Two high school football players in Steubenville, Ohio are under arrest for the sexual assault of a 16-year-old girl. Newly leaked video sheds more light on what may have happened to a girl who told police she was raped by these high school football players in August.
Trent Mays and Ma’lik Richmond- have been arrested and charged with raping a fellow 16-year-old, taking her to a number of parties when she was too drunk to resist, digitally penetrating her and possibly even urinating on her.
A small group of information activists was able to do what 3 Ohio state law enforcement agencies couldn’t. The clip, released this week by an Anonymous cell calling itself “Knight Sec” is reported to show former Steubenville, Ohio high school athlete Michael Colin Nodianos bragging about the sexual assault from a friend’s apartment. On the video which recently was posted online, the boys joke about the girl appearing “dead”.
On their website, called Local Leaks: The Steubenville Files, they said that they took up the cause since “a town rife with corruption, cronyism, illegal gambling and fixated upon their star high school football team were prepared to orchestrate a major cover-up in order to sweep the entire affair under the rug.”
Their trial before an Ohio juvenile court judge is scheduled for February 13. The rapists themselves, and their so-called rape crew, think they’re untouchable. The rules don’t apply to them.
This video is not the first time hackers have published information about people connected with the case. Knight Sec, working with other Anonymous hackers, took over a fan site dedicated to the Steubenville football team and demanded anyone involved come forward and apologize for their actions.
A peaceful demonstration in support for the alleged victim is scheduled for January 5 at Steubenville City Hall.
Original post at – thehackernews
Thanks for reading. hope it might helped you.
The Top 5 Cyber Security Threats That Could Affect Your Life–
Our electronic devices are such a big part of our lives today that it’s hard to imagine what we once did without them. But our constant use of technology to keep in touch, pay bills, stay on top of the news, shop and research things has a downside: Our data can be exposed to criminals who commit crimes such as identity theft and credit card fraud – unless we take the proper precautions. Our growing reliance on electronic devices is part of the reason why careers in cyber security are growing at a faster pace. Jobs in information security, web development and computer network architecture – three fields at the forefront of cyber security – are expected to grow 22% between 2010 and 2020. Understanding the threats can help everyone do their part to make those jobs easier. Here are five top cyber security threats and tips on how to protect yourself against them, according to experts.
1. Malware and Bots
If you’ve ever spent a frustrating afternoon calling a help line to tackle a computer virus, then you know how pesky malicious software – or malware, for short – can be. Malware also includes nuisances like spyware, which allows digital hackers to track your every move and to view the passwords you are entering, according to the National Cyber Security Alliance, an organization focused on educating the public about how to use the Internet safely. Typically consumers get tricked into downloading malware by accident, when for instance they click on a rogue website or try to download what seems to be free software, like a screen saver. When criminals use malware to take control of individuals’ computers remotely to perpetrate financial crimes or attack computer networks and websites, the setup is known as a botnet.
Further, “malware can be spread by your Friends on social networking sites like Facebook,” says, Linda McCarthy, cyber security expert, former senior director of Internet safety at Symantec and author of Own Your Space: Keep Yourself and Your Stuff Safe Online. You need to think about that link your Friend is telling you to click on. Is that really a Friend sending that link, or was their account compromised? Don’t click on suspicious links, McCarthy warns. Spreading malware on social networking sites is growing at an alarming rate. “Even though social networking sites have systems in place to minimize the risk, you are still the first line of defense in protecting yourself. It makes sense that malware writers target social networks because you are likely to trust a link that came from one of your friends,” she says.
You already know that “spam” is the email equivalent of junk mail. But it can do more than clutter up your inbox. Some of these email missives can contain a link or an attachment prompting you to download a computer virus. They can also be used to defraud those close to you. For instance, someone who has hacked into your email account can send a message asking every one of your contacts to wire money because you are in distress – and possibly rope in a few people who aren’t familiar with this common fraud. The CAN-SPAM Act was set up to protect consumers from deceptive email messages, subjecting senders to fines of up to $16,000 per violation.
One common way for identity thieves to gain control of consumers’ personal information is through digital crimes known as “phishing.” In this practice, fraudsters create an email that looks like it was issued from a legitimate company. They will ask for a recipient’s personal information – like an account number or a password – and then use that information to commit financial crimes, such as opening fraudulent charge cards in a consumer’s name and running up big bills on them.
“Phishing scams are successful because they use social engineering techniques to gain your trust,” says McCarthy. For example, one scam claims to be a relative traveling in another country reaching out for your help. It’s an email from your nephew. He was mugged, lost his wallet, and he needs you to wire him money right away. “It’s a natural reaction to want to help someone in trouble. That’s what the phishers count on. Beware of social networking techniques and be sure to protect your accounts,” she adds.
