Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Cybercrooks descend on Twitter with spam, attacks
Expert: Tweeters Should Use Anti-Virus Protection
By Byron Acohido, USA TODAY
Internet security experts caution that Twitter spam is on the rise.
(ABC News Photo Illustration)Cybercriminals are rapidly using Twitter— the popular Web-messaging service — to direct users to websites that sell porn and fake drugs and trigger promotions for fake anti-virus subscriptions.
"We're starting to see a groundswell of attacks," says Dan Hubbard, chief technology officer at Websense, an Internet security firm. "Spam is usually the first bad thing we see before it escalates to things more nefarious."
An escalation seems inevitable. Anyone can sign up anonymously for a Twitter account and begin pushing unfiltered messages across the Internet.
Another problem: Twitter's intensive use of shortened Web links, or URLs, which let you point to Web pages in short messages. That has made it easy for cybercrooks to spread infectious URLs that can give an attacker control of your PC, says Stefan Tanase, researcher at Kaspersky Lab, which makes anti-virus software.
Related
Twitt-iquette: Top 9 Twitter Faux PasWill Twitter Start Charging For Its Service?Oprah Crowns Kutcher King of TwitterBad URLs have become so prevalent on Twitter in the past several weeks that active Twitterers are seeing several a day.
"The more active a Twitter user is, the more attacks he or she is seeing," says Tanase.
Attackers also are exploiting security weaknesses in popular Twitter add-on services. For example, last week someone cracked photo-sharing service TwitPic and stole Britney Spears' Twitter log-on. The person sent messages, called tweets, to the pop singer's followers saying she had died.
Cybercriminals could easily use similar security flaws in Twitter add-ons to take control of users' PCs, steal their data and hijack their online bank accounts.
Twitter co-founder Biz Stone says Twitter takes malicious attacks seriously.
"We understand that this job is never done, so we are actively recruiting staff and developing tools to combat spam and enhance security," says Stone.
Twitter has issued a list of suggested security practices that add-on developers should follow.
But the advice is "basic information" and lacks any enforcement mechanism, says PandaLabs researcher Sean-Paul Correll.
Pro-Iranian regime hackers invade Oregon computers -http://news.yahoo.com/s/ap/20090624/ap_on_re_us/us_hackers_university_system
By JOSEPH B. FRAZIER, Associated Press Writer Joseph B. Frazier, Associated Press Writer – Wed Jun 24, 5:50 pm ET
PORTLAND, Ore. – Hackers defaced the home page of the Oregon University System, posting a caustic message telling President Barack Obama to mind his own business and stop talking about the disputed Iranian election.
Attempts to access the university system's Web site were automatically redirected to another page, where readers viewed a message said to be from Iran that asserted there was no cheating in the election. That message was up for 90 minutes before university system technicians intervened Wednesday morning
Expect big volume today after super Huge exposure ..
The Michael Baisden show has the highest rating of any urban syndicated afternoon radio show...Educate yourself
CyberWars and Cyber Info pushed to the forefront with the Iran election situation. Will be huge for LIGATT.. We're in the right market at the right time for HUUUUUGE Profits .
http://www.boingboing.net/2009/06/16/cyberwar-guide-for-i.html
YAHOO NEWS .. (For rest of story follow link below)
Every time you swipe your credit card and wait for the transaction to be approved, sensitive data including your name and account number are ferried from store to bank through computer networks, each step a potential opening for hackers. And while you may take steps to protect yourself against identity theft, an Associated Press investigation has found the banks and other companies that handle your information are not being nearly as cautious as they could.
The government leaves it to card companies to design security rules that protect the nation's 50 billion annual transactions. Yet an examination of those industry requirements explains why so many breaches occur: The rules are cursory at best and all but meaningless at worst, according to the AP's analysis of data breaches dating to 2005.
http://finance.yahoo.com/news/AP-IMPACT-Weak-security-apf-15520997.html?.v=2
White House and Secret Service IT and Hacker Woes -
http://abcnews.go.com/Blotter/story?id=7644369&page=1
Idea for Greg - Greg and team should hack that guy from life lock who puts his SS# on commercials, billboards, newspapers etc. and then put out a PR telling of their strength and capabilities ..
Did anyone see MSBC's to catch an ID Thief this weekend ! Could be a great chance to get some pub. .
Hacker breaks into Twitter accounts of Britney Spears and Ashton Kutcher
The micro-blogging service has been the victim of a successful cyberattack for the second time in a matter of weeksNigel Kendall, Technology Editor
A hacker going by the name of Hacker Croll has apparently gained access to an administrator account at the micro-blogging service Twitter.
