Graham Cluley writes: Although over 100,000 new malware variants may be discovered every day by security researchers, that doesn’t mean that the criminals behind the attacks need to be equally inventive in their methods to infect users. In fact, truth be told, the methods used to compromise users’ computers are often close to the same…
Category: Commentaries and Analyses
Sixth Circuit Rejects False Claims Act Claim Based on Health Data Breach
Evan Panich of McDermott Will & Emery writes: On March 7, 2016, the U.S. Court of Appeals for the Sixth Circuit decided United States ex rel. Sheldon v. Kettering Health Network, affirming a district court’s dismissal of a lawsuit alleging violations of the False Claims Act (FCA) relating to an alleged data breach. The relator alleged…
GhostShell, On the Record – If You Knew Then What You Know Now….
This post is part of an extended interview conducted by DataBreaches.net and CyberWarNews.info with the hacker formerly known as “GhostShell.” We asked GhostShell to look back and tell us if he would do anything differently. Here was part of his answer: if I could invent the time machine I would go back, never join Anonymous,…
GhostShell, On the Record – Difficulty Finding Work and Risk of Arrest
This post is part of an extended interview conducted by DataBreaches.net and CyberWarNews.info with the hacker formerly known as “GhostShell.” How did GhostShell avoid arrest for so many years? Was his OpSec that good, or is Romanian law enforcement a bit uninterested? We asked him how it is that he was never identified or arrested. On one…
GhostShell, On the Record – Psychological Factors
This post is part of an extended interview conducted by DataBreaches.net and CyberWarNews.info with the hacker formerly known as “GhostShell.” In “Dark Hacktivism,” GhostShell wrote, “Always remember to play the part of a normal human being,” We asked whether he felt he was playing the part and about his other comments in Dark Hacktivism on psychological…
GhostShell, On the Record – On criticisms of “simple” hacks
This post is part of an extended interview conducted by DataBreaches.net and CyberWarNews.info with the hacker formerly known as “GhostShell.” As prolific as TGS was, their hacks were not particularly sophisticated, as noted by Imperva and Symantec. GhostShell agreed that the public projects were simple, but doesn’t see that as a weakness. Every single public project…