<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style type="text/css" style="display:none;"><!-- P {margin-top:0;margin-bottom:0;} --></style>
</head>
<body dir="ltr">
<div id="divtagdefaultwrapper" style="font-size:12pt;color:#000000;background-color:#FFFFFF;font-family:Calibri,Arial,Helvetica,sans-serif;">
<p>Hey i noticed we hadn't really had anything new posted up yet so i would like to link you guys all to a interesting article i was reading over the weekend that has a interesting article about just a specific incident of phising in use.&nbsp;</p>
<p><a title="Ctrl&#43;Click or tap to follow the link" id="LPlnk941612" href="http://www.zdnet.com/article/the-fake-linkedin-recruiter-network-hackers-are-using-to-reel-in-business-users/">http://www.zdnet.com/article/the-fake-linkedin-recruiter-network-hackers-are-using-to-reel-in-business-users/</a></p>
<div style="margin-top: 20px; margin-bottom: 20px; overflow: auto; width: 100%;" id="LPBorder_GT_14445954515190.9962341041458893">
<table style="border-top: 1px solid rgb(204, 204, 204); border-bottom: 1px solid rgb(204, 204, 204); width: 80%; background-color: rgb(255, 255, 255); position: relative; overflow: auto;" id="LPContainer_14445954515090.6784990864998374">
<tbody>
<tr style="border-spacing: 0px;" valign="top">
<td colspan="1" style="width: 250px; position: relative; display: table-cell; vertical-align: middle; padding-right: 20px;" id="ImageCell_14445954515100.885263012663012">
<div style="margin-top: 12px; background-color: rgb(255, 255, 255); height: 192px; width: 250px; position: relative; padding: 0px; display: table;" id="LPImageContainer_14445954515100.147734818970244">
<a target="_blank" href="http://www.zdnet.com/article/the-fake-linkedin-recruiter-network-hackers-are-using-to-reel-in-business-users/" style="display: table-cell; text-align: center;" id="LPImageAnchor_14445954515160.22935918113611142"><img aria-label="Preview image with link selected. Double-tap to open the link." style="display: inline-block; margin-left: auto; margin-right: auto; max-width: 250px; max-height: 250px; height: 187px; width: 250px; border-width: 0px;" height="187" width="250" src="http://zdnet4.cbsistatic.com/hub/i/r/2015/10/08/a10ec141-a95c-400b-ae19-df9535ccafa0/thumbnail/770x578/51c741e069ccfd3e3fa087edf2cfb186/istock000017282754medium.jpg"></a></div>
</td>
<td>
<div style="top: 0px; margin-top: 8px; font-size: 21px; font-family: &quot;wf_segoe-ui_semilight&quot;,&quot;Segoe UI Semilight&quot;,&quot;Segoe WP Semilight&quot;,&quot;Segoe UI&quot;,&quot;Segoe WP&quot;,Tahoma,Arial,sans-serif; color: rgb(51, 51, 51); margin-left: 14px; margin-right: 14px;" id="LPTitle_14445954515180.9588406513210356">
The fake LinkedIn recruiter network hackers are using to reel in business users | ZDNet</div>
<div style="margin-top: 8px; font-size: 13px; font-family: &quot;wf_segoe-ui_normal&quot;,&quot;Segoe UI&quot;,&quot;Segoe WP&quot;,Tahoma,Arial,sans-serif; color: rgb(102, 102, 102); margin-left: 14px; margin-right: 14px;" id="LPDescription_14445954515180.1367270856762448">
Hackers known to use Zeus malware to hack critical infrastructure targets have developed an elaborate network of fake recruiter profiles for phishing on LinkedIn.</div>
<div style="margin: 8px 14px 10px; height: 18px; text-overflow: ellipsis; overflow: hidden; white-space: nowrap;" id="LPUrlContainer_14445954515190.6863213293458374">
<a target="_blank" href="http://www.zdnet.com/article/the-fake-linkedin-recruiter-network-hackers-are-using-to-reel-in-business-users/" style="font-size: 11px; font-family: &quot;wf_segoe-ui_normal&quot;,&quot;Segoe UI&quot;,&quot;Segoe WP&quot;,Tahoma,Arial,sans-serif; text-decoration: none;" id="LPUrlAnchor_14445954515180.6786286830563373">Read
