Ancestry search turns up man who stole dead child’s identity

Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInEmail this to someonePrint this page

A man who assumed the iden­ti­ty of a baby who died in 1972 was arrest­ed on charges of Social Secu­ri­ty fraud and aggra­vat­ed iden­ti­ty theft after the child’s aunt dis­cov­ered the ruse through Ancestry.com. Pros­e­cu­tors said Jon Vin­cent stole Nathan Laskoski’s iden­ti­ty after escap­ing from a halfway house in March 1996 and used his new name to start anoth­er life. Vin­cent had been con­vict­ed of inde­cen­cy with a child. The real Nathan Laskos­ki died at age 2 months in 1972. Author­i­ties said Vin­cent first obtained a Social Secu­ri­ty card as Laskos­ki in 1996. He held jobs, received a driver’s license and mar­ried and divorced as Laskos­ki. When Nathan’s aunt did a search on Ancestry.com, a geneal­o­gy web­site, his name came up as a “green” leaf on the web­site, mean­ing pub­lic records showed he was alive. The aunt told Nathan’s moth­er, who did more research and learned that some­one had obtained a Social Secu­ri­ty card under her son’s name. Nathan’s moth­er also found pub­lic mar­riage and divorce records, and filed an iden­ti­ty theft com­plaint with the Social Secu­ri­ty Admin­is­tra­tion. Source: Sci-Tech Today

Radio frequency used to hack emergency siren system

Dal­las city offi­cials added extra encryp­tion and oth­er secu­ri­ty mea­sures to out­door warn­ing sirens after they were hacked, and the city is eval­u­at­ing crit­i­cal sys­tems for poten­tial vul­ner­a­bil­i­ties, includ­ing finan­cial sys­tems, a flood warn­ing sys­tem, police-fire dis­patch and the 911311 sys­tem. The hack came over a radio fre­quen­cy, not a wired com­put­er net­work, caus­ing all 156 emer­gency sirens to acti­vate for about 90 min­utes. Source: Com­put­er World

Ready Player One: Nintendo will pay you $20,000 to hack system

Hack­ing the Nin­ten­do Switch gam­ing con­sole could score you a $20,000 pay­day. Nin­ten­do will pay rewards rang­ing from $100 to $20,000 to peo­ple who iden­ti­fy bugs and vul­ner­a­bil­i­ties in the Switch. It’s look­ing for help find­ing flaws that could allow pira­cy, cheat­ing or show­ing naughty stuff to kids. Nin­ten­do will reward the first reporter of a qual­i­fy­ing vul­ner­a­bil­i­ty. Source: CNet

Tools of the spy trade revealed in latest WikiLeaks release

Wik­iLeaks released a new cache of 27 doc­u­ments alleged­ly belong­ing to the CIA. A CLI-based frame­work named the Grasshop­per has been built by the CIA to enable build­ing “cus­tomized mal­ware” pay­loads to break into Microsoft’s Win­dows oper­at­ing system—even bypass­ing the anti-virus. The leaked doc­u­ments appear to be a user man­u­al for spies only to be accessed by the mem­bers of the agency. Source: Tech Worm

British officials suspect Russian interference in Brexit vote

A British vot­er reg­is­tra­tion site that crashed in the run-up to last year’s EU ref­er­en­dum could have been tar­get­ed by a for­eign cyber attack, some mem­bers of Par­lia­ment say. The “reg­is­ter to vote” site crashed on June 7 last year just before the dead­line for peo­ple to sign up to vote. The U.K. gov­ern­ment and elec­toral admin­is­tra­tors blamed a surge in demand after a TV debate. But MPs on the par­lia­men­tary Pub­lic Admin­is­tra­tion Com­mit­tee say a for­eign cyber attack could not be ruled out. Source: BBC News

Authorities slice up global computer network’s spam attacks

U.S. author­i­ties are work­ing to dis­man­tle a glob­al com­put­er net­work that sent mil­lions of spam emails world­wide each year. Russ­ian man, Pyotr Lev­ashov, who is alleged to be at the head of the scheme, was arrest­ed in Spain. The Jus­tice Depart­ment said it was work­ing to take down the Keli­hos bot­net, which at times had more than 100,000 com­pro­mised com­put­ers that sent pho­ny emails adver­tis­ing coun­ter­feit drugs and work-at-home scams, har­vest­ed log-ins and installed mal­ware that inter­cept­ed bank account pass­words. Source: ABC News

