176
176
Dec 12, 2011
12/11
by
CSPAN2
tv
eye 176
favorite 0
quote 0
one most obvious is just malware distribution or selling off lease time. there's, you know, cyberwar tool, but what i discovered in your book that's fascinating, and you had an explanation, and that the -- one of the generations of the worm, the nodes reported how connected they were. >> right. >> the method that the authors were thinking about the structure of the social graph, and there were guys, i don't know if you ran into them at mit, wondering if it was not some huge censor net building a surveillance tool than a theft tool. did either of you run into that possibility? that somebody instrumented the net -- >> so there's robust discussion within the network about what the actual cause or use of the botnet was. you know, everything ranging from, you know, state-sponsored piece of malware that got out of a secret lab somewhere to, you know, the per -- prevailing theory now of monetizing malware. it's just too chatty. if you look at the modern advance persistent threat malware there now, they are not generating 250,000 a day and being chatty. this was n
one most obvious is just malware distribution or selling off lease time. there's, you know, cyberwar tool, but what i discovered in your book that's fascinating, and you had an explanation, and that the -- one of the generations of the worm, the nodes reported how connected they were. >> right. >> the method that the authors were thinking about the structure of the social graph, and there were guys, i don't know if you ran into them at mit, wondering if it was not some huge censor...
234
234
Dec 18, 2011
12/11
by
CSPAN2
tv
eye 234
favorite 0
quote 0
one is the most obvious is just malware distribution or selling off lease time. but i discovered in your book that i thought was just fascinating and you found an explanation which midline another explanation that in one of the generations of the worm, the nodes reported how connected they were. >> right. >> the authors were thinking of the social graph and there were some guys -- i don't know if you ever ran into these guys at mit were wondering whether conficker wasn't some gigantic sensor net that somebody was building basically a surveillance tool rather than a theft tool or -- did either of you run into that possibility? that somebody instrumented the net -- >> there's robust discussion within the conficker working group of what the actual cause or use of the botnet was. you know, everything ranging from, you know, state-sponsored piece of malware that got out of some secret lab somewhere to, you know, the prevailing theory right now that's being used for -- was being used to monetize scare ware, you know, certainly it could be. it's just too chatty. so if y
one is the most obvious is just malware distribution or selling off lease time. but i discovered in your book that i thought was just fascinating and you found an explanation which midline another explanation that in one of the generations of the worm, the nodes reported how connected they were. >> right. >> the authors were thinking of the social graph and there were some guys -- i don't know if you ever ran into these guys at mit were wondering whether conficker wasn't some...
320
320
Dec 30, 2011
12/11
by
CSPAN2
tv
eye 320
favorite 0
quote 0
correlation of the level of malware infections.my -- so i remember about a year ago, a large botnets was taken down and for awhile, spam fell off, but i have to say if i look historically at the number of spam messages caught every day, it looks like it's probably 10%-20% worse than it was before that happened. am i a good indicator of the state of -- >> it's a perspective situation; right? the operation you refer to is the roost bot take down, and we laugh at the reports coming in with one being zero impact on spam. one was 5%, the other 10%, and the other was 30%. we look at what's the real number, and we determined it was a perspective thing, and we called our friends at hotmail, and said did we do anything good for you? they saw a dropoff of spam of .0 # 7%. -- .07%. i was like, hoping for a bigger numberment the problem is they have the web mail providers with systems in place that prevent sending of spam from non-known mtas so really they had been blocking a lot of the spam hitting already, so we had a small impact with hotma
correlation of the level of malware infections.my -- so i remember about a year ago, a large botnets was taken down and for awhile, spam fell off, but i have to say if i look historically at the number of spam messages caught every day, it looks like it's probably 10%-20% worse than it was before that happened. am i a good indicator of the state of -- >> it's a perspective situation; right? the operation you refer to is the roost bot take down, and we laugh at the reports coming in with...
