There is a “pump and dump” circulating about “The $59 Computer”. A pump and dump scam usually happens with penny stock trades. A stock that sells for pennies is purchased and hyped by a “research” firm. When the price goes up from the fraudulent hyping, the originator of the scam sells…
National Cyber Alert System:The operating system is the most fundamental program that runs on your computer. It serves as the basis for how everything else works. What is an operating system?An operating system (OS) is the main program on a computer. It performs a variety of functions, including…
Better Business Bureau — The popularity of social networking continues to grow among kids. Social networking sites can provide a secure way for kids to connect with each other, but they can also be exploited for any number of nefarious purposes. Better Business Bureau recommends parents take…
HARRISBURG, PA – Agents from the Attorney General’s Child Predator Unit have recently arrested three suspected Internet predators, including a plumber from New York state who traveled to Lawrence County to have sex with what he believed was a 13-year old girl; a computer technician from…
For more information visit: “100% access to information and communication with 0% human rights violations”Nearly 200 cyber experts and other stakeholders seeking access to the Web for scores of millions of people with visual and other disabilities wrapped up a four-day United Nations workshop in…
There is a massive email phishing scam that comes with a variety of subject lines, such as, fw and re. The body of the email usually looks like this: Hey, some jerk has posted your pictures (u understand what kind of pictures are there) and sent a link of them to all ur friends. I [...]
Microsoft has released updates for multiple vulnerabilities in Internet Explorer, including the vulnerability detailed in Microsoft Security Advisory 979352 and US-CERT Vulnerability Note VU#492515.By convincing a user to view a specially crafted HTML document or Microsoft Office document, an…
The Department Of Energy National Laboratories — New work on the Red Storm supercomputer at DOE’s Sandia National Laboratories is helping to make supercomputers more flexible and accessible, in effect removing them from the constraints of their specialized operating systems. Sandia researchers,…
from U.S. CERTWhat are rootkits and botnets?A rootkit is a piece of software that can be installed and hidden on your computer without your knowledge. It may be included in a larger software package or installed by an attacker who has been able to take advantage of a vulnerability on your computer…
HARRISBURG – A Maryland-based computer training school that suddenly closed in mid-December, after taking nearly $2 million dollars in tuition payments from Pennsylvania students, is the subject of a lawsuit filed by the Attorney General’s Bureau of Consumer Protection.Attorney General Tom…
Google is investigating whether employees helped orchestrate a cyber attack on their network in December. They made an announcement last week that they were considering pulling out of China because of the attack and theft of their intellectual property.“We’re not commenting on rumor and…
Unsolicited commercial email may be a privacy and/or security violation under the Federal Trade Commission of the United States of America. SPAM should be forwarded to uce@ftc.gov.