased and predicts that the number of attacks will rise as more companies go online.
“If widespread adoption of broad band connections continues without regard for security implications, Team Cymru believes that over the next couple of years the attacks on the African continent will dramatically rise, facilitating crime not just in Africa, but globally.
Criminals are able to leverage broadband connections to increase their fraud quotient,” said Steve Santorelli, of Team Cymru.
The report, which will be part of an exclusive white paper to be released by Team Cymru later this year, goes on to reveal that while North Africa has been the main source of broadband connections on the African continent with a correspondingly high number of bot-attacks, countries like Kenya are now at high risk as fibre connectivity goes live.
The research measures the number of bot (short for “robot”) attacks on computers in Kenya and shows that on a single day in July, 784 bot attacks were recorded on Kenyan computers. This number can be expected to rise to around 50,000 attacks once fibre connectivity goes live.
A ‘bot’ is a programme that operates as an agent of a user or another programme and simulates a human activity. On the Internet, some bots are malicious programmes which access Web sites and gather information on behalf of their owners.
Team Cymru says that while in the past a large portion of Africa has relied on satellite connectivity for Internet communications.
‘Bot herders’ tend to prefer infecting victim computers with high availability and high bandwidth. Botnets are used for DDoS (Distributed Denial of Service) attacks, stealing victim information, and third party affiliate revenue through “loads”.
A load is a program which is executed on a victim computer through the botnet delivery system. When the program is run the miscreant is paid by the third party affiliate company.
The report goes on to say that as Google and other service providers expand their data centre locations in Africa due to increased bandwidth availability and undersea fibre optic connections, new opportunities for cyber criminals will emerge.
Criminals will be keen to expand their malicious code domains, specifically through botnets.
The news comes against the backdrop of Kenya’s first annual Information Communication Technology & Network Security Conference dubbed Secure ICT which opens today.
This conference seeks to bring together security experts to provide ICT professionals and managers with the latest information on cyber security threats, trends, tools and strategies for protection of critical information technology and communications assets.
The conference will offer two concurrent tracks, Information Security Management and Incident Response and Information Security Technology and Operations.
The sessions on these two track have been carefully selected to address the specific needs of ICT managers and technical staff.
-----------------------------------------
Kind regards ;0)
And you guys think that there is no more than 1 million Market Capitalization for has cybersecurity Company, with debated but nevertheless highly media CEO???....
More than 9 M Americans Hacked each year/ Cost 15,6 BILLIONS $$$ ....
NEW YORK (MarketWatch) -- It happens all the time: You swipe a credit card to buy a new pair of jeans, pay for a fancy dinner or withdraw some cash. Each time a transaction occurs, a flurry of digits and codes moves from one location to another. And each time, you're putting your financial data in jeopardy.
Here's the latest example: On Aug. 17 federal prosecutors charged a man who allegedly stole information for 130 million credit- and debit-card accounts, in what the Justice Department called the largest ever such case.
Restaurant tabletops become computer screens
Tech Diary's Andy Jordan checks out a London restaurant where diners use an "e-table" interactive ordering system complete with an tabletop chefcam.
And incidences like this will only increase, thanks in part to the increased digitization of information, according to security experts and industry professionals.
"This is like a Hydra. There are many, many heads," said Adam Levin, co-founder of Scottsdale, Ariz.-based Identity Theft 911, and a former director of the New Jersey Division of Consumer Affairs.
Levin said there's a "perfect storm" for more identity-theft cases to happen: Companies with budget woes are less likely to invest in protecting consumer data when the economy is still stagnant and the cost of securing information cuts into profits.
In the recent case, Albert Gonzalez, 28, of Miami, and two unidentified Russian conspirators stole credit- and debit-card information from Heartland Payment Systems, a Princeton, N.J.-based payment processor, and 7-Eleven, supermarket chain Hannaford Brothers and two unidentified national retailers. The crimes started in late 2006 and ended in early 2008, according to the indictment. Gonzalez, already in federal custody for a different computer-hacking case, faces up to 35 years in prison for the current case, according to the U.S. Department of Justice. See the Justice Department press release.
That wasn't the only case announced last week. Radisson Hotels and Resorts said hackers broke into its computer system between November 2008 and May 2009 to steal data including guest names, credit- and debit-card numbers and expiration dates. The hotel chain said it doesn't yet know how many customers are affected. The company set up a toll-free hotline and a Web page with more information. See the site.
