SIDNEY — Deputies of the Shelby County Sheriff’s Office are warning area residents to be extra cautious about who they “friend” on social media platforms as a result of a “sextortion” case they are investigating involving a Shelby County student.
Deputies report the victim was being threatened by an unknown person regarding sending nude photos of the student, which the suspect had obtained by gaining access to the victim’s cellular phone. The suspect also reportedly took over the student’s Snapchat, Twitter and Facebook accounts and then began posting as that person.
Once the suspect gained control of the social media accounts, the individual began demanding between $500 to $750 to end the sending of nude photos and to give the student access to the social media accounts again.
As the investigation continued, deputies were able to identify the location of the IP address. They advise that anyone with the following contacts in their
The Internal Revenue Service (“IRS”), along with state tax agencies and the tax industry, recently issued a warning to employers about increasingly prevalent “phishing” email scams targeting the W-2 tax form information of employees.
The IRS’s warning comes at the peak of the tax season, when employers are providing their workforces with annual W-2 tax forms. While cyber criminals use a host of techniques to steal sensitive and personal information from organizations and individuals, the specific scheme being warned of involves a cyber criminal posing as an employee or officer of an organization and requesting via email that another employee—usually in the payroll department—send them employees’ W-2 forms. In many cases, the cyber criminal will identify a high-level individual at the organization to impersonate, such as a C-suite executive or school administrator, increasing the likelihood that the payroll employee will comply with the request and provide the
LCA president-elect Arthur Moses SC spoke last Friday at the Senate Legal and Constitutional Affairs Committee’s hearing on the adequacy of existing offences in the Commonwealth Criminal Code and of state and territory criminal laws to capture cyber bullying.
In his opening statement to the committee, Mr Moses remarked on the tragedy of recent teenage deaths due to cyber bullying, such as the suicide of 14-year-old Amy ‘Dolly’ Everett.
He welcomed the opportunity to contribute to the inquiry as the committee looks for better ways to prevent cyber bullying, but noted that criminal penalties are just one way of addressing the problem.
“Ensuring that the criminal justice system includes adequate offences to combat cyber bullying is one important tool for society,” Mr Moses said.
“There are also other equally important tools, including education, victim support, early intervention and prevention, including civil avenues.”
On the proposed introduction of a new federal offence for the broadcasting of
It has been discovered that the cyber hacking group Turla is targeting the UK with updated variants of Neuron and Nautilus, a type of malware designed to embed itself into compromised networks and stealthily conduct espionage. The UK’s National Cyber Security Centre (NCSC) has issued a warning that Turla is deploying a new version of Neuron which has been modified to evade discovery. IT security experts commented below.
“Critical infrastructure is the soft underbelly of any developed society, and the UK has indeed been lucky to escape the wave of attacks in countries around the world.
An attack on energy, transport, finance or health infrastructure will have a serious economic impact on a nation and can easily threaten human lives. Energy infrastructure in particular is especially vulnerable, with malware such as Trisis, BlackEnergy and Stuxnet causing emergency shutdowns.
With the growing trend of financially-motivated cyber crimes, information security experts at the Hong Kong Productivity Council (HKPC) urges enterprises and the public to strengthen their defence against ransom-based cyber attacks.
HKPC issued the advice after its Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) reported a 7% rise in security incident reports in Hong Kong in 2017, totalling 6,506, as compared to 2016. For the second successive year, Malware cases (2,041 cases or 31%) saw the biggest surge, rising by 79%, and joined Botnet (2,084 cases or 32%) and Phishing (1,680 cases or 26%) as the principal sources of the reports.
Among all malware reports, despite fewer Ransomware incident reports (178 cases) were made to HKCERT last year, there were 1,210 bot-Wannacry cases. These involved large number of computers being infected by the notorious Wannacry ransomware that rocked the world last May, but encryption was yet to be triggered.
The report highlights eight potential “flashpoints” that organisations should monitor as part of their cyber threat intellingence gathering processes.
These include the adoption by countries such as China, Iran and North Korea of the “Russian model” of engaging in “cyber influence operations” by proxies, resulting in exposure from such a campaign.
The report also notes that Kinetic attacks on the Korean peninsula loom, as does the possibility that this could be accompanied by cyber attacks, and that Russia is battling election interference accusations while tightening info control within its borders to the extent of building a separate Domain Name System (DNS) model that can also be used by other restrictive powers.
Flashpoint’s 2018 threat matrix shows that China, Russia and the “Five Eyes” countries have highest level of technical sophistication [tier 6], with state and non-state actors capable of engaging in full-spectrum operations, utilising the
“The nature of its capabilities to intrude on privacy by building patterns of travel and the provision of imagery should not be underestimated,” he said, adding that it is also widely used by agencies other than the police.
Edmund King, AA president, said: “Whilst most law abiding citizens will accept the police use of ANPR to target criminals and potential terrorists, many will question the use by local authorities or private parking companies.
“Parking companies and some local authorities seem to use ANPR as if car number plates were bar codes on groceries, used to harvest fines on an industrial scale without proper targeting or efforts to improve signage or layout.”
Mr Porter also called for number plates to be produced by just a handful of official suppliers like passports, to avoid illegal registrations on British roads.