asterisk2a + spoofing   4

Tech Firm Ubiquiti Suffers $46M Cyberheist — Krebs on Security
via // Networking firm Ubiquiti Networks Inc. disclosed this week that cyber thieves recently stole $46.7 million using an increasingly common scam in which crooks spoof communications from executives at the victim firm in a bid to initiate unauthorized international wire transfers. [...] Known variously as “CEO fraud,” and the “business email compromise,” the swindle that hit Ubiquiti is a sophisticated and increasingly common one targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. In January 2015, the FBI warned that cyber thieves stole nearly $215 million from businesses in the previous 14 months through such scams, which start when crooks spoof or hijack the email accounts of business executives or employees.
phishing  phishing  scam  spoofing  cyber  security  IT  internet  security  online  security 
august 2015 by asterisk2a
Secret Update Removes Photo Library Access As It Faces Renewed Claims It Isn’t So Anonymous | TechCrunch "Secret CEO: Well...You're Not ALWAYS Completely Anonymous Or Untraceable On Our App" [...] In fact, since Secret started offering a bounty for hackers that alerted the company about bugs in the app in February, it has learned about and fixed 42 different security holes. The numbers are a clear warning: Secret isn't perfectly secure and the term "anonymous" should be taken with a grain of salt. || - Problem saying you are anonymous when in reality you are building off a phone number and address/contacts book >> " the startup founder revealed this was not the first time he’d dealt with a potential threat to uncovering the names behind Secret confessions. [...] While Secret can continue patching in an arms race against hackers, hackers will almost certainly look for ways around the fixes." || || ||
Secret  anonym  anonymity  anonymous  Platform  corporate  values  personal  values  corporate  culture  spoofing  white  hat  hacker  hacker  Hacking  internet  security  app  security  cyber  security  online  security  cyber  bullying  cyber  mobbing  ethical  machine  ethics  morals  moral  beliefs  Troll  Trolls  Haters  Hater  corporate  governance  CSR  corporate  social  responsibility  Venture  Capital 
august 2014 by asterisk2a
Neues Gesetz: Für Rohstoffspekulanten beginnt die Zeit des Zitterns |

Ihre Kompetenzen auf dem Rohstoffmarkt werden in mehrer Hinsicht verstärkt. So darf sie Positionsgrenzen über Handelsplätze hinweg setzen. Entsprechende Vorschläge für Energiekontrakte unterbreitete sie bereits. Zudem darf sie gegen mehrere Handelspraktiken vorgehen, die zuvor noch erlaubt waren. Dabei geht es um "Spoofing" und "Banging the close". Beim "Spoofing" gibt ein Händler ein Gebot mit der Absicht ab, es kurz danach wieder zurückzuziehen. Bei "Banging the close" versuchen Händler den Abrechnungspreis, der am Ende des Handelstages festgelegt wird, zu beeinflussen.
CFTC  derivatives  wallstreet  financial  regulation  reform  july  2010  usa  commodities  manipulation  market  spoofing 
july 2010 by asterisk2a

Copy this bookmark: