Cyberextortion



The New York Times online has an article on the rise of Cyberextortion. Businesses are usually targetted. That was true in the case of the focus of this article.


Apparently the person in question used stolen Internet account information and “pirated wireless access” *(unsecured, open access points?), to threaten the company with the release of lots of information. The FBI was called in but didn’t have the resources to devote much to it, so a private Psychologist was hired to analyze the “stalker”.

There are also mentions of the ties I’ve referred to of the Russian mob and Russian/Eastern Bloc computer hackers. They also point out that former employees should be taken into consideration. (How many businesses go ahead and purge a former employees access capabilities after their departure?)

The person in this article was quite sophisticated, wary of capture and had obtained information from dumpsters(shred those documents and wipe those hard drives), threatened DDoS attacks, etc. He also had hand grenade components and the makings of ricin. This was one dangerous individual. A home grown terrorist of sorts, his target being getting money out of a specific company.

I guess this article is for all those businesses that say, “why should I be concerned about data security we don’t deal with anything secret?”

Related Posts

Blog Traffic Exchange Related Posts
  • How embarrasing... Computer security firms database hacked The Washington Times, has a story from Brian Krebs of their Security Fix blog about ... Guidance Software -- the leading provider of software used to diagnose hacker break-ins -- has itself been hacked, resulting in the exposure of financial and personal data connected to thousands of law enforcement officials......
  • Australia to ask Google Maps to pull images over security concerns According to this article, Australia will ask Google to pull satellite photos of its only Nuclear plant. It's worth noting that several locations in the US Capital are either reduced resolution or blocked out with solid colors. Now that we live in an era of private satellite imagery are services......
  • NY requires businesses to disclose security breaches. The Register writes that New York has passed a law that will require local government agencies and businesses to disclose security breaches. (System broken into or data stolen). I can understand businesses being reluctant to disclose this kind of information. "What will they say about us", "bad reputation", "we'll lose......
Blog Traffic Exchange Related Websites
  • Weekend Personal Finance Review It's time for another weekend of round-ups. I'm taking the next two weekends of round-ups off to get married. Because of this I wanted to give you additional commentary for each article that I've chosen. Ben from Money Smart Life says what he wants for Father's Day. I found this......
  • Seven Techniques You Can Use Twitter To Develop Your Network Promoting Business how to do marketing on twittertwo.Pay out consideration to your twitter marketing username. This is the title that is soon after the twitter.com when you register. I advise either working with your full identify or a catchy name that explains your enterprise and what you do. three.Be confident to full......
  • Securing Your Online Business With Internet Security Today, businesses are taking advantage of the Internet to market and sell their products and services. It is now considered a necessity for businesses to integrate the Internet in their operations in order to effectively compete with other businesses and become the best. The Internet offers many advantages in your......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site