cyber security http://wesa.fm en Pittsburgh Officials Indict International Cyber-Criminal http://wesa.fm/post/pittsburgh-officials-indict-international-cyber-criminal <p>Law enforcement officials in Pittsburgh had a major hand in bringing down an international ring of cyber criminals, according U.S. Attorney David J. Hickton.</p><p>The indictment, unsealed Monday, names Russian citizen Evgeny Bogachev as one of five defendants, charged with conspiracy, computer hacking, wire fraud,&nbsp;bank fraud and money laundering. The indictment alleges that Bogachev was the mastermind behind two malware programs that infected the computers of as many as one million people worldwide, 25 percent of whom were in the United States.</p> Mon, 02 Jun 2014 20:38:08 +0000 Liz Reid 30257 at http://wesa.fm Pittsburgh Officials Indict International Cyber-Criminal Indictment of Chinese Hackers Marks A New Way to Prosecute Cyber Crime http://wesa.fm/post/indictment-chinese-hackers-marks-new-way-prosecute-cyber-crime <p><span style="line-height: 1.5;">&nbsp;&nbsp;</span></p><p>An <a href="http://www.justice.gov/opa/pr/2014/May/14-ag-528.html">indictment </a>out of Western Pennsylvania charges five military officers in the Chinese People’s Liberation Army with directing a conspiracy to steal information from Pittsburgh based organizations.</p><p>According to the indictment, the six organizations victimized include U.S. Steel, Westinghouse, Allegheny Technologies Incorporated, Alcoa, Solar World and the United Steelworkers International Union. The charges were announced Monday in Washington by US Attorney General Eric Holder and David Hickton, US Attorney for the Western District of Pennsylvania.</p><p> Tue, 20 May 2014 20:16:39 +0000 Essential Pittsburgh 29548 at http://wesa.fm Indictment of Chinese Hackers Marks A New Way to Prosecute Cyber Crime The Larger Implications of the Target Data Breach http://wesa.fm/post/larger-implications-target-data-breach <p>The massive data breach that occurred at Target stores at the beginning of the holiday season was thought to affect 40 million customers.</p><p>With estimates expanded Friday to more than 100 million, it’s believed that names, mailing addresses, phone numbers and email addresses have been compromised along with credit and debit card numbers.</p><p>The questions now are, "Is this attack different than other security breaches?" and "What should a person do who has been affected by this type of a security breach?" Answering these questions are Andy Tornasi, a Federal Project Manager for <a href="http://www.tiversa.com/">Tiversa</a>, and Orion Czarnecki, a Cyber Forensic Analyst at Tiversa.</p><p>Tornasi says this breach is different from any case he has dealt with in the past.</p><p>“This is the first time that I ever heard of malware affecting the point of sale for a particular store."</p><p>Czarnecki has this advice for those who were affected by the Target breach or <a href="http://www.npr.org/templates/story/story.php?storyId=261675926">the recent breach at Neiman Marcus stores</a>. Tue, 14 Jan 2014 00:22:31 +0000 Essential Pittsburgh 22764 at http://wesa.fm The Larger Implications of the Target Data Breach Cyber Security Basics: Assume That Private Communication Is Never Private http://wesa.fm/post/cyber-security-basics-assume-private-communication-never-private <p></p><p>Edward Snowden is the <a href="http://www.post-gazette.com/stories/news/world/report-nsa-contractor-is-source-of-leaks-about-us-government-surveillance-programs-691012/#ixzz2VqtdCXvv">source of leaks</a> of government surveillance programs within the United States. Which have raised questions about our privacy and how much information the government is gathering about us by phone and on the internet.&nbsp;</p><p><strong>Mark Wuergler</strong>, Senior Security Researcher for the cyber security firm <a href="http://www.immunityinc.com"><strong>Immunity</strong></a>, says the NSA has the <a href="http://www.businessinsider.com/expert-says-the-nsa-is-probably-spying-on-you-2013-6">means and motive to spy on anyone</a>. We'll talk with him about the NSA and security.</p><blockquote><p><strong>The government has been watching ever since the NSA was created. They've been finding and trying new ways of watching and listening and recording. And they're really good at it.</strong></p></blockquote><div style="overflow: hidden; color: rgb(0, 0, 0); background-color: rgb(255, 255, 255); text-align: left; text-decoration: none; border: medium none;">&nbsp;</div><p> Mon, 10 Jun 2013 22:26:56 +0000 Heather McClain 11169 at http://wesa.fm Cyber Security Basics: Assume That Private Communication Is Never Private