260
260
Dec 10, 2011
12/11
by
CSPAN2
tv
eye 260
favorite 0
quote 0
one is, the most obvious is just malware distribution or selling off lease time. there's, you know, cyber war tool, what i discovered in your book i thought was just fascinating, you had an explanation that in one of the generations of the worm, um, the nodes reported how connected they were. >> right. >> mentioned that their authors were thinking about the structure of the social ground. and there were some guys at mit who were wondering whether conficker wasn't some gigantic sensor net, that somebody was trying to build, basically, a surveillance tool rather than a theft tour. did either of you run into that possibility, that somebody instrumented the net to -- >> so there was robust discussion within the conficker work group of what their actual cause or use of the bot net was, you know, everything ranging from a state-sponsored piece of malware that got out of some secret lab somewhere to, you know, the prevailing theory right now that's being used to monetize scareware. you know, certainly it's just too chatty. i mean, so if you look at some of the modern adv
one is, the most obvious is just malware distribution or selling off lease time. there's, you know, cyber war tool, what i discovered in your book i thought was just fascinating, you had an explanation that in one of the generations of the worm, um, the nodes reported how connected they were. >> right. >> mentioned that their authors were thinking about the structure of the social ground. and there were some guys at mit who were wondering whether conficker wasn't some gigantic...
224
224
Dec 12, 2011
12/11
by
KGO
tv
eye 224
favorite 0
quote 0
they can install malware. they can make a remotely controlled network.our computer may be used to stoel stolen pornography. >> they are from scammers. they put out a warning to the public. microsoft does not call customers asking for money to fix their problem. >> we have very trust financing and i don't want it to happen to anyone else. >>> still ahead, a bay area teenager who got a prestigious award. and 12-year-old novato boy, we'll introduce you >>> bay area student could easily become a statistic. she was cutting class and drifting but now, she is changing the community. the story is from lyanne melendez. >> she was a high school student with no college aspirations. but she discovered she had a passion for social justice. >> we are facing those challenges. we live in poverty. a lot of people are not employed. a lot of people are fighting. a lot of people are killing one another. >> they went to this institute. here at the urban garden in richmond. she organized the community and trained local youths to appreciate agriculture. >> my role in this, i'm
they can install malware. they can make a remotely controlled network.our computer may be used to stoel stolen pornography. >> they are from scammers. they put out a warning to the public. microsoft does not call customers asking for money to fix their problem. >> we have very trust financing and i don't want it to happen to anyone else. >>> still ahead, a bay area teenager who got a prestigious award. and 12-year-old novato boy, we'll introduce you >>> bay area...
SFGTV2: San Francisco Government Television
281
281
Dec 10, 2011
12/11
by
SFGTV2
tv
eye 281
favorite 0
quote 0
we sent those computers a command that stopped teh malw -- stopped the malware. you will see the surveying today's threats is somewhat like peering into a kaleidoscope with even the slightest rotation presents new patterns of color and light and just when it seems you understand a threat, the world turns and the threat has changed. as tom friedman has described in his book, "the world is flat," advances in technology, travel, commerce, communication, and broken down barriers between nations and individuals, globalization has had a flattening effect, leveling the playing field for all of us. this hyper connectivity is in powering engaging people around the world, both friend and foe alike. how do we stay ahead of terrorists, spies, and hackers? intelligence will continue to drive our investigations. we must ask ourselves -- what do we know about these threats? what are the gaps in our intelligence? what human sources can we develop to cultivate to fill these gaps? each of us, government leaders and everyday citizens alike, must ask ourselves what vulnerabilities w
we sent those computers a command that stopped teh malw -- stopped the malware. you will see the surveying today's threats is somewhat like peering into a kaleidoscope with even the slightest rotation presents new patterns of color and light and just when it seems you understand a threat, the world turns and the threat has changed. as tom friedman has described in his book, "the world is flat," advances in technology, travel, commerce, communication, and broken down barriers between...