Bad guys look for cheat codes in GameStop breach 

GameStop is inves­ti­gat­ing a poten­tial secu­ri­ty breach on its web­site involv­ing cus­tomer data and cred­it cards. The breached data could include cus­tomer card num­bers, expi­ra­tion dates, names, address­es and the three-dig­it card ver­i­fi­ca­tion val­ues typ­i­cal­ly found on the back of cred­it cards. Source: For­tune

Military men and women square off in cyber war games

The Nation­al Secu­ri­ty Agency is host­ing its 17th annu­al Cyber Defense Exer­cise (CDX), chal­leng­ing stu­dents at the U.S. Mil­i­tary, Naval, Coast Guard and Mer­chant Marine acad­e­mies, as well as under­grad­u­ate and grad­u­ate stu­dents from the Roy­al Mil­i­tary Col­lege of Cana­da. Their mis­sion is to defend net­works they have cre­at­ed from a red team com­posed of U.S., Cana­di­an and indus­try cyber war­riors. Source: Fed­er­al News Radio

Partnering up to provide protection

Trav­el­ers is mak­ing pre-breach cyber­se­cu­ri­ty ser­vices avail­able to pol­i­cy­hold­ers through cyber secu­ri­ty firm Syman­tec, which will pro­vide resilience readi­ness assess­ment, secu­ri­ty aware­ness train­ing videos and a secu­ri­ty coach help line. “As tech­nol­o­gy con­tin­ues to evolve and adver­saries become more sophis­ti­cat­ed, it’s impor­tant for busi­ness­es to under­stand the broad scope of poten­tial trou­ble spots in their IT infra­struc­ture and how they can mit­i­gate or reduce these risks,” said Pas­cal Mil­laire of Syman­tec. Source: Busi­ness Insur­ance

Fear of medical device hacks has pulses racing 

Reg­u­la­tors and med­ical-device mak­ers are brac­ing for an expect­ed bar­rage of hack­ing attacks. Tens of mil­lions of elec­tron­ic health records have been com­pro­mised in recent years; now, atten­tion is turn­ing to med­ical devices such as pace­mak­ers and insulin pumps. The Food and Drug Admin­is­tra­tion is coor­di­nat­ing with oth­er agen­cies on how to respond if a seri­ous med­ical device hack were to occur. Source: The Hill

There are bad dates, then there are really bad dates

A Phoenix man was arrest­ed on sus­pi­cion of mul­ti­ple charges after police say he stole a woman’s purse and cred­it card while on a date with her. David Har­low cre­at­ed an online dat­ing pro­file using the pseu­do­nym “Brad” and chat­ted with the iden­ti­ty-theft vic­tim for a few weeks before set­ting up a date with her, police said. Dur­ing a date, the woman went to the restroom and allowed Har­low to watch her belong­ings. When she returned, he had left with her cred­it card and purse, police said. Source: The Ari­zona Repub­lic

Yahoo hack suspect to sit in jail awhile, eh? 

A Cana­di­an judge denied bail to a man whom the Unit­ed States wants to extra­dite to face charges of involve­ment in a mas­sive hack of Yahoo email accounts. Pros­e­cu­tors argued that Karim Bara­tov, a Cana­di­an cit­i­zen born in Kaza­khstan, posed a flight risk. Jus­tice Alan Whit­ten agreed, remand­ing Bara­tov in cus­tody until May 26. The Unit­ed States says Bara­tov worked with Russ­ian intel­li­gence agents who paid him to break into at least 80 email accounts. Source: Reuters

This payoff isn’t what you’re looking for

Pay­day loan firm Won­ga suf­fered a data breach affect­ing up to 245,000 cus­tomers in the U.K. Some 25,000 more cus­tomers in Poland also may be affect­ed. The types of per­son­al data that may have been com­pro­mised includes names, email address­es, home address­es, phone num­bers, the last four dig­its of bank card num­bers (but not the whole num­ber) and/or bank account num­bers and sort codes. Source: Tech Crunch