Who's responsible?
These are just the latest two examples in a long line of identity-theft and fraud cases. The question is who's responsible for preventing this crime, particularly when hackers go after the consumer data that companies store on their servers?
Brian Lapidus, the chief operating officer of Nashville, Tenn.-based Kroll Fraud Solutions, said the responsibility falls on companies. "The business has a responsibility to protect the data they have," he said. "It's their responsibility because there's a level of trust between a business and consumers."
Companies should "treat the data as the valuable asset it is," Lapidus said, adding that preventing breaches before they happen can save money.
Others agreed. As businesses become more information-focused and hackers become more sophisticated, consumer data is at risk, said William Besse, executive director of consulting and investigations at Andrews International, a Los Angeles-based provider of security services.
But consumers also should take measures to protect themselves, Besse said, including updating their computer operating systems, creating complex passwords and backing up files.
Meanwhile, there are a growing number of laws and proposed legislation at the state and national level to protect consumers. In Massachusetts, for example, businesses have until January 2010 to comply with new identity-theft regulations that protect consumers.
Lol, in this case 1/1000, LGTT would have 2 millions shares A/S and 1.35million ??? Traded @ 1 $ ??? ....
ROFLMAO....
Guys , just my 2 cents, R/S or not, LGTT is capitalized now @ a
poor and ridiculous 1 million $ ...
Is this the worth of Market Capitalization what you think is a true value ??? ... LOL
WHAT CAN YOU DO WITH LIGATT SECURITY SUITES
* Find out can a hacker break into your personal or company computer.
* Track an email anywhere in the world.
* Monitor when someone is on or off line.
* Surf the internet anonymously with out leaving any tracks.
* Fake your caller ID.
* SPOOF (fake) emails and text messages.
* Find out if your cell phone is hack proof.
* Run an Internet background check.
* Get anyone’s IP address.
* Social Engineering.
* Find weaknesses hackers can use to hack your computer.
* Scan other people's computers or networks for weaknesses.
* Find news, videos, pictures, blogs, books and other information about you or your target that’s on the Internet that you don’t know.
* Prevent people from tracking you over the internet.
* Learn how to track a hacker.
* Learn how to become a hacker with in 15 minutes.
HOW LIGATT SECURITY CAN HELP LAW ENFORCEMENT
1. Getting a suspects IP Address.
2. Letting you know via text message or email when a suspect is on the internet.
3. Getting access to a suspects cell phone voicemail with 1 phone call.
4. Scanning a suspects computers with vulnerabilities to see if their machine can be hacked. This does not require any warrant.
5. Hacking into a suspect's computer. This requires a warrant.
6. Providing law enforcement the service to call a suspect & have any number show up in the suspects home, cellular or work phone.
7. Getting a WEP or WPA encryption key to a wireless network.
8. Installing spyware remote a suspect's computer.
9. Helping track a spoof caller ID number.
Kind regards ... ,0)
Form T ... not necessarily dilution !...
Just to show you guys , that the several Form T what we saw since weeks ago should not be necessarily imputed to Greg evans , as you can see today a 50k Form T , WHO IS MINE!!!...
LOL,LOLOLOLLL ....
Manipulated close @ .001 when the bid was at @ .0011 , LMFAO ...
When the Gift's distribution will be done , LGTT will surge !
Cheers ! ,0)
Nice dump !....
He's not alone........
PINR - REVERSAL CANDLE - +20% ;0)
Where is your giant sell off , Bashers ? ROFLMAO ;0)
Ok cdnkid10 , People give you the link of the DELAWARE state ,where PGYC is registered , read it, make your own conclusion , hold the stock , sell the stock , Keep waste your time by screaming SCAM ! SCAM !ILLEGAL! ILLEGAL! , it's up to you ...
I will leave the comp now as the market don't want to be open before tuesday.... ;0)
And i bet that the PPS will go up this week , as the record date is past now,,, ;0)
Have a good Memorial Day
Read your own link ...
10 days calendars day prior / > Last date to mail paper materials for timely delivery
All this mess is a giant shake out !
As the the record date was last friday , NOW we can see a major increase of the PPS ... ;0)
GLTA
PROXY RULES .
