Monthly Archives: January 2018

Ontario man charged over huge cyber crime selling stolen identities

TORONTO (NEWS 1130) – Police believe they’ve nabbed a Toronto area-man responsible for one of the largest cyber crimes in recent memory.

Jordan Bloom, 27, of Thornhill, is accused of selling stolen personal identities through the website LeakedSource.com, a huge online database which apparently made three billion pieces of stolen data available for purchase.

RCMP Staff Sergeant Maurizio Rosa says a lot of the information was obtained through previous well-publicized breaches.

“He was able to then purchase or access those username and credentials that had been stolen, basically, illicitly from those legitimate websites.”

Rosa says people may still be at risk.

“That password if it has been compromised in the past due to illegal or criminal activity may still be used to compromise sites and services that they are still accessing by re-using the same password and/or username.”

Online security expert Dominic Vogel with Cyber SC says one way to protect yourself is to avoid using

Read more at: http://www.news1130.com/2018/01/15/ontario-man-charged-cyber-crime-selling-billions-stolen-identities/

TEEN TALK: How to fight cyber bullying

Video Gallery – WTXL Video Template

TALLAHASSEE, Fla. (WTXL)–Teens are often using social media, but they need to make sure they are doing so in safe way. Family therapist Jane Marks tells us how to avoid cyber bullying. 

1. Educate yourself. 

2. Make sure you and your children protect your accounts and passwords. 

3. Parents, make sure your children keep their pictures as PG as possible. 

4. Parents, make sure you set up privacy controls. 

5. We can stop some forms of cyber bullying, particularly on Facebook. 

6. Parents, Google yourself and your child on a regular basis. 

7. Whenever you see a message from someone that you don’t know, never, ever open it.

8. When using public computers make sure you log out of the accounts.

9. Now, for teens, first understand that cyber bullying is not your fault. 

10. Teens, do not be afraid to reach out for help. 

11. While the ultimate goal is to get your good name

Read more at: http://www.wtxl.com/news/teen-talk-how-to-fight-cyber-bullying/article_f841a54e-fa34-11e7-a861-6312ad1582b5.html

HID Global Partners With ThreatMark For Anti-Fraud Tech

HID Global has announced a new partnership aimed at developing anti-fraud technologies for the financial services sector.HID Global Teams with RD Lab to Develop Anti-Fraud Solutions for Financial Services

Its new partner, ThreatMark, bills itself as an RD lab specializing in malware detection, artificial intelligence, and behavioral biometrics. The firm is based in the Czech Republic and has a London office as well.

In a statement announcing their collaboration, the companies did not offer specifics as to the solutions they will develop, but suggested that their focus would be to develop capabilities that will enable financial institutions to better detect digital threats including “malware, application hacking, phishing, account takeover, identity theft and fraudulent transactions.” HID Global added that its Identity Access Management technologies will “complement ThreatMark’s expertise in cyber-criminal detection and fraud prevention.”

“Working with ThreatMark not only provides a partnership

Read more at: https://mobileidworld.com/hid-global-threatmark-anti-fraud-901154/

Home Ministry: Maintain data of suspects, prepare institutional …


cyber crime, cybercrime, government bill cyber crime, rajnath singh, racial abuse, Cyber Crime laws in india, indian expresscyber crime, cybercrime, government bill cyber crime, rajnath singh, racial abuse, Cyber Crime laws in india, indian express A letter sent by MHA joint secretary Kumar Alok to states and Union territories on January 13 laid down eight-point guidelines to prevent, detect and strengthen the tools to investigate such crimes.

Home Ministry: Maintain data of suspects, prepare institutional mechanism; advisory to states on Cyber crime


cyber crime, cybercrime, government bill cyber crime, rajnath singh, racial abuse, Cyber Crime laws in india, indian expresscyber crime, cybercrime, government bill cyber crime, rajnath singh, racial abuse, Cyber Crime laws in india, indian express A letter sent by MHA joint secretary Kumar Alok to states and Union territories on January 13 laid down eight-point guidelines to prevent, detect and strengthen the tools to investigate such crimes.

Ontario man charged with operating site that pedalled stolen credentials

Canadians don’t think this country as a major source of computer crime, but criminal charges laid against an Ontario man have changed that.

Police charged a Thornhill, Ont. man with allegedly selling stolen personal identities online through the website Leakedsource.com, which allegedly was being hosted in Quebec. The site was raided and closed earlier this month.

Jordan Evan Bloom, 27, made his first court appearance today in a Toronto court to face the charges.

The RCMP said the charges include

  • Trafficking in identity information
  • Unauthorized use of a computer (s. 342.1 of the Criminal Code)
  • Mischief to data
  • and possession of property obtained by crime.

The RCMP said Leakedsources.com alleged had a database of 3 billion pieces of stolen digital information belonging to people around the world, including online user names and passwords.

Related Articles

arrest, handcuff, police, fraud

Canadian threat researchers help take down

Read more at: https://www.itworldcanada.com/article/ontario-man-charged-with-operating-site-that-pedalled-stolen-credentials/400736

Safeguarding your biggest cybersecurity target: Executives – CSO …

Senior executives are among the favorite targets of malicious hackers and other bad actors, in part because they are more likely to hold valuable information — or have a high level of access to such data.

That’s why it’s so important for organizations to make sure C-level officers and other top executives are adhering to the strictest data protection standards and are using appropriate security technologies whenever possible, including when they travel to high-risk locations.

“Executives are targeted for their access and influence within organizations, especially those whose purview includes sensitive financial data or personally identifiable information,” says Wayne Lee, chief cyber security architect at West Monroe Partners, a business and technology consultancy.

Pretty much anyone who has access to information of potential value is at risk of cyber attack, says Steve Durbin, managing director of the Information Security Forum, an independent organization dedicated to investigating and resolving key issues in information security

Read more at: https://www.cso.com.au/article/632177/safeguarding-your-biggest-cybersecurity-target-executives/

Safeguarding your biggest cybersecurity target: Executives – CSO …

Senior executives are among the favorite targets of malicious hackers and other bad actors, in part because they are more likely to hold valuable information — or have a high level of access to such data.

That’s why it’s so important for organizations to make sure C-level officers and other top executives are adhering to the strictest data protection standards and are using appropriate security technologies whenever possible, including when they travel to high-risk locations.

“Executives are targeted for their access and influence within organizations, especially those whose purview includes sensitive financial data or personally identifiable information,” says Wayne Lee, chief cyber security architect at West Monroe Partners, a business and technology consultancy.

Pretty much anyone who has access to information of potential value is at risk of cyber attack, says Steve Durbin, managing director of the Information Security Forum, an independent organization dedicated to investigating and resolving key issues in information security

Read more at: https://www.cso.com.au/article/632177/safeguarding-your-biggest-cybersecurity-target-executives/