249
249
Dec 30, 2011
12/11
by
CSPAN2
tv
eye 249
favorite 0
quote 0
the most obvious is malware distribution are selling off. there is a cyber war tool but i discovered in your book that i thought was fascinating and he had an explanation but i thought there might be another explanation, that in one of the generations of the worm the nodes reported how connected they were. the method, the authors were thinking about the structure and there were some guys at m.i.t. who were wondering whether conficker wasn't some gigantic internet that somebody was trying to build basically a surveillance tool rather than a staff tool. did either of the run you run into that possibility? somebody instrumented the net? >> there was a robust discussion within the conficker working group but the actual cause or the use of the botnet everything ranging from state-sponsored piece of malware that got out of some secret lab somewhere to the prevailing theory right now that is being used to monetize scare where. certainly it's just too chatty. so if you look at some of the modern advancements of the threat malware out there right now
the most obvious is malware distribution are selling off. there is a cyber war tool but i discovered in your book that i thought was fascinating and he had an explanation but i thought there might be another explanation, that in one of the generations of the worm the nodes reported how connected they were. the method, the authors were thinking about the structure and there were some guys at m.i.t. who were wondering whether conficker wasn't some gigantic internet that somebody was trying to...
166
166
tv
eye 166
favorite 0
quote 0
you don't have to do anything going forward. >> mcafee has seen a spike of malware targeting the theid phones because the android operating system is open source that hackers can get into. mcafee found thousands targeting mac users. a little of both for all systems. keep an eye on it. >> this is scary. >> down load security software if you are shopping with your computer or tablet. shop at home. >> yeah. >> the qr codes are so much fun. >> they are. >> let's check with doug. he has a fun forecast, don't ya? >> very fun if you like rain and hoping for a little bit in the way of snow. some of you have a better chance than others seeing the snow. is wind is calm. a nice mild evening tonight. no rain reported across the area. the temperatures 55 in gaithersburg. some areas like fredericksburg sitting at 61 degrees. a nice, mild night tonight. low temperatures down to 50 in the city, which is way above average by 15 to 20 degrees. a mild night, a few showers toward the morning. a better chance of rain tomorrow. high temperature 62 in washington. 61 in gaithersburg. 60 in leesburg. watchin
you don't have to do anything going forward. >> mcafee has seen a spike of malware targeting the theid phones because the android operating system is open source that hackers can get into. mcafee found thousands targeting mac users. a little of both for all systems. keep an eye on it. >> this is scary. >> down load security software if you are shopping with your computer or tablet. shop at home. >> yeah. >> the qr codes are so much fun. >> they are. >>...
135
135
Dec 27, 2011
12/11
by
WMAR
tv
eye 135
favorite 0
quote 0
some contain malicious malware.apple is now running annual 12 days of christmas i tunes give away, offering free downloads each day. it's only available for customers in canada and europe. those are your tech bites, bites. >>> cold temperatures making things difficult for protesters in alaska. what they are using to stay warm maybe taken away. the protesters can't keep stoves and tents and they are saying it's catching. protesters say it infringes on their right of free speech. protesters say they are not leaving and time will tell. temperature has gotten down to a negative 14 degrees. that's cold. that is commitment. >> i thought they warmed up to negative 14. would have been improvement. we are waiting to tap in to that. january and february will be a much different story around here. here we go, look at this, 36 now, churchville. these are the cooler numbers, we are hugging the bay with temperature about 42 now dundalk, 41 annapolis. we get dry sweep here. not much going on yet. back in to the mountains, sprinkle
some contain malicious malware.apple is now running annual 12 days of christmas i tunes give away, offering free downloads each day. it's only available for customers in canada and europe. those are your tech bites, bites. >>> cold temperatures making things difficult for protesters in alaska. what they are using to stay warm maybe taken away. the protesters can't keep stoves and tents and they are saying it's catching. protesters say it infringes on their right of free speech....
