Cyberextortion



The New York Times online has an article on the rise of Cyberextortion. Businesses are usually targetted. That was true in the case of the focus of this article.


Apparently the person in question used stolen Internet account information and “pirated wireless access” *(unsecured, open access points?), to threaten the company with the release of lots of information. The FBI was called in but didn’t have the resources to devote much to it, so a private Psychologist was hired to analyze the “stalker”.

There are also mentions of the ties I’ve referred to of the Russian mob and Russian/Eastern Bloc computer hackers. They also point out that former employees should be taken into consideration. (How many businesses go ahead and purge a former employees access capabilities after their departure?)

The person in this article was quite sophisticated, wary of capture and had obtained information from dumpsters(shred those documents and wipe those hard drives), threatened DDoS attacks, etc. He also had hand grenade components and the makings of ricin. This was one dangerous individual. A home grown terrorist of sorts, his target being getting money out of a specific company.

I guess this article is for all those businesses that say, “why should I be concerned about data security we don’t deal with anything secret?”

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security guide for the home or small business network - Part 9 - Know your network Once more into the breech... Ok you've taken account of the software and services on your pc. The next thing we need to talk about is knowing your network. Do you have any wireless access points? Not sure? Print servers? How many pcs? Are any of them portables? Public access?......
  • Windows more secure than Linux? For the last week, I've seen various headlines referring to a report from US-CERT that indicated 2005 had 5,198 security flaws reported. Out of those 2,328 were reported for Linux/Unix, 812 for Windows and 2,058 affecting more than one operating system. Now, I'm seeing all sorts of headlines about how......
  • Zoneminder for a linux based home security DVR system This is filed under security, but a slightly different angle than the usual computer security articles. I just ran across a link I've kept to Zoneminder. Zoneminder is a neat linux application to help you setup your very own DVR (digital video recorder) for a security camera type (CCTV ?)......
Blog Traffic Exchange Related Websites
  • Golden Rules of Product Marketing Success If you would like to promote your business online, check out these ten valuable internet marketing tips for you: Set definite goals. There are a variety of website marketing strategies that you can choose from. Before taking action, it’s important to clearly define your purpose. For example, would you......
  • Seven Techniques You Can Use Twitter To Develop Your Network Promoting Business how to do marketing on twittertwo.Pay out consideration to your twitter marketing username. This is the title that is soon after the twitter.com when you register. I advise either working with your full identify or a catchy name that explains your enterprise and what you do. three.Be confident to full......
  • The Very Best Way To Make Money Online With Informational Products I am positive that if you are visiting this page, you will be interested in prose theme review. There is a lot involved with selling info products online, and perhaps the two most important points is to learn about how to do it plus take action on it. What we......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site