About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
What's up IT?
Wi-Fi hopper guilty of cyber-extortion
Monday, 28 June 2004 13:33 EST

A Maryland man with a grudge against a Connecticut-based patent firm used unsecured wireless networks at homes and businesses in the Washington DC area to penetrate the company's computers and deliver untraceable threats and extortion demands, until an FBI surveillance team caught him in the act. Myron Tereshchuk, 42, pleaded guilty this month to a single charge of "attempted extortion affecting commerce" for demanding a $17m ransom in exchange for not broadcasting proprietary information he obtained from MicroPatent, LLC, an intellectual property firm that packages patent and trademark information for law firms.

Tereshchuk ran a small, competing patent document service that ran into trouble when he was allegedly caught removing files from US Patent and Trademark Office, and was temporarily banned from the facility. Tereshchuk believed he was the victim of corruption at the patent office, and blamed MicroPatent, according to court records. He began penetrating the company's computers, going through its trash, and pseudonymously sending harassing e-mails to its customers and president.



Featured Articles

Tribal thinking in today’s IT
George Santayana once famously observed; “Those who cannot remember the past are condemned to repeat it.”. But when it comes to IT security, a better way of thinking might be; “those who fail to understand the impact of the past on their thinking may find themselves somewhat exposed”…

You can’t manage what you can’t see!
Security threats have grown more menacing with the appearance of the likes of Sober, Mytob, and Bagle. Along with the newer trends of spyware, phishing and key logging the implications of ineffective information security have become potentially debilitating to business operations and indeed strategy.

The development and execution of an endpoint security strategy is an increasingly important and urgent issue for businesses of all sizes. Many are executing – or wanting to execute - flexible working practices and organisation models that leverage contemporary technology.

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




Press Releases

Parasoft Jtest Wins Best Application Test Tool as part of InfoWorld's Annual Technology of the Year Awards
Akonix Security Center Publishes IM Threat Watch for December 2005
Tool for camouflaging threats in WMFs discovered, informs Panda Software

Copyright © IT-Observer.com 2000 - 2006    Privacy Policy | RSS Feeds
Site Meter