144
144
Dec 30, 2011
12/11
by
CSPAN2
tv
eye 144
favorite 0
quote 0
the most obvious is malware distribution are selling off. there is a cyber war tool but i discovered in your book that i thought was fascinating and he had an explanation but i thought there might be another explanation, that in one of the generations of the worm the nodes reported how connected they were. the method, the authors were thinking about the structure and there were some guys at m.i.t. who were wondering whether conficker wasn't some gigantic internet that somebody was trying to build basically a surveillance tool rather than a staff tool. did either of the run you run into that possibility? somebody instrumented the net? >> there was a robust discussion within the conficker working group but the actual cause or the use of the botnet everything ranging from state-sponsored piece of malware that got out of some secret lab somewhere to the prevailing theory right now that is being used to monetize scare where. certainly it's just too chatty. so if you look at some of the modern advancements of the threat malware out there right now
the most obvious is malware distribution are selling off. there is a cyber war tool but i discovered in your book that i thought was fascinating and he had an explanation but i thought there might be another explanation, that in one of the generations of the worm the nodes reported how connected they were. the method, the authors were thinking about the structure and there were some guys at m.i.t. who were wondering whether conficker wasn't some gigantic internet that somebody was trying to...
288
288
Dec 10, 2011
12/11
by
WRC
tv
eye 288
favorite 0
quote 0
. >> mcafee says it's seen a big spike of malware targeting andtroid phones. hackers can easily get into it. mcafee said it found thousands of pieces of malware targeting mac users. >> a simple text message ruined one family's christmas surprise. >> david and jackie bought iphone for their two kids and told the atat clerk they were christmas presents. the next day the phone company sent the kids text messages asking them they they liked their new phones. at and t apologized for ruining the surprise and said it will no longer send out text message surveys around the holiday. >> it's a gat
. >> mcafee says it's seen a big spike of malware targeting andtroid phones. hackers can easily get into it. mcafee said it found thousands of pieces of malware targeting mac users. >> a simple text message ruined one family's christmas surprise. >> david and jackie bought iphone for their two kids and told the atat clerk they were christmas presents. the next day the phone company sent the kids text messages asking them they they liked their new phones. at and t apologized...
203
203
Dec 2, 2011
12/11
by
KPIX
tv
eye 203
favorite 0
quote 0
an email that the company hired forensic investigators and is working to eliminate the threat of malware>>> it's one of the biggest driving distractions. >> now a new survey shows cell phone use is the biggest safety concern for drivers. 39% of people surveyed named cell phone use and texting while driving as the biggest danger while on the road. that's more than double from a year ago. drunk driving was the next biggest fear. >>> coming up, we have damage control from gm. the unique offer it is making for owners of a chevy volt. >> and out with the new, in with the old. the frosty reception coca-cola is getting about their new christmas cans coming up. year after year. ore it feed me! saving you money -- now, that's progressive. call or click today. so i used my citi thank you card to pick up some accessories. a new belt. some nylons. and what girl wouldn't need new shoes? we talked about getting a diamond. but with all the thank you points i've been earning... ♪ ...i flew us to the rock i really had in mind. ♪ [ male announcer ] the citi thank you card. earn points you can use for trav
an email that the company hired forensic investigators and is working to eliminate the threat of malware>>> it's one of the biggest driving distractions. >> now a new survey shows cell phone use is the biggest safety concern for drivers. 39% of people surveyed named cell phone use and texting while driving as the biggest danger while on the road. that's more than double from a year ago. drunk driving was the next biggest fear. >>> coming up, we have damage control from...