4.Unsecured Home Wireless Networks
Many of us have converted to home wireless Internet networks to connect our TVs, smartphones, laptops, computers and tablets. And why not? It’s very convenient. But with these home networks come risks. Without certain protections, cyber criminals in the area may be able to access the Internet through your network and possibly gain access to your computer and other devices.
5. Data Gone AWOL
Given all of the places where we tote mobile devices such as laptops, tablets and smartphones, it becomes very easy to lose them. If the data on those devices falls into the wrong hands and isn’t properly protected through techniques like encryption (the process of masking information using an algorithm, so that it becomes unreadable), it can be a field day for cybercriminals. It’s not just consumers who lose data. Forty-five percent of data breaches at companies are caused by lost laptops and mobile devices, according to a 2012 study by the Ponemon Institute, a research center based in Traverse City, Mich., that is dedicated to consumer privacy, data protection and information security policy. Even use of YouSendIt, Dropbox and other Internet-based file-sharing tools by employees – now a common phenomenon – raise the risk that confidential corporate data will be leaked, according to Ponemon.
But even if devices don’t get lost, it’s possible that in using them we’ll fall prey to cyber criminals while checking emails in an airport lounge using Wi-Fi on a smartphone, or while reading on a tablet over a mocha latte in a café.
“With all of your devices and more to come, be sure to have a backup strategy,” advises McCarthy. Many of the security software packages now include backup as an option. That won’t help with all of the data on every device, so be sure you plan and back up all of your important devices. There’s no telling what types of devices will be part of our lives years from now. The tech explosion presents immense opportunity for those with the creativity and know-how to make the gadgets we use better and better – and to simply keep them running smoothly. In the meantime, building a few smart cyber security habits is a good way for all of us to enjoy the technology we use every day with few hassles.
Advances in technology are not likely to slow down in the future, nor is our increased reliance on the fruits of that growth. New security threats will be a constant reality, which makes it more important than ever that skilled individuals step up to fill the increasing number of jobs available in cyber security, and that those who choose other career paths take steps to protect their own security.
Original Post at http://www.devry.edu/know-how/top-5-cyber-security-threats-that-could-affect-your-life/
Thanks for reading. hope it might helped you.
Summary: Operations will be coordinated and connected to major critical infrastructure agencies in the country, to monitor real-time information and react faster to cyberattacks.
The Indian government has set in motion a five-year project to revamp cybersecurity apparatus of critical sectors in the country to meet the growing challenge of cyberattacks.
The National Critical Information Infrastructure Protection Center (NCIIPC), the agency to coordinate cybersecurity operations for critical infrastructure across the country, has been given this responsibility, The Times of India reported on Tuesday.
The five-year plan will be prepared by the agency to revamp and integrate the cybersecurity apparatus of all critical infrastructrure such as power, transportation, water, telecommunications and defence, the agency said at a presentation.
NCIIPC also plans to set up a sectoral Computer Emergency Response Team (CERTs) that would be connected to it, and will install censors on all critical systems to provide real-time information to its command and control (C&C) center about any cyberattack to formulate a quick response.
Under a newly defined mandate, NCIIPC will look after critical sectors with high dependency on computer and information technology (IT), while other sectors will be under India’s CERT, CERT-IN.
“There are also plans to open a Cyber Security Operation Centre, a [round-the-clock] control room for real-time information and response, and a National Institute of Critical Information and Infrastructure Protection for training of chief information security officers (CISOs). We will also issue daily cyberalerts,” Muktesh Chander, NCIIPC center director said, during the presentation.
According to sources who spoke to the Indian news site, this is part of the government’s step to create awareness and ensure a robust security system in all critical government agencies. The task had also been divided into five phases, and once agencies set up their security infrastructure, it will be connected to the NCIIPC.
Shivshankar Menon, national security advisor, who also addressed the gathering, stressed on the participation of the private sector
“The NCIIPC is setting up a joint working group with representatives of industry assocations to bring out guidelines for protection of critical information infrastructure in India,” he said.
India’s critical infrastructure agencies are no stranger to cyberattacks. Just last week, a hacker group leaked Indian telco BSNL’s passwords and database, calling for the withdrawal of a controversial legislation which allegedly suppresses freedom of speech and expression. In April, Chinese hackers allegedly planted a bug via flash drives on India’s navy computers, which relayed sensitive data to China IP addresses.
Original Post at Zdnet
Thanks for reading. hope it might helped you.