Cyberextortion



The New York Times online has an article on the rise of Cyberextortion. Businesses are usually targetted. That was true in the case of the focus of this article.


Apparently the person in question used stolen Internet account information and “pirated wireless access” *(unsecured, open access points?), to threaten the company with the release of lots of information. The FBI was called in but didn’t have the resources to devote much to it, so a private Psychologist was hired to analyze the “stalker”.

There are also mentions of the ties I’ve referred to of the Russian mob and Russian/Eastern Bloc computer hackers. They also point out that former employees should be taken into consideration. (How many businesses go ahead and purge a former employees access capabilities after their departure?)

The person in this article was quite sophisticated, wary of capture and had obtained information from dumpsters(shred those documents and wipe those hard drives), threatened DDoS attacks, etc. He also had hand grenade components and the makings of ricin. This was one dangerous individual. A home grown terrorist of sorts, his target being getting money out of a specific company.

I guess this article is for all those businesses that say, “why should I be concerned about data security we don’t deal with anything secret?”

Related Posts

Blog Traffic Exchange Related Posts
  • Zoneminder for a linux based home security DVR system This is filed under security, but a slightly different angle than the usual computer security articles. I just ran across a link I've kept to Zoneminder. Zoneminder is a neat linux application to help you setup your very own DVR (digital video recorder) for a security camera type (CCTV ?)......
  • Australia to ask Google Maps to pull images over security concerns According to this article, Australia will ask Google to pull satellite photos of its only Nuclear plant. It's worth noting that several locations in the US Capital are either reduced resolution or blocked out with solid colors. Now that we live in an era of private satellite imagery are services......
  • Ap coverage of hacker convention Apnews has an article on the recent "hacker convention" in Las Vegas. In typical media fashion they paint with a broad brush to display it as "a no-mans land where customary adversaries, feds vs. digital mavericks are supposed to share ideas about making the internet safe." In reality, realize that......
Blog Traffic Exchange Related Websites
  • Boomer and Retirement Weekly Reader - Home Repair Edition This past week contractors finished several projects on the exterior of our Tennessee home: painting, Dryvit repair, and brick repair. These are just the beginning of a long list of repair and renovation tasks that need to be completed before we consider selling and downsizing. Although we are unlikely to......
  • Blogging Lessons to Make Your Blog Better Blogging is a really great way to keep in contact with your target audience when you work in the Internet Marketing world and it can help you quite a bit in terms of establishing your brand identity within your market. Most Internet Marketers these days, though, aren't making the proper......
  • Review: John Warrillow “Built to Sell: Turn Your Business Into One You Can Sell” If you want to succeed with your own business, you need to build a business that can sell. When you have built a company that is successful enough to be bought and sold, you can know that you have found a successful strategy for your business. “Built to Sell: Turn......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site