 more...</a></div>
</td>
</tr>
</tbody>
</table>
</div>
<p><br>
</p>
<br>
<br>
<div style="color: rgb(0, 0, 0);">
<hr tabindex="-1" style="display:inline-block; width:98%">
<div id="divRplyFwdMsg" dir="ltr"><font style="font-size:11pt" face="Calibri, sans-serif" color="#000000"><b>From:</b> its-insec-bounces@listserv.ohio.edu &lt;its-insec-bounces@listserv.ohio.edu&gt; on behalf of Maloni, Dylan &lt;dm965111@ohio.edu&gt;<br>
<b>Sent:</b> Tuesday, October 6, 2015 11:20 PM<br>
<b>To:</b> Its-insec@listserv.ohio.edu<br>
<b>Subject:</b> [Its-insec] Thoughts</font>
<div>&nbsp;</div>
</div>
<div>
<div id="divtagdefaultwrapper" style="font-size:12pt; color:#000000; background-color:#FFFFFF; font-family:Calibri,Arial,Helvetica,sans-serif">
<div id="divtagdefaultwrapper" style="font-size:12pt; color:#000000; background-color:#FFFFFF; font-family:Calibri,Arial,Helvetica,sans-serif">
<p>Hello All,</p>
<p><br>
</p>
<p>First, I agree with Tucker and talked with Matt about even though we are doing analysis, we are still interested in learning about the security technologies. &nbsp;Second, I have two articles I found interesting, just talking about the rise in security breaches
 in general. &nbsp;I think this is a great time for us to be starting a group like this. &nbsp;</p>
<p><br>
</p>
<p><a href="http://www.infosecurity-magazine.com/news/ddos-attacks-jump-by-a-third-in-q2/" id="LPlnk527297" title="http://www.infosecurity-magazine.com/news/ddos-attacks-jump-by-a-third-in-q2/
Cmd&#43;Click or tap to follow the link">http://www.infosecurity-magazine.com/news/ddos-attacks-jump-by-a-third-in-q2/</a>&nbsp;</p>
<p>Due to the cheaper cost of hardware, DDoS attacks are becoming easier; Data from Corero's DDos report has an average of 4.5 DDos attacks a day per customer. &nbsp;</p>
<p><br>
</p>
<p><br>
</p>
<div id="LPBorder_GT_14441732902070.04529487690888345" style="margin-top:20px; margin-bottom:20px; overflow:auto; width:100%">
<table id="LPContainer_14441732902040.8669182176236063" style="border-top-color:rgb(204,204,204); border-top-width:1px; border-top-style:solid; border-bottom-width:1px; border-bottom-style:solid; border-bottom-color:rgb(204,204,204); width:80%; background-color:rgb(255,255,255); overflow:auto">
<tbody>
<tr style="border-spacing:0px" valign="top">
<td>
<div id="LPTitle_14441732902060.6586052931379527" style="top:0px; margin-top:8px; font-size:21px; font-family:wf_segoe-ui_semilight,'Segoe UI Semilight','Segoe WP Semilight','Segoe UI','Segoe WP',Tahoma,Arial,sans-serif; color:rgb(51,51,51); margin-left:14px; margin-right:14px">
DDoS Attacks Jump by a Third in Q2 - Infosecurity Magazine</div>
<div id="LPDescription_14441732902060.1329366189893335" style="margin-top:8px; font-size:13px; font-family:wf_segoe-ui_normal,'Segoe UI','Segoe WP',Tahoma,Arial,sans-serif; color:rgb(102,102,102); margin-left:14px; margin-right:14px">
DDoS Attacks Jump by a Third in Q2.Corero report claims shorter bursts of smaller attacks are the new norm</div>
<div id="LPUrlContainer_14441732902060.6958678651135415" style="margin:8px 14px 10px; height:18px; text-overflow:ellipsis; overflow:hidden; white-space:nowrap">
<a id="LPUrlAnchor_14441732902060.043636213056743145" href="http://www.infosecurity-magazine.com/news/ddos-attacks-jump-by-a-third-in-q2/" target="_blank" style="font-size:11px; font-family:wf_segoe-ui_normal,'Segoe UI','Segoe WP',Tahoma,Arial,sans-serif; text-decoration:none">Read
 more...</a></div>
</td>
</tr>
</tbody>
</table>
</div>
<br>
<a href="http://www.lightreading.com/security/security-strategies/atandt-corporate-it-attacks-up-458--in-2014/d/d-id/718497" id="LPlnk72930" title="http://www.lightreading.com/security/security-strategies/atandt-corporate-it-attacks-up-458--in-2014/d/d-id/718497
