"The bank says that its customers opened an email attachment that resulted in a virus being executed on their machines. This virus changed their browsers' behaviour so when they went to open the real ABN Amro online banking site, they were instead re-directed to a spoof site.
The customers then typed in their passwords, which the attacker in turn used to access the bank's real Web site.
Working from high altitudes, the Eitan will likely be used to provide prestrike information on targets, to eavesdrop on electronic communications and to send battle damage assessments back after an attack.
It will also undoubtably be used to monitor any retaliation for the airstrike—seeking rocket launches and eavesdropping on Iran.
The onboard power required to electronically jam radar and communications equipment is not in the Eitan, Israeli defense industry officials told the trade journal Defense News. But the ability to carry so much weight opens up questions about the drones' ability to conduct long-range, high-risk bombing missions on their own.
US troops are to be allowed to use social networking websites such as Twitter and Facebook following a review of internet use and security.
"Defence department officials say the benefits of using social media now outweigh the risks to security.."
US Defence Secretary Robert Gates has said that social networking can help the Pentagon interact with US military employees, many of whom are in their early 20s and regular users of online services.
Over the past few years we’ve rolled out a number of new web initiatives—including an e-mail alert service, syndicated news feeds, and a series of podcasts and widgets—that make it easier for you to help us track down wanted fugitives and missing kids, to submit tips on terrorism and crime, and to get our latest news and information.
Today, we’re announcing the launch of our latest suite of tools. We’ve recently set up shop in several social media websites, including:
Washington, D.C. - Working with law enforcement authorities in Morocco and Turkey, the FBI today announced the arrests of two individuals believed to be responsible for the creation and distribution of the "Mytob" and "Zotob" computer worms that were unleashed less than two weeks ago and disrupted services on computer networks of a variety of companies including major U.S. news organizations.
Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using internet services. Stalking in General terms can be referred to as the repeated acts of harassment targeting the victim such as following the victim, making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects.
Stalking may be followed by serious violent acts such as physical harm to the victim and the same has to be treated and viewed seriously. It all depends on the course of conduct of the stalker.