233
233
Dec 29, 2011
12/11
by
KPIX
tv
eye 233
favorite 0
quote 0
the ticker in mcafee's headquarterses is tracking hackers and malware from all over the world.re are so many threats that mcafee issued its 2012 threat predictions. the top three are -- >> a convergence of activism with the "occupiers" to become cyber"occupiers." >> reporter: your smartphone could be hacked. >> we are seeing a dramatic increase in malware targeting mobile devices. >> reporter: and third. >> full-out cyberwar where country a targets country b and they use every means available to disrupt their critical infrastructure, rail systems, transportation, planes, and just take everything offline. >> reporter: about the ipad you gave grandma? >> we are seeing a dramatic increase in attacks targeting silver surfers for the elderly. >> reporter: so he says arm yourself. keep your software updated. change your passwords often and if an email is too good to be true it probably is. here's how easy it is for someone to get your information without you even knowing it. you go to a wi-fi hotspot one you always go to. a cyberthief could be waiting there. you log in thinking you'r
the ticker in mcafee's headquarterses is tracking hackers and malware from all over the world.re are so many threats that mcafee issued its 2012 threat predictions. the top three are -- >> a convergence of activism with the "occupiers" to become cyber"occupiers." >> reporter: your smartphone could be hacked. >> we are seeing a dramatic increase in malware targeting mobile devices. >> reporter: and third. >> full-out cyberwar where country a...
222
222
Dec 31, 2011
12/11
by
CSPAN2
tv
eye 222
favorite 0
quote 0
never about stealing money for writing malware. i got a huge endorphin rush when i was able to crack a system because it was like a video game by passing a security obstacle. i get the same endorphins today. i really feel good about it and it is thrill seeking. i get paid for what i did illegally years ago. which is pretty good. it is like how to take something that is a criminal activity and make it legal. >> when i saw you -- i knew -- nfc cellphone payments where they want to have -- it is -- is that pretty easily breakable as well? >> i haven't messed with that. there is a guy that if you google his name -- a hacker security code in las vegas was able to intercept at a substantial distance. the technology that i had to look at because of doing physical pen testing. haven't looked at that. >> so obviously you have experienced problems with the system. what type of advocacy do you do today in order to fix these things? you testified before congress and stuff like that but is there any more underground stuff going on? >> i haven't
never about stealing money for writing malware. i got a huge endorphin rush when i was able to crack a system because it was like a video game by passing a security obstacle. i get the same endorphins today. i really feel good about it and it is thrill seeking. i get paid for what i did illegally years ago. which is pretty good. it is like how to take something that is a criminal activity and make it legal. >> when i saw you -- i knew -- nfc cellphone payments where they want to have --...
301
301
Dec 8, 2011
12/11
by
KNTV
tv
eye 301
favorite 0
quote 0
. >> if this is going to a limited website, it would be downloading the malware on to my phone. >> reportermake sure you know what apps you're downloading. and if you have a question about an app provider, check on reviews. she says don't click on websites you've never heard of. and the same goes for suspicious holiday text messages. >> you can type it in and see if it's a real, verifiable link. >> reporter: when you're ready to make a purchase, look for the lock icon on the bottom of the screen. security experts say treat your mobile devices the way you treat your computer. password protect everything. that way if it gets lost or stolen, thieves won't have a holiday at your expense. >>> they're tricking and aggressive. >> lots of good information there. >>> let's turn things over to jeff ranieri. are we going to see frost tomorrow morning? the grass was full of it today. >> there's a possibility of more patchy fog in our interior section. it's going to be cold but warming up. 57 in napa. 58 in san jose. 57 in los gatos. we've seen something interesting happen over the past hour with our cu
. >> if this is going to a limited website, it would be downloading the malware on to my phone. >> reportermake sure you know what apps you're downloading. and if you have a question about an app provider, check on reviews. she says don't click on websites you've never heard of. and the same goes for suspicious holiday text messages. >> you can type it in and see if it's a real, verifiable link. >> reporter: when you're ready to make a purchase, look for the lock icon on...
