TribLIVE

| Investigative

CYBER RATTLING: THE NEXT THREAT
Every 3:0 Seconds
There is roughly one victim of identity theft in the U.S. every 3 seconds.
That's . . .
15 per minute
913 per hour
22,000 per day
8 million per year
TWITTER FACEBOOK LINKEDIN GOOGLEPLUS

Experts: In cyber warfare, deterrence a challenge but may be key to nation’s defense

By Andrew Conte
The United States’ best defense against a crippling cyber attack could be a more visible offense, military leaders and other experts recently suggested at the Army War College in Carlisle. Then they stopped talking. The nation’s cyber attack capabilities are so ...

TribLIVE exclusive: How FBI Pittsburgh led takedown of Darkode thieves

By Andrew Conte
Assistant U.S. Attorney Jimmy Kitchen and two FBI agents from Pittsburgh sat two weeks ago around a large square table inside the ultramodern, glass-walled offices ...

FBI: CMU student charged with selling malware on Darkode

By Mike Wereschagin and Andrew Conte
A fresh-faced college student who once designed a mobile app to bring Pittsburghers together slipped from his prestigious Carnegie Mellon University classrooms into the shadows ...

A look at Operation Shrouded Horizon

By Tribune-Review
• Investigators disabled the Darkode forum, an online black market for stolen computer data and web tools for committing crimes. The site started about 2008. ...

7 allegedly involved in Darkode charged in Pittsburgh

By Andrew Conte
David Hickton, the U.S. Attorney for Western Pennsylvania, brought charges against seven defendants in federal court in Pittsburgh: • Morgan C. Culbertson, 20, of Pittsburgh charged with designing “Dendroid” — a coded malware intended to remotely access, control, and ...

Details emerge on global Internet crime sting led by Pittsburgh FBI agents

By Andrew Conte
FBI agents in Pittsburgh led the largest global effort to date to take down an Internet crime ring that involved about 70 criminals from Serbia …

Instances of hacking may be up, but indictments against Chinese military impactful, experts say

By Andrew Conte
WASHINGTON — Computer hacking indictments filed in Pittsburgh last year against members of the Chinese military have not led to arrests, but they did put that country on notice, top cybersecurity experts here said Wednesday. Online spying by the Chinese certainly ...

Cybersecurity experts try to predict hackers’ next moves

By Andrew Conte
Ross Fazio thought he had taken every precaution against computer hackers at his Sharpsburg heating and cooling company, but they still found a way inside. Investigators ...

Security planners work on cyber defense strategies at U.S. Army War College

By Andrew Conte
CARLISLE — When it comes to cybersecurity, we’re all in this together. The nation’s best defense in cyberspace involves not only the military but private citizens and corporations, top security planners said here Tuesday in a closed-door meeting at the U.S. ...

Tiversa, congressman debate credibility of whistle-blower

By Andrew Conte
It’s hard to find a perfect whistle-blower. That’s the situation that U.S. Rep. Darrell Issa said he found during his committee’s investigation of Tiversa, a Pittsburgh ...

Former Tiversa employee at center of House probe of Pittsburgh firm

By Andrew Conte
A Pittsburgh cybersecurity company that collects millions of files shared on global networks has become embroiled in a congressional investigation supported by a former employee-turned-whistleblower. Richard ...

House to vote on cyber threat bill

By Wire and Staff Reports
WASHINGTON — The House is expected to pass a long-awaited bill Wednesday that would make it easier for companies to share information about cybersecurity threats with the government without fear of lawsuits. The House Intelligence Committee approved the bill ...

Use of multiple contractors could leave oil, gas operators open to hackers

By Katelyn Ferral  and Andrew Conte
In the vast network of data, drilling and pipes that’s made Marcellus shale an international energy reserve, computer attacks pose a serious threat. Hackers target ...

Despite demand, women comprise only 11 percent of cyber security workers

By Andrew Conte
Ambareen Siraj looks out at the  75 students in her computer security class and often sees that she’s the only woman in the room. At ...

Murphy: May not be able to secure cyberspace, but must minimize impact

By Andrew Conte
It should be harder to bring down the nation’s most critical computer systems than by just finding a single weakness, a top Carnegie Mellon University ...

Carnegie Mellon response team has battled computer virus attacks since 1988

By Andrew Conte
Pittsburgh’s prominent and growing role as a national center for cybersecurity started with a chance encounter more than 25 years ago. On Nov. 2, 1988, researchers ...

Experts: Infrastructure ‘legitimate target’ in battle for cyber supremacy

By Andrew Conte
When Summer Fowler goes to sleep, the Cranberry mother of three knows computer hackers around the world are working through the night to undo the ...

Sony Pictures hack redefines rules of online warfare

By Andrew Conte
CARLISLE — Rarely has a raunchy movie done so much to change the world. When hackers broke into computer systems at Sony Pictures Entertainment in a ...

Sony hack signals new, public front in cyber warfare

By Andrew Conte
Even if Sony’s movie “The Interview” was as unspeakably bad as some reviewers suggest, it would have been every American’s patriotic duty to go see ...

Federal prosecutors in Pittsburgh want to tackle hacking with companies

By Andrew Conte
Rather than trying to fight off hackers on their own, corporations should work with the government so it can bring more cases such as the ...

Retailers, security experts meet near Pittsburgh on cyber theft ‘pandemic’

By Andrew Conte
Online retail theft has reached such “pandemic proportions” that stores must work together more closely to fight organized crime rings stealing credit cards and other ...

Cybersecurity experts warn Pittsburgh conference about dangers of hacking

November 17, 2014
By Andrew Conte
Hackers typically need less than a day to break into a victim’s computers — but it can take months to find the breach and fix it, experts warned Monday at a computer security conference in ...