Posted by: flptrnkng Date: Sunday, May 24, 2009 2:14:45 PM
In reply to: lookingforhelp who wrote msg# 12463 Post # of 12476 [Send a link via email]
It's a Delaware Corp.
Delaware b-law says a meeting is properly noticed if written notice is placed in the mail at least 10 days prior to the meeting (and not more than 60 days prior).
http://delcode.delaware.gov/title8/c001/sc07/index.shtml#222
Good point paulyboy ...
I have 500k @ .015 and i don't worry at all... ;0)
Cheers!
"The enzyme solution provided by EESO is unique in that it doesn't attack the bacteria directly, but rather its food source, forcing it to starve to death rather than potentially resurfacing in mutated form over the long term."
HELLO LUCY, PINR for next week.
Thanks and keep the good job . ,0)
thanks, zambia , but i cannot PM you , i'm not a member . Nevermind.
LMAO , did you also hacked the BIN DAEN group and MARMARA PARTS SITES ? .....
;0)
huh, did you hacked his mailbox'? LOL
Be serious please ....
well, where did you get this information???......
Please zambia , can you explain this in different words , sorry, i speak french and i have difficulties to understand what you are talking about .... Thanks
My favorite post for today . I have the same opinion .
Screaming SCAM SCAM SCAM is just so easy and childish ....
Posted by: tmikey Date: Friday, May 22, 2009 3:04:04 PM
In reply to: speculator777 who wrote msg# 12183 Post # of 12228 [Send a link via email]
My first post here, but I have been holding my shares of PGYC for about a month, and am not quite convinced it's a scam, but am not fully convinced that it's legit, either. In any event, however, the amount that I have invested in it is an amount that I am completely comfortable losing if this whole thing is bogus, and, truly, that is the only advice that needs to be shared by those of you that seek to be the guardians of the poor, helpless, ignorant masses (of which I, evidently, am one). Here, then, is my question for you who feel that you are the definitive bastions of true knowledge in the midst of uninformed fools: Where is today's massive sell-off??????? If we are to trust your credibility and obviously superior reasoning and logic, then the PPS should have already reached well into the .000x range by this point today, should it have not????? With roughly 3-4 times the volume that we're seeing????? Hmmmmmmm, perhaps we're not seeing either of those things because someone in particular is buying up shares and HOLDING THEM, you know, say, like a savvy acquiring entity or something like that. This will be the only post that you will read from me based on this particular subject, even if the deal turns out to be real, either way, good luck to all!
There's nowhere on the banners that PGYC is responsable about the fraudulent copy of the websites ...
Huh, with a daytrader account ?? ....
LMAO , If the buyout is legit , who cares about the current PPS !?
Don't forget that if you sold your shares today , you will be out of the potential buyout as Scottrade confirmed to several traders .....
BLAH...BLAH.... BLAH ,0)
I just see a little 14% loss today at the moment ...
Screaming SCAM SCAM SCAM all the day along for this ? Nice job ...
Lol ,0)
Exactly my point of view ! Cheers! ,0)
Sorry, Alaskanwarrior , but what is your goal here .....?
PLEASE , READ IT AND SPEND 48$ ....
http://www.alacrastore.com/storecontent/Thomson_M&A/Marmara_Motorlu_acquires_Patriot_Energy_Corp-2073985040
Patriot Energy Plagued by Dissident Shareholder ..... LINK
Patriot Energy Corporation (PINKSHEETS: PGYC) announced today that the company stock has been maliciously attached by a dissident shareholder.
According to trading report and recent issuances, it appears that Nino De Santis, the inventor of the company's technology has sold up to 20 million shares into the market creating the adverse affect on the share price and creating a panic sell amongst other shareholders.
"It is well known now that Mr. De Santis is not in favor with the transaction and/or our company, but these attacks need to stop immediately" said Tony Bisante, President and CEO of Patriot Energy Corp. "We have tried to settle with him many times over including issuing him 22 million restricted shares but it is clear that we will need to proceed against in the court of law." Further add Mr. Bisante.
These recent attacks comes shortly after the release of the recent all cash offer of $0.57 per share from Dubai based Marmara.
http://pr-usa.net/index.php?option=com_content&task=view&id=213116&Itemid=33
For what is worth ....