24
24
tv
eye 24
favorite 0
quote 0
of the online weald many users worldwide have seen that puzzle data wiped out by a single piece of malware but what also is of course is now increasingly targeting corporate level computer systems as artie's correspondent michael craft the polls. now a virus is used to be created by disgruntled teenagers or so-called hacktivists the level of virus we're seeing nowadays definitely carries of distinct level of sophistication so many alone post it with twenty eleven losses a port of one hundred seventy million dollars thanks to viruses companies like labs here also predict the future where companies resort to closed systems in order to stave off fifty or file corruption now another thing hampering the industry is the emergence of free antivirus software which chips a lot of consumers into thinking they can protect themselves next to nothing it's like kaspersky himself said if you want to go to work you can book it's free but it'll take you ten times longer than if you spent some cash and caught the bus port of call now and finally there's some bad news for you mac users out there you think th
of the online weald many users worldwide have seen that puzzle data wiped out by a single piece of malware but what also is of course is now increasingly targeting corporate level computer systems as artie's correspondent michael craft the polls. now a virus is used to be created by disgruntled teenagers or so-called hacktivists the level of virus we're seeing nowadays definitely carries of distinct level of sophistication so many alone post it with twenty eleven losses a port of one hundred...
223
223
Dec 27, 2011
12/11
by
WJLA
tv
eye 223
favorite 0
quote 0
nook ora kindle, the wear of bargains that may end up costing you more -- some contain a malicious malware the can in fact your reader -- infect your reader. so far it is only available for customers in canada and europe. maybe it will be extended to u.s. customers today. >> everybody has something to do with that. we are all high-tech. what do you have? >> my iphone. >> i am doing the droid thing. i am content with it. >> we have a new iphone application. >> wjla at the itunes store. >> for the most part it works great. radar will come in handy today as we will have moderate to heavy rain showers. it will amount to about an inch by the time it is all wrapped up closer to dinner time tonight. southwestern virginia, points south from there, moving in from the southwest. crowds -- clouds are over the area. we will see it moving toward washington after the morning drive today. then it will become moderate to heavy for a few hours this afternoon before ending after the rush hour. a dry drive to work but a wet and drive home. notice of the moisture. very saturated air that is going to move into
nook ora kindle, the wear of bargains that may end up costing you more -- some contain a malicious malware the can in fact your reader -- infect your reader. so far it is only available for customers in canada and europe. maybe it will be extended to u.s. customers today. >> everybody has something to do with that. we are all high-tech. what do you have? >> my iphone. >> i am doing the droid thing. i am content with it. >> we have a new iphone application. >> wjla...
34
34
tv
eye 34
favorite 0
quote 0
hacking team of milan and gamma international based in britain offers customers actual spyware and malware lets them in fact computers and smartphones remotely and the company for nexium based in the czech republic creates materials that allow the military to identify individuals and track them based on what they call voiceprints a unique way of identifying a person based on their voice characteristics there are even firms that sell software just to translate and store all this data so they can be held and used by military and intelligence agencies pretty intense stuff as making leaks detailed in their press conference today these surveillance companies have been fake or at least selling their products to governments deemed persona non grata to us during the uprisings in countries like egypt syria tunisia and libya intelligence groups and the military relied on this technology to track anyone who expressed anti-government sentiments and in some cases those tools are responsible for their deaths at the hands of the government now while this technology is technically illegal to market for su
hacking team of milan and gamma international based in britain offers customers actual spyware and malware lets them in fact computers and smartphones remotely and the company for nexium based in the czech republic creates materials that allow the military to identify individuals and track them based on what they call voiceprints a unique way of identifying a person based on their voice characteristics there are even firms that sell software just to translate and store all this data so they can...
