Fake flirty cyber analyst shows social network risks

Robin Sage doesn\'t really exist, but a lot of men shared personal info with her online. Learn more in today\'s cybersecurity update.

Cybersecurity Update – Tune in weekdays at 30 minutes past the hour for the latest cybersecurity news on The Federal Drive with Tom Temin and Amy Morris (6-10 a.m.) and DorobekInsider with Chris Dorobek (3-5 p.m.). tells ComputerWorld that he connected the faux Robin Sage with some 300 men and women from the U.S. military, intelligence agencies, information security companies and government contractors. The goal was simple — to see what intel he could gather from purely social networking connections. He said most people waited less than a month before sharing really personal info with him. Ryan is scheduled to present his findings next week at the BlackHat security conference in Las Vegas.

  • A new report from the security firm AVG says cybercrooks are infecting about 10 percent of the millions of computers they attack every month, the Telegraph reports. A recent survey shows 165 Internet domains were found to have attacked 12 million visitors over the course of two months. More than 1.2 million computers were subsequently infected. It also shows that cybercriminals are increasingly focusing on money and that they’re getting better organized. Improvements in their own organization, the report says, has lead to the development of toolkits they use to infect computers, illegally obtain information — and then buy and sell that information.
  • Check out all of Federal News Radio’s coverage of cybersecurity issues here.

    Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

      Stacy Bostjanick and Jennifer Henderson

      Risk and Compliance Exchange 2024: DoD’ Stacy Bostjanick, DCMA’s Jennifer Henderson on finding ‘any means possible’ to help small biz with CMMC

      Read more
      Amelia Brust/Federal News Networkcybersecurity

      How should software producers be held accountable for shoddy cybersecurity products?

      Read more