Cmd&#43;Click or tap to follow the link">http://www.lightreading.com/security/security-strategies/atandt-corporate-it-attacks-up-458--in-2014/d/d-id/718497</a>&nbsp;</div>
<div id="divtagdefaultwrapper" style="font-size:12pt; color:#000000; background-color:#FFFFFF; font-family:Calibri,Arial,Helvetica,sans-serif">
<br>
</div>
<div id="divtagdefaultwrapper" style="font-size:12pt; color:#000000; background-color:#FFFFFF; font-family:Calibri,Arial,Helvetica,sans-serif">
Serious rise in corporate attacks. &nbsp;AT&amp;T Chief Security Officer says companies need to get more serious, smart, and creative about security&nbsp;<br>
<div id="LPBorder_GT_14441735198840.039733181009069085" style="margin-top:20px; margin-bottom:20px; overflow:auto; width:100%">
<table id="LPContainer_14441735198830.4793255568947643" style="border-top-color:rgb(204,204,204); border-top-width:1px; border-top-style:solid; border-bottom-width:1px; border-bottom-style:solid; border-bottom-color:rgb(204,204,204); width:80%; background-color:rgb(255,255,255); overflow:auto">
<tbody>
<tr style="border-spacing:0px" valign="top">
<td>
<div id="LPTitle_14441735198830.8399557801894844" style="top:0px; margin-top:8px; font-size:21px; font-family:wf_segoe-ui_semilight,'Segoe UI Semilight','Segoe WP Semilight','Segoe UI','Segoe WP',Tahoma,Arial,sans-serif; color:rgb(51,51,51); margin-left:14px; margin-right:14px">
AT&amp;T: Corporate IT Attacks Up 458% in 2014 | Light Reading</div>
<div id="LPDescription_14441735198840.8352377095725387" style="margin-top:8px; font-size:13px; font-family:wf_segoe-ui_normal,'Segoe UI','Segoe WP',Tahoma,Arial,sans-serif; color:rgb(102,102,102); margin-left:14px; margin-right:14px">
More than half of organizations are still not not re-evaluating their information security even after high-visibility data breaches.</div>
<div id="LPUrlContainer_14441735198840.06781275128014386" style="margin:8px 14px 10px; height:18px; text-overflow:ellipsis; overflow:hidden; white-space:nowrap">
<a id="LPUrlAnchor_14441735198840.4669993950519711" href="http://www.lightreading.com/security/security-strategies/atandt-corporate-it-attacks-up-458--in-2014/d/d-id/718497" target="_blank" style="font-size:11px; font-family:wf_segoe-ui_normal,'Segoe UI','Segoe WP',Tahoma,Arial,sans-serif; text-decoration:none">Read
 more...</a></div>
</td>
</tr>
</tbody>
</table>
</div>
<br>
<br>
<p></p>
<p><br>
</p>
<p><br>
</p>
<div id="Signature">
<div id="divtagdefaultwrapper" style="font-size:12pt; color:#000000; background-color:#FFFFFF; font-family:Calibri,Arial,Helvetica,sans-serif">
<span style="font-size:10pt; font-family:'Times New Roman',Times,serif">Dylan R.&nbsp;Maloni</span>
<div><span style="font-size:10pt; font-family:'Times New Roman',Times,serif">B.S. Information &amp; Telecommunication Systems</span><br style="font-size:10pt; font-family:'Times New Roman',Times,serif">
<div><span style="font-size:10pt; font-family:'Times New Roman',Times,serif">Ohio University | 2016<br style="">
</span></div>
<div><span style="font-size:10pt; font-family:'Times New Roman',Times,serif"><br>
</span></div>
<div><span style="font-size:10pt; font-family:'Times New Roman',Times,serif">412.519.6079 |&nbsp;dm965111@ohio.edu&nbsp;</span></div>
<div><span style="font-size:10pt; font-family:'Times New Roman',Times,serif"><a href="https://www.linkedin.com/in/dylanmaloni" title="https://www.linkedin.com/in/dylanmaloni Cmd&#43;Click or tap to follow the link" id="LPNoLP">https://www.linkedin.com/in/dylanmaloni</a><br>
</span></div>
<div><br>
<div><font face="Arial, Helvetica, sans-serif"><br>
</font>
<div><span style="font-family:Arial,Helvetica,sans-serif"><br>
</span></div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</body>
</html>