241
241
Dec 7, 2011
12/11
by
WUSA
tv
eye 241
favorite 0
quote 0
. >> you're 76% more likely to suffer a malicious attack or malware attack.re android phones than other type of smart phones so the bad guys will target the biggest pool of victims. there are nor android phones being sold than i phones or blackberry and it's easier to get an android app in an app store than apple store which has a tougher bouncer so to say. >> what about i phones or blackberries? >> they haven't found an attack or a virus on an iphone yet. >> not a single one? >> it's just not out there yet, at least not these companies haven't found one. >> not that we are encouraging one to develop one. >> nothing is fool-proof though. we know it can come any time. >> so what specifically could some of this malware do to your phone? >> in short, they are after your money. most of them are doing something in the background you don't even know. like sending expensive text messages or calling 1-900 numbers and no record of it until you get your bill. >> this is sort of like a lot of the viruses you would see more on pcs or windows users is the reason than an a
. >> you're 76% more likely to suffer a malicious attack or malware attack.re android phones than other type of smart phones so the bad guys will target the biggest pool of victims. there are nor android phones being sold than i phones or blackberry and it's easier to get an android app in an app store than apple store which has a tougher bouncer so to say. >> what about i phones or blackberries? >> they haven't found an attack or a virus on an iphone yet. >> not a...
351
351
tv
eye 351
favorite 0
quote 0
. >> somebody created a free version on the android app store loaded with malware.d it, it's sending out information from your phone. >> private information like where you live, where you bank, your banking account numbers who recollects your contacts and friends are. how to protect yourself? use common sense. watch your apps and don't click on anything too good to be true. >> we are going to see a lot of scams, click here to donate money. it's one where they want to tug on your heart strings. click this link to donate $10 to whatever. you have to make sure the links you are going to are legitimate. >> reporter: scammers want to reach out and touch you. be careful, the data you save could be your own. >>> in september, a zombie virus affected 1 million cell phones in china in one week. >>> the widow of a south florida tabloid photo editor killed in the anthrax attacks. her husband was the first person to die when the deadly anthrax was mailed in letters in 2001. she says the anthrax was on the letter passed around the office because it was so odd. >> robert was pass
. >> somebody created a free version on the android app store loaded with malware.d it, it's sending out information from your phone. >> private information like where you live, where you bank, your banking account numbers who recollects your contacts and friends are. how to protect yourself? use common sense. watch your apps and don't click on anything too good to be true. >> we are going to see a lot of scams, click here to donate money. it's one where they want to tug on...
170
170
Dec 29, 2011
12/11
by
KTVU
tv
eye 170
favorite 0
quote 0
the first basic step is to put anti-malware software on all devices because they can all be hacked. >>> job seekers may not be getting much of a break next year. fewer than one-fourth of hiring managers plan to add more workers next year. they'll hire more permanent employees in 2012. 7% of companies plan to cut staff at the same percentage last year. >>> holiday sales were up this year. shopper track says people spent $44 billion during the week before christmas. that's up 15% compared to a year earlier. and on the day after christmas, shoppers spent $7 billion. that's up 25%. overall, holiday sales are expected to be up 3.7% from last year. >>> investor confidence was shaken by the on going debt crisis in europe. the dow, nasdaq, and s and p all fell today. 16-point loss on the s and p sent that index into negative territory for the year. nasdaq declined 35 points to 2589. >>> new year's eve is just a couple of days away. the nation continues to try and recover from the recession. if all the parties planned in san francisco are any indication, things appear to be moving in the right
the first basic step is to put anti-malware software on all devices because they can all be hacked. >>> job seekers may not be getting much of a break next year. fewer than one-fourth of hiring managers plan to add more workers next year. they'll hire more permanent employees in 2012. 7% of companies plan to cut staff at the same percentage last year. >>> holiday sales were up this year. shopper track says people spent $44 billion during the week before christmas. that's up...
