Cyberextortion



The New York Times online has an article on the rise of Cyberextortion. Businesses are usually targetted. That was true in the case of the focus of this article.


Apparently the person in question used stolen Internet account information and “pirated wireless access” *(unsecured, open access points?), to threaten the company with the release of lots of information. The FBI was called in but didn’t have the resources to devote much to it, so a private Psychologist was hired to analyze the “stalker”.

There are also mentions of the ties I’ve referred to of the Russian mob and Russian/Eastern Bloc computer hackers. They also point out that former employees should be taken into consideration. (How many businesses go ahead and purge a former employees access capabilities after their departure?)

The person in this article was quite sophisticated, wary of capture and had obtained information from dumpsters(shred those documents and wipe those hard drives), threatened DDoS attacks, etc. He also had hand grenade components and the makings of ricin. This was one dangerous individual. A home grown terrorist of sorts, his target being getting money out of a specific company.

I guess this article is for all those businesses that say, “why should I be concerned about data security we don’t deal with anything secret?”

Related Posts

Blog Traffic Exchange Related Posts
  • Dutch record store chain switching to Novell linux with KDE The dot has an article on a Dutch record chain switching some 1000 desktops over to Novell Linux with the KDE desktop. The Kiosk mode in KDE has been helpful in locking down certain settings and creating a nice controlled environment. It sounds like Point of Sale is the biggest......
  • How embarrasing... Computer security firms database hacked The Washington Times, has a story from Brian Krebs of their Security Fix blog about ... Guidance Software -- the leading provider of software used to diagnose hacker break-ins -- has itself been hacked, resulting in the exposure of financial and personal data connected to thousands of law enforcement officials......
  • Beware emails that sound too good to be true A new phishing scheme is promising tax refunds in the amoutn of over $500 to recipients of the scam. Sophos has an advisory. It looks pretty devious - asking people to type in the link address (or copy and paste) and using URL redirect to make it use an official......
Blog Traffic Exchange Related Websites
  • Blogging Lessons to Make Your Blog Better Blogging is a really great way to keep in contact with your target audience when you work in the Internet Marketing world and it can help you quite a bit in terms of establishing your brand identity within your market. Most Internet Marketers these days, though, aren't making the proper......
  • Enhancing your Business with Blogging Blogging has become an extremely popular activity for businesses, and it also has created a very important impact in other circles as well, including an activity for the political scene as well as for ordinary individuals as well. Google purchased Blogger in 2003, and ever since, blogging has continued to......
  • Phishing, Smishing and Vishing: Tips to Help Your Customers Avoid These Scams It sounds like the title of a nursery rhyme you've never heard of, but phishing, smishing, and vishing are the most prevalent methods of identity theft likely to affect your customers. Your business relationship could be at risk too in the event that it's your information cache that was stolen......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site