Posted on 01/10/2014 1:15:39 AM PST by legalservicesbc
Edited on 01/10/2014 1:16:46 AM PST by Jim Robinson. [history]
Researchers with Trustwave's SpiderLabs said they discovered the credentials while investigating a server in the Netherlands that cyber criminals use to control a massive network of compromised computers known as the "Pony botnet."
The company told Reuters on Wednesday that it has reported its findings to the largest of more than 90,000 websites and Internet service providers whose customers' credentials it had found on the server.
(Excerpt) Read more at reuters.com ...
Cyber crime ping.
Does the NSA know about this?
Iw i5 time to go back to snail mail and actually writing checks to pay bills?
If you read the article it states that the passwords were to Facebook, Twitter, Google, and Yahoo accounts and that the passwords were easily cracked such as “12345” or “admin.” No bank accounts were targeted.
Since the internet is not safe, perhaps banking and e-commerce should be abandoned. We should go back to the personal contact format of 20 years ago. At least criminals then were local and might be caught. This would also give many people who used to work in banks and businesses jobs, instead of those in India, Bangladesh and China.
Too late. The cat is out of the bag.
Answer, get the INTERPOL involve with cyber crime.
http://www.interpol.int/Crime-areas/Cybercrime/Cybercrime
INTERPOL’s role
INTERPOLs cybercrime programme is built around training and operations and works to keep up with emerging threats. It aims to:
Promote the exchange of information among member countries through regional working parties and conferences;
Deliver training courses to build and maintain professional standards;
Coordinate and assist international operations;
Establish a global list of contact officers available around the clock for cybercrime investigations (the list contained 134 contacts at the end of 2012);
Assist member countries in the event of cyber-attacks or cybercrime investigations through investigative and database services;
Develop strategic partnerships with other international organizations and private sector bodies;
Identify emerging threats and share this intelligence with member countries;
Provide a secure web portal for accessing operational information and documents.
Or you could just change your passwords periodically.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.