Posting on a French online discussion forum, Hacker Croll claimed to have hacked into the account of Jason Goldman, one of Twitter’s directors of product management. To back up the claims, he or she posted 13 screenshots of Twitter’s account management interface.
The screenshots suggest that the hacker was able to access the accounts of several celebrity Twitter users, including those of the singer Britney Spears and the actor Ashton Kutcher.
Late on Thursday evening, Twitter made the following statement in its blog.
Related Links
Ten ways to make more of Twitter
Ashton Kutcher out to beat CNN to one million Twitter fans
The 50 most popular celebs on Twitter
“This week, unauthorised access to Twitter was gained by an outside party. Our initial security reviews and investigations indicate that no account information was altered or removed in any way. However, we discovered that 10 individual accounts were viewed during this unauthorised access.
“Personal information that may have been viewed on these 10 individual accounts includes email address, mobile phone number (if one was associated with the account), and the list of accounts blocked by that user. We have personally contacted Twitter users whose accounts were compromised via this unauthorised access.”
The company added that no password information appears to have been changed, and no personal messages viewed.
This is the second time this year that Twitter has been hacked. It seems that Hacker Croll used the same method as the earlier hacker. He or she simply correctly guessed a password based on minimal information about the target.
On March 5 this year, Twitter admitted that 750 Twitter accounts had been broken into and had a link to a webcam site posted on the accounts.
At the time, Twitter issued this advice to its users: “Keep in mind that strong passwords can help prevent hijacked accounts. Twitter offers a password strength indicator to help you choose a strong password when you sign up.” Perhaps now it should issue a memo to the same effect to its own executives.
****Let's get it Greg !!!!!
This will be Atlanta Homicides version of NBC's "To Catch a Predator" Hit Series !!! Huge revenue potential !!
I believe Greg will blow our mind with the SPOOFEM Spinout
Bal ? THink we'll get another PR tommorow further explaining the new products ?
Most computer geeks cant spell their own name..
What company doesn't use models ? And i dont think LIGATT hangs there hat on religion..They dont even really publicise the acronymn ,,
Christian Based = Christian Principles ... Do unto others as you'd have them do unto you , feed the hungry, cloth the naked .. etc etc etc
Conficker worm dabbling with mischief - http://tech.yahoo.com/news/afp/20090428/tc_afp/usitinternetsoftwarecrimemicrosoftconficker_20090428120534
SAN FRANCISCO (AFP) - The Conficker worm's creators are evidently toying with ways to put the pervasive computer virus to work firing off spam or spreading rogue anti-virus applications called "scareware."
An April update sent to a tiny percentage of infected computers had the machines retrieve components of notorious Storm and Waledac worms unleashed in past years to create armies of "botnets" -- automated crime networks -- for spreading spam or scareware.
"It looks like these guys are perhaps testing the waters to see which one of those would be a better money-maker for them," Trend Micro advanced threats researcher Paul Ferguson said Monday of Conficker's masters.
"We have always suspected that the people behind this would not sit idly by without trying to make money off this somehow. Spamming and rogue anti-virus are pretty lucrative for these guys."
Ties to components of Storm and Waledac signal that Conficker's creators were likely involved with the other computer worms, according to security specialists.
"This connects the dots that the same people behind Conficker are the people behind Waledac and Storm," Ferguson said, noting that evidence is pointing to an organized hacker enterprise in the Ukraine.
"These are well-funded organized cyber-criminals in Eastern Europe. They want to steal people's money out of their pockets without being noticed. This same criminal operation is very business savvy."
Hackers are increasingly hiding viruses in bogus computer security software to trick people into installing treacherous programs on machines, Microsoft warned earlier this month.
Rogue security software referred to as "scareware" pretends to check computers for viruses, and then claims to find dangerous infections that the program will fix for a fee.
"The rogue software lures them into paying for protection that, unknown to them, is actually malware offering little or no real protection, and is often designed to steal personal information," Microsoft said.
Hackers have been capitalizing on hype and fear surrounding Conficker to trick people into loading scareware onto computers.
A task force assembled by Microsoft has been working to stamp out Conficker, also referred to as DownAdUp, and the software colossus has placed a bounty of 250,000 dollars on the heads of those responsible for the threat.
The worm, a self-replicating program, takes advantage of networks or computers that haven't kept up to date with security patches for Windows.
It can infect machines from the Internet or by hiding on USB memory sticks carrying data from one computer to another.
Conficker could be triggered to steal data or turn control of infected computers over to hackers amassing "zombie" machines into "botnet" armies.
Ferguson believes Conficker's creators are out for cash, not wanton destruction, but that the worm's spread is a sobering reminder that botnets could be turned against Internet-linked parts of national infrastructures.
"How do you rationalize connecting critical networks to the Internet when those kinds of attacks are possible?" Ferguson asked rhetorically.
