<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VR World &#187; Hacking</title>
	<atom:link href="http://www.vrworld.com/tag/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vrworld.com</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 07:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>IT: It’s the Place to be for Job Hunting</title>
		<link>http://www.vrworld.com/2015/02/11/place-job-hunting/</link>
		<comments>http://www.vrworld.com/2015/02/11/place-job-hunting/#comments</comments>
		<pubDate>Wed, 11 Feb 2015 02:45:10 +0000</pubDate>
		<dc:creator><![CDATA[Darleen Hartley]]></dc:creator>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Anthem Blue Cross]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[CompTIA]]></category>
		<category><![CDATA[employee benefits]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[IT industry]]></category>
		<category><![CDATA[job hunting]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=46970</guid>
		<description><![CDATA[<p>As unemployment waivers, people with IT skills are sought after.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/11/place-job-hunting/">IT: It’s the Place to be for Job Hunting</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="980" height="533" src="http://cdn.vrworld.com/wp-content/uploads/2015/02/Chart_IT-Unemployment-980.jpg" class="attachment-post-thumbnail wp-post-image" alt="Chart_IT Unemployment 980" /></p><p>Job seekers, Rejoice. While unemployment tries to recover from stagnation, the IT industry has a bright outlook. <a href="http://www.comptia.org/resources/it-industry-outlook-2015">CompTIA</a>, a professional IT certification company, predicts a worldwide expansion in the industry of around five percent with only Canada and the UK lagging behind.</p>
<p>Companies are understaffed already in the technology department and 70 percent of managers report they expect to have a shortage of IT professionals to draw from to fill the gaps. The CompTIA report pegs unemployment in the IT industry lower than that of other fields nationally. In 2012, the Bureau of Labor Statistics averaged the unemployment rate for technology professionals at 4.4, about half the national average at that time. The image breaks that down by position. The picture hasn’t changed much.</p>
<p>A shifting environment due to acquisitions and mergers adds to the complexity of staffing. Not surprisingly, top on the list for growth are areas that make headlines: cloud computing, mobile, and as indicated by events such as <a href="http://www.wsj.com/articles/investigators-eye-china-in-anthem-hack-1423167560">Anthem Blue Cross’s hack attack</a>, security. Established entities with familiar names have cash flow to entice employees with salaries and uncommon benefits that go beyond such traditional subsidies as health insurance.</p>
<p>If you plan to go job hunting, you might want to arm yourself with some hardware and software skills. That’s what companies continue to search for when interviewing applicants.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/02/11/place-job-hunting/">IT: It’s the Place to be for Job Hunting</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/02/11/place-job-hunting/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>ISIS Ally Hacks US Military’s Central Command Social Media Accounts</title>
		<link>http://www.vrworld.com/2015/01/14/isis-hack-centcom/</link>
		<comments>http://www.vrworld.com/2015/01/14/isis-hack-centcom/#comments</comments>
		<pubDate>Tue, 13 Jan 2015 23:30:40 +0000</pubDate>
		<dc:creator><![CDATA[Alec Weisman]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Barack Obama]]></category>
		<category><![CDATA[CENTCOM]]></category>
		<category><![CDATA[Central Command]]></category>
		<category><![CDATA[CyberCaliphate]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Iraq]]></category>
		<category><![CDATA[ISIS]]></category>
		<category><![CDATA[military]]></category>
		<category><![CDATA[Syria]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[YouTube]]></category>

		<guid isPermaLink="false">http://www.vrworld.com/?p=45074</guid>
