article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

Spamit), an invite-only community for Russian-speaking people in the businesses of sending spam and building botnets of infected computers to relay said spam. From January 2005 to April 2013, there were two primary administrators of the cybercrime forum Spamdot (a.k.a The Spamdot admins went by the nicknames Icamis (a.k.a.

article thumbnail

US DoJ indicts Chinese hackers over state-sponsored cyber espionage

Security Affairs

aka Baobeilong, aka Zhang Jianguo, aka Atreexp, both nationals of the People’s Republic of China (China), with conspiracy to commit computer intrusions, conspiracy to commit wire fraud, and aggravated identity theft was announced today. , aka Afwar, aka CVNX, aka Alayos, aka Godkiller; and Zhang Shilong (???),

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. The invention of the transistor in 1947 can be considered the seed for the Information Revolution, because the transistor is at the heart of every electronic device used today! Figure 2: Information Explosion.

article thumbnail

This is the old ChiefTech blog.: The Circle of Computing Life

ChiefTech

©2005-2009. Sunday, 1 July 2007 The Circle of Computing Life I came across a great book a few weekends ago, called A Computer Called LEO , that tells the story of the first computer to be used by business. However, you need to come over and see my new blog at chieftech.com.au.

article thumbnail

New Class Action Complaint Alleges Privacy Violations by ISP Using NebuAd Device

Hunton Privacy

A class action complaint filed on December 9, 2009, in Illinois federal court alleges that WideOpen West, Finance, LLC ("WOW"), an Internet service provider, violated its users’ privacy by "installing spyware devices on its broadband networks." " Valentine v. WideOpen West (N.D. 1:09-cv-07653).

article thumbnail

Hewlett-Packard/Autonomy Deal Results in More Indictments: eDiscovery Trends

eDiscovery Daily

Lynch used false and misleading statements from 2009, 2010 and early 2011 “to make Autonomy more attractive to a potential purchaser like HP,” according to the indictment, which says Lynch made $815 million when HP acquired his Autonomy shares. Lynch’s lawyers called the indictment a travesty, saying it shouldn’t have been brought in the U.S.

article thumbnail

HHS Settles First HIPAA Enforcement Action Against a State Agency

Hunton Privacy

The settlement relates to the theft of a portable electronic storage device potentially containing electronic protected health information (“ePHI”) from the car of a DHSS computer technician in October 2009. View the HHS resolution agreement.