"We used to joke that the only guarantee for 100 percent security is a pair of wire cutters."
Producer Will Packer .. Obsessed will debut at number one on the movie charts next week after netting 11M on opening night .. Big time producer that Greg is dealing with
Lee's Final Weekend Predictions
1 Obsessed $18.2 NEW 2514
2 17 Again $13.5 -43% 3255
3 Fighting $12.4 NEW 2310
4 The Soloist $9.8 NEW 2024
5 Earth $8.9 NEW 1804
Imagine the ending scene of the movie ... Greg takes stock from .0001 to $1 +, makes the Forbes List, mentors kids in ATL, secures gov't contracts, and is the foremost expert on cybersecurity who appears on ABC, NBC and FoxNews .. All the peices of the puzzle are in place for a great story. In fact,half of its already happened..
Or a lot more .... $$$ !!!
*Nokia Being Hacked.. Great opp if Greg and team can go solve it
http://tech.yahoo.com/blogs/null/139918
Got an old Nokia 1100 sitting around? You may be sitting on a fortune... albeit with a catch.
Certain circles are said to be paying upwards of $32,000 for the handsets, at least those made in Nokia's Bochum factory in Germany.
Why? According to reports, the criminal underground has found a way to hack into the phones' firmware to allow for illegal bank transfers by reprogramming the phone number on the handset.
Changing the phone number would give hackers the ability to send and receive text messages via the handset, which would in turn open the door for completing basic bank transactions, particularly in Europe.
The details of the hack involve the transmittal of something called a mobile Transaction Authentication Number (mTAN), popular in many overseas countries, which are one-time codes that are sent to customers via text message and are used to complete financial transactions online. Having the mTAN gives hackers the final piece in the puzzle they need (assuming a user ID and password have already been obtained) to drain a bank account under your very nose.
Sounds like the usual criminal shenanigans, but there's a catch... according to an interview with PC World, Nokia says it has no idea why criminals want the 1100 model phones and insists that the software on the phone is not vulnerable to attack -- at least not in any way the company has been able to identify to date.
Meanwhile, Nokia continues to look into the matter, and third-party technology and security outfits are also currently baffled as to how the alleged hack is done -- but many are now also collecting Nokia 1100s for themselves to work on.
Bob..FOr the newbies..Give them a penny stock basic..NITE, L2 etc ... Good Post
How many shares do u have if u dont mind..
i'm sitting tight..never seen a pink with this kind of potential..
New Investors - I would think that folks would be jumping all over this, where else are you gonna get free shares from an already profitable company...Power hour should be HUGE .. This thing is gonna fly sooner than later..The stars have aligned for it
Greg has churches, businesses, entertainers etc signed up with LIGATT .. I'm sure that it's revenues are far beyond any of our wildest expections. This man was the CEO of a company that traded at +13.00 and you can tell by the passion that he has for LIGATT that we are in for something special .. Things are ready to explode..You cant look at the news or tv without hearing something about a cyber attack or security...Pretty soon, Pirates will be hacking into the computers of ships and not jumping on board..
Will it most likely be a future date or today's date ? Thanks
Whats a typical IPO? Could be multiple cents !!! This is the biggest news to date IMO !!!!
How does the spinoff generally work ? is there a specefic cutoff date in which owners of LGTT have to be in possession of the stock or for all future purposes will we get a share of Spoofem ?
This thing is gonna run this PM and tommorow AM... Hold on Tight for that ride to saturn !
Dude..The $300 Google comment was an analogy ... Be realistic and think ..
LIGATT has applied for FED's request for hackers !!
Tonights Interview - Has anyone here ever participated in an InvestorsNation interview session and if the session is limited to 100 participants will we really see a huge jump in publicity ?
I say Jamie Foxx or Martin Lawrence...Somebody who can go from serious to funny and has a big personality
Run Timeline - When this thing finally takes off , where do you guys think it will tapper of and come back down as opposed to .015 last time ...
NUPETrader ... Send me a PM
With all those credentials and with this companies perfect relevance to today's problems with cyber crimes..I cant see how this thing cant take off..
Most def over the .003's.. You must be smokin' that good stuff
Not speaking of you directly... Just making the point that Baisden is the Number One National Syndicated Radio show in the country, and i think that's a big deal. he's def a household name in the urban and middle aged market thats all.. I'm not saying he's Tom Joyner, but he'll be there one day...He also had a tv show that came on TV ONE..Google it. (Michael baisden after dark i believe its called) Good Luck to ALL !
You guys must be hiding under a rock ! THe Mike Baisden show is on par with Tom Joyner etc for radio shows that target urban markets. I listen almost every afternoon ..