{"id":45,"date":"2008-04-08T10:24:55","date_gmt":"2008-04-08T14:24:55","guid":{"rendered":"http:\/\/www.jasetaro.com\/blog\/?p=45"},"modified":"2008-12-24T21:50:53","modified_gmt":"2008-12-25T02:50:53","slug":"secure-computing-follow-up","status":"publish","type":"post","link":"https:\/\/www.jasetaro.com\/blog\/2008\/04\/08\/secure-computing-follow-up\/","title":{"rendered":"Secure Computing Follow-up"},"content":{"rendered":"<p>I came across a few interesting articles and resources anyone who attended last nights presentation might be interested in. First is an article by David Harely on <a href=\"http:\/\/www.eset.com\/threat-center\/blog\/?p=116\" target=\"_blank\">Macs &amp; Malware<\/a>. Second the Internet Crime Complaint Center (IC3) has released its annual report on cyber crime. IC3 is a partnership between the FBI and the National White Collar Crime Center (NW3C)&#8230; It&#8217;s interesting reading, in addition to statistics based actual case work it also provides details on a number of popular scams. You can download a copy <a href=\"http:\/\/www.ic3.gov\/media\/annualreports.aspx\" target=\"_blank\">here<\/a>.<\/p>\n<p>Last is <a href=\"http:\/\/www.lookstoogoodtobetrue.com\/\" target=\"_blank\">Looks Too Good To Be True.com<\/a>. Looks Too Good To Be True provides a wealth of information various types cyber scams. It&#8217;s well worth a look.<\/p>\n<p>One last thing before I forget&#8230; You can download a copy of last night&#8217;s presentation <a href=\"http:\/\/jasetaro.com\/downloads\/InfoSec_2008_DACS.pdf\" target=\"_self\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I came across a few interesting articles and resources anyone who attended last nights presentation might be interested in. First is an article by David Harely on Macs &amp; Malware. Second the Internet Crime Complaint Center (IC3) has released its annual report on cyber crime. IC3 is a partnership between the FBI and the National [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[23,5,15,14],"tags":[388,387,82],"class_list":{"0":"post-45","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-computers","7":"category-presentations","8":"category-security","9":"category-technology","10":"tag-cyber-scams","11":"tag-macs","12":"tag-malware","13":"entry"},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pfpI7-J","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1079,"url":"https:\/\/www.jasetaro.com\/blog\/2008\/12\/09\/ap-bad-economy-helping-internet-scammers-recruit-mules\/","url_meta":{"origin":45,"position":0},"title":"AP: Bad Economy Helping Internet Scammers Recruit &#8216;Mules&#8217;","author":"Jeff","date":"December 9, 2008","format":false,"excerpt":"From the Associated Press via Examiner.com: Bad economy helping Web scammers recruit 'mules' By Jordan Robertson, The Associated Press, December 9, 2008 SAN JOSE, Calif. - The worsening economy appears to be helping computer crooks with one of their toughest tasks: tricking people into opening their homes and bank accounts\u2026","rel":"","context":"In &quot;Crime&quot;","block_context":{"text":"Crime","link":"https:\/\/www.jasetaro.com\/blog\/category\/crime\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":221,"url":"https:\/\/www.jasetaro.com\/blog\/2008\/08\/29\/computer-crime\/","url_meta":{"origin":45,"position":1},"title":"Computer Crime&#8230;","author":"Jeff","date":"August 29, 2008","format":false,"excerpt":"Here an interesting video from Mikko Hypp\u00f6nen at F-Secure that talks about one of the common misconceptions about computer crime and viruses. A lot of people think that since we haven't had a major virus outbreak like the Melissa or Sasser worms in quite awhile the situation is getting better...\u2026","rel":"","context":"In &quot;Computers&quot;","block_context":{"text":"Computers","link":"https:\/\/www.jasetaro.com\/blog\/category\/computers\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1055,"url":"https:\/\/www.jasetaro.com\/blog\/2008\/11\/24\/julie-ameros-four-year-nightmare-is-finally-over\/","url_meta":{"origin":45,"position":2},"title":"Julie Amero&#8217;s Four Year Nightmare is Finally Over","author":"Jeff","date":"November 24, 2008","format":false,"excerpt":"Alex Eckelberry has the details. After 4 years and 2 months, Julie Amero is now free. You\u2019ll recall that Julie Amero was convicted of 4 felony counts, each count carrying a maximum of 10 years, for exposing school children to pornography. The reality is that Julie, a 40\u2013year old, pregnant\u2026","rel":"","context":"In &quot;Computers&quot;","block_context":{"text":"Computers","link":"https:\/\/www.jasetaro.com\/blog\/category\/computers\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5620,"url":"https:\/\/www.jasetaro.com\/blog\/2014\/05\/20\/u-s-charges-five-chinese-army-officers-with-hacking\/","url_meta":{"origin":45,"position":3},"title":"U.S. Charges Five Chinese Army Officers With Hacking","author":"Jeff","date":"May 20, 2014","format":false,"excerpt":"From the Wall Street Journal: The Justice Department indicted five Chinese military officers, alleging they hacked U.S. companies' computers to steal trade secrets, a major escalation in the fight between the two superpowers over economic espionage. The indictment, unsealed Monday, marks the first time the U.S. government has publicly accused\u2026","rel":"","context":"In &quot;Computers&quot;","block_context":{"text":"Computers","link":"https:\/\/www.jasetaro.com\/blog\/category\/computers\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2885,"url":"https:\/\/www.jasetaro.com\/blog\/2009\/10\/24\/this-time-its-going-to-be-different-trust-me\/","url_meta":{"origin":45,"position":4},"title":"This Time it&#8217;s Going to be Different&#8230; Trust Me&#8230;","author":"Jeff","date":"October 24, 2009","format":false,"excerpt":"Ouch, that'll leave a mark. Seriously though, don't get up caught up in the \"Macs are better PCs\" or \"PCs are better macs\" games... Computers are productivity tools it doesn't matter whether you use a PC or Mac, if you can accomplish everything you need to accomplish with it that\u2026","rel":"","context":"In &quot;Computers&quot;","block_context":{"text":"Computers","link":"https:\/\/www.jasetaro.com\/blog\/category\/computers\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":48,"url":"https:\/\/www.jasetaro.com\/blog\/2008\/04\/10\/mobile-malware\/","url_meta":{"origin":45,"position":5},"title":"Mobile Malware","author":"Jeff","date":"April 10, 2008","format":false,"excerpt":"Here's a short but informative video on mobile threats from the folks at F-Secure.","rel":"","context":"In &quot;Computers&quot;","block_context":{"text":"Computers","link":"https:\/\/www.jasetaro.com\/blog\/category\/computers\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.jasetaro.com\/blog\/wp-json\/wp\/v2\/posts\/45","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jasetaro.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jasetaro.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jasetaro.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jasetaro.com\/blog\/wp-json\/wp\/v2\/comments?post=45"}],"version-history":[{"count":0,"href":"https:\/\/www.jasetaro.com\/blog\/wp-json\/wp\/v2\/posts\/45\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.jasetaro.com\/blog\/wp-json\/wp\/v2\/media?parent=45"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jasetaro.com\/blog\/wp-json\/wp\/v2\/categories?post=45"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jasetaro.com\/blog\/wp-json\/wp\/v2\/tags?post=45"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}