250
250
Dec 3, 2011
12/11
by
KPIX
tv
eye 250
favorite 0
quote 0
and they will take any necessary additional steps to eliminate the threat caused by malware, a message slow to arrive at the oakland store. you said that nothing happened. >> please leave you. >> said that nothing happened. >> please leave. >> now you're telling me you can't answer any questions? >> please leave. >> i can't. >> is it that nothing happened or you can't answer any questions? obama robert lyles, cbs 5. >>> jetro isn't saying how many customers are affected but it has set up a fraud program. customers who suspect their cards have been tampered with are being advised to cancel the credit card then contact the store. >>> it looks like tomorrow is decision day for gop presidential candidate herman cain. >>> tomorrow in atlanta i will be making an announcement but nobody going to get to make that prematurely. >> he is going to talk with his wife to determine whetherish continue his bid after allegation of a 13-year affair. cain denies it. he says he gave the woman money without telling his wife. >>> presidential candidate michele bachmann was challenged on the topic of same-se
and they will take any necessary additional steps to eliminate the threat caused by malware, a message slow to arrive at the oakland store. you said that nothing happened. >> please leave you. >> said that nothing happened. >> please leave. >> now you're telling me you can't answer any questions? >> please leave. >> i can't. >> is it that nothing happened or you can't answer any questions? obama robert lyles, cbs 5. >>> jetro isn't saying how...
338
338
Dec 28, 2011
12/11
by
WBFF
tv
eye 338
favorite 0
quote 0
--malware--piratinn books --spammed--how can you avoid authors you know--free samles first to test thety --what do you do if you were pcamed? if you would like more business bureau, log onto our website.... fox baatimore dot com slash morning. while you're there... get your latest headlines, weather foxbaltimore dot com... á andá it's all free. coming up.. trapped in their car onn christmas day...how a family cheated death... while their car as entombed in snow.. snow..nats of croc.. and . don't mess with "elvis"...his retaliation on this lawnmowee... aad the injuuy he sustained in the fight. you're watching foxx45 morning news.. all local.. all morning. ((break 4))roscopes)))- of phylicia barnes disappearance. her family's quest for juutice... on fox 45 news at 5:30. ú 3 3 3 p map ffber map onn year ago today, she weet missinn.to this day... family and friends of phylica barnes are still searchinn for answers.the north carolina teen was visiting family in baltimore when she went missing... launching an intense search by the public for months.barnns' body was eventualll found in april
--malware--piratinn books --spammed--how can you avoid authors you know--free samles first to test thety --what do you do if you were pcamed? if you would like more business bureau, log onto our website.... fox baatimore dot com slash morning. while you're there... get your latest headlines, weather foxbaltimore dot com... á andá it's all free. coming up.. trapped in their car onn christmas day...how a family cheated death... while their car as entombed in snow.. snow..nats of croc.. and ....
311
311
Dec 22, 2011
12/11
by
CNNW
tv
eye 311
favorite 0
quote 0
are key words that you may be lulled into feeling comfortable with you click onto a website and the malwarein the system, and everyone connected to you is now infected. >> who is doing it? and the u.s./china commission report, all kinds of big government reports, talking about state-sponsored hacking, just something that is an issue for corporate security. >> one of the problems that the -- the attackers have what it appears to be from all accounts and with the white house and other people are saying is state-sponsored coordinated attack to take our intellectual property and spy on us, and the defense is a bunch of private industries in america, so you can't get a -- the same kind of coordinated defense as the attacker. playing field is not really level. >> what do they want from us? they want intellectual property? ideas, patents? other e-mails to continue to infiltrate? what is it that they want? >> they use it in a number of bad interesting ways. sometimes to low bid on international contracts that that has occurred, to get -- to steal the research and development so they don't have to d
are key words that you may be lulled into feeling comfortable with you click onto a website and the malwarein the system, and everyone connected to you is now infected. >> who is doing it? and the u.s./china commission report, all kinds of big government reports, talking about state-sponsored hacking, just something that is an issue for corporate security. >> one of the problems that the -- the attackers have what it appears to be from all accounts and with the white house and other...