		<description><![CDATA[<p>Hackers sympathetic to radical Islamist militants in Iraq briefly gained control over some of the U.S. military’s social media accounts.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/01/14/isis-hack-centcom/">ISIS Ally Hacks US Military’s Central Command Social Media Accounts</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="395" height="394" src="http://cdn.vrworld.com/wp-content/uploads/2015/01/ISIS.png" class="attachment-post-thumbnail wp-post-image" alt="ISIS CyberCommand" /></p><p>Hackers sympathetic to the Islamic State in Iraq and Syria (ISIS) took over the United States Central Command’s Twitter (<a href="https://www.google.com/finance?q=NYSE%3ATWTR">NYSE: TWTR</a>) and YouTube accounts for about an hour on Monday and posted a number of inflammatory comments, photos, and videos before the Pentagon was able to disable its accounts.</p>
<p>&nbsp;</p>
<p>Using the alias “CyberCaliphate,” the hackers tweeted repeated threats that ISIS would be coming for American soldiers and their families. The group also released several documents on Pastebin.com, including a list of work phone numbers of current Army officers as well as the email and mailing addresses of dozens of retired generals.</p>
<p><a href="http://cdn.vrworld.com/wp-content/uploads/2015/01/US-ISIS-1-12-15-Pastebin.png" rel="lightbox-0"><img class="alignnone size-full wp-image-45077" src="http://cdn.vrworld.com/wp-content/uploads/2015/01/US-ISIS-1-12-15-Pastebin.png" alt="ISIS hackers Pastebin.com post" width="1011" height="533" /></a></p>
<p>&nbsp;</p>
<p>Most of the files appear to have already been publically available online. Noting that the pro-ISIS hackers did not compromise CENTCOM’s operational military networks and have had no operational impact, the <a href="http://www.defense.gov/news/newsarticle.aspx?id=123956">U.S. Department of Defense said</a> it was treating the incident “purely as a case of cybervandalism.”</p>
<p>&nbsp;</p>
<p>While the Department of Defense’s effort to downplay the cyberattack is unsurprising, its failure to use common security measures to protect its social media accounts is troubling. <a href="http://www.wsj.com/articles/u-s-investigating-apparent-hack-of-military-twitter-account-by-islamic-militants-supporters-1421086712">According to the Wall Street Journal</a>, the DoD manages the Twitter accounts of the nine U.S. combatant commands but the CENTCOM account allegedly did not even have two-factor verification enabled.</p>
<p>&nbsp;</p>
<p>With Central Command responsible for overseeing the American air strikes against ISIS, the cyberattack amounts to a propaganda victory for the militants. Most embarrassing for the administration, CyberCaliphate carried out the security breach while President Barack Obama was busy giving a speech to the Federal Trade Commission on cybersecurity and identity theft.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2015/01/14/isis-hack-centcom/">ISIS Ally Hacks US Military’s Central Command Social Media Accounts</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2015/01/14/isis-hack-centcom/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security Expert Discovers Plot by Criminals to Frame Him</title>
		<link>http://www.vrworld.com/2014/06/27/security-expert-discovers-plot-criminals-frame/</link>
		<comments>http://www.vrworld.com/2014/06/27/security-expert-discovers-plot-criminals-frame/#comments</comments>
		<pubDate>Fri, 27 Jun 2014 23:53:17 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Brian Krebs]]></category>
		<category><![CDATA[Credit Card]]></category>
		<category><![CDATA[Cybercriminal]]></category>
		<category><![CDATA[Fly]]></category>
		<category><![CDATA[Flycracker]]></category>
		<category><![CDATA[Group-IB]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Heroin]]></category>
		<category><![CDATA[Krebs]]></category>
		<category><![CDATA[Mazafaka]]></category>
		<category><![CDATA[Muxacc]]></category>
		<category><![CDATA[Silk Road]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36282</guid>
		<description><![CDATA[<p>In what sounds like an absolute story out of a novel, security researcher, Brian Krebs, has reported that the Ukrainian criminal that plotted to frame him on ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/06/27/security-expert-discovers-plot-criminals-frame/">Security Expert Discovers Plot by Criminals to Frame Him</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1422" height="738" src="http://cdn.vrworld.com/wp-content/uploads/2014/06/ows_1392608925883001.jpg" class="attachment-post-thumbnail wp-post-image" alt="Brian Krebs Security" /></p><p>In what sounds like an absolute story out of a novel, security researcher, <a href="https://twitter.com/briankrebs" target="_blank">Brian Krebs</a>, <a href="http://krebsonsecurity.com/2014/06/the-fly-has-been-swatted/" target="_blank">has reported</a> that the Ukrainian criminal that plotted to frame him on drug charges has been nabbed in Italy. This entire story goes back to when a cybercriminal known by the name of Fly, Flycracker and Muxacc started to harass Brian Krebs via Twitter. These threats came in the forms of profane and taunting tweets as well as posting pictures of actions figures holding up his severed head and photos of his credit report.</p>
