article thumbnail

Ask Fitis, the Bear: Real Crooks Sign Their Malware

Krebs on Security

Prior to that, akafitis@gmail.com was used as the email address for the account “ Fitis ,” which was active on Exploit between September 2006 and May 2007. Intel 471 shows akafitis@gmail.com was used to register another O.R.Z. user account — this one on Verified[.]ru ru in 2008. account on Carder[.]su su from 2008.

article thumbnail

US DoJ indicts Chinese hackers over state-sponsored cyber espionage

Security Affairs

According to the indictment , the alleged hackers targeted more than 45 companies and government agencies from 2006 to 2018 and stole “hundreds of gigabytes” of sensitive data and personal information from its targets. Department of Energy’s Lawrence Berkeley National Laboratory. ” continues the DoJ’s Press release.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

This is the old ChiefTech blog.: Janssen-Cilag Wiki Case Study

ChiefTech

Tuesday, 21 August 2007 Janssen-Cilag Wiki Case Study Here is a great Aussie wiki case study shared by Nathan Wallace from Janssen-Cilag , a pharmaceutical subsidiary of Johnson & Johnson. Please seek advice for specific circumstances. Further Reading Articles and Papers Book Reviews and More Intranet 2.0

article thumbnail

FTC Chairman Jon Leibowitz Appoints Senior Staff

Hunton Privacy

He was formerly an Assistant Director in the Bureau of Competition’s Health Care Services and Products Division, focusing on antitrust enforcement, including anticompetitive practices and mergers involving health care providers and payers, and anticompetitive conduct in the pharmaceutical industry. Department of Justice.

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

Vamosi: In my book, When Gadgets Betray Us , I talked with Dr. Neil Krawetz about keyboard analysis based on a presentation he gave at Black HAt in 2006. He said he was able to look at a chat log, and just on the basis of random typing, or drumming of random letters, he could determine a person’s handedness.