article thumbnail

French court indicted Nexa Technologies for complicity in acts of torture

Security Affairs

The cybersurveillance equipment was used by the Egyptian government to track down opponents. This was based on a survey by the magazine Telerama revealing the sale in March 2014 of surveillance equipment, called Cerebro, that was used against the Muslim Brotherhood. A weapon of choice for authoritarian governments.”

Sales 126
article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

In 2007, Salomon collected more than $3,000 from botmasters affiliated with competing spam affiliate programs that wanted to see Spamhaus suffer, and the money was used to fund a week-long distributed denial-of-service (DDoS) attack against Spamhaus and its online infrastructure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Remarkable Records: Hides and Animal Inspection Records

The Texas Record

HR4875-04 INSPECTION RECORD Record of inspection of each animal or hide sold in the county, leaving the county for sale or shipment, driven in the county for slaughter, slaughtered, or for other reasons as provided by law. From first glance the two series pertain to the same type of record. Does anyone remember this county office?

Sales 52
article thumbnail

Canadian Police Raid ‘Orcus RAT’ Author

Krebs on Security

“The CRTC executed a warrant under Canada’s Anti-Spam Legislation (CASL) and the RCMP National Division executed a search warrant under the Criminal Code respectively,” reads a statement published last week by the Canadian government. government said was used to infect more than a half million computers worldwide. In 2014, the U.S.

Marketing 224
article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

since Q3 of 2007. Government organizations combine the best of both the energy and healthcare industries for scammers, with government entities both having access to sensitive information and being necessary to the day-to-day lives of citizens. This is the same trick business professionals might use to secure a sale (i.e.

article thumbnail

Weekly podcast: ICS attacks, Reddit and SIM swap arrests

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 10 August. This asset was then, it seems, listed for sale on the xDedic black market. This week, we discuss new research into attacks on industrial control systems, Reddit’s recent breach, and an apparent crackdown on SIM swap fraud. Here are this week’s stories.

article thumbnail

Two flavors of software as a service: Intuit QuickBase and Etelos | ZDNet

Collaboration 2.0

QuickBase has more than 320,000 paid seats (and 33,000 unpaid) and more than 50 of the Fortune 100 use it for Project, Supply Chain and/or Sales Team Management, amongst other uses. This marketplace driven approach is intended to provide not only infrastructure to enterprises, but also sales channels.