<p>The man known as Fly was a member of multiple Russian/Ukrainian credit card and crime forums and moderated one of the most well known credit card fraud forums online. Without Fly&#8217;s knowledge, Brian was able to gain access to Fly&#8217;s secret credit card forum and discovered a plot where Fly would purchasse heroin on the Silk Road and then have it shipped to Brian&#8217;s home. He would then subsequently call the police posing as a concerned neighbor and have Brian arrested on drug charges.</p>
<p>Thankfully, Brian was able to alert the authorities and even track the package as it moved along towards his house since the Fly had posted the tracking # on his forums. And of course, once Fly had discovered that his plot had been foiled, he had a local florist send a gaudy cross-shaped floral arrangement to Brian&#8217;s house. It included a menacing message that directly addressed his wife, signed &#8220;Velvet Crabs.&#8221;</p>
<div id="attachment_36284" style="width: 1512px" class="wp-caption aligncenter"><a href="http://cdn.vrworld.com/wp-content/uploads/2014/06/velvetycrabs1.jpg" rel="lightbox-0"><img class="size-full wp-image-36284" src="http://cdn.vrworld.com/wp-content/uploads/2014/06/velvetycrabs1.jpg" alt="Jennifer Krebs" width="1502" height="967" /></a><p class="wp-caption-text">Jennifer Krebs</p></div>
<p>But it gets so much better, Brian then decided to look for this Fly guy and was able, with the help of Russian computer forensics firm Group-IB. With their help he was able to find a defunct email address which was connected to another email address called mazafaka@libero.it indicating a possibly location in Italy. And according to a trusted source in the security community, that email had been compromised last year and that source said the account was full of emailed reports from a keylogger. This keylogger was tied to a different email address, 777flyck@gmail.com which is tried to the mazafaka email address via recovery settings.</p>
<p>The keylogs themselves, from the keylogger had valuable information that had indicated that the Fly guy had planted a keylogger on his wife Irina&#8217;s computer. And, on many occassions those emails showed Fly&#8217;s wife type in her gmail address which included her first and last name, Irina Gumenyuk.</p>
<p>Obviously, with her first and last name they were able to look her up on social media and determine she had changed her name to Vovenko. In fact, she even mentioned her husband by name several times in emails to friends, directly identifying him as Sergei Vovenko. And of course, thanks to payment information contained in those emails they were able to determine their location as Napoli, Italy. Also, according to social media profiles, Brian was able to gather that Vovenko was born in St. Petersburg, Russia but is a Ukrainian citizen.</p>
<p>Then, last week, Mazafaka forum admins removed Fly&#8217;s account and postings on the forum, which is typically done when a member is suspected of having been arrested.</p>
<p>According to Brian&#8217;s sources, he was able to discover that Vovenko had been arrested by the Italians under a joint US and Italian operation. He is reportedly being held in an Italian jail waiting to be extradiated to the US, although he may have to stand trial in Italy first. This is because he would routinely buy Italian credit card dumps (stolen #&#8217;s) and cashed out the stolen cards through high-end Italian stores. And this was possible because of his variety of equipment for embossing and printing credit cards which investigators were able to discover.</p>
<p>Moral of the story? Don&#8217;t mess with a good security researcher.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/06/27/security-expert-discovers-plot-criminals-frame/">Security Expert Discovers Plot by Criminals to Frame Him</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/06/27/security-expert-discovers-plot-criminals-frame/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Content Delivery Network via Amazon Web Services: CloudFront: cdn.vrworld.com

 Served from: www.vrworld.com @ 2015-04-10 17:34:51 by W3 Total Cache -->