FBI nabs 'Anonymous' hacker who went after site of KISS leader Gene Simmons Hyper intelligent bank account robbing code unleashed by hacker. “Cross-site scripting (XSS) flaws allow attackers to present content under their control in the context of a vulnerable yet trusted site, thus tricking marks into handing sensitive information to miscreants. As well as creating a means to present pop-ups that link to a hacker-controlled site, XSSes can also lead to cookie theft.” FBI Arrests ‘Anonymous’ Member for Attack Against GeneSimmons.com. The ultimate KISS off? Malicious apps pulled from Android market over hidden SMS functionality. The apps, which Google has already pulled, are counterfeit versions of popular games, including Angry Birds. Would have sent messages to numbers that charge fees. FBI acknowledges more hacker attacks on public utilities. Michael Welch, the deputy assistant director of the FBI’s Cyber Division, confirms more attacks than were previously known. DHS’s Industrial Control Systems Cyber Emergency Response Team reiterates warning from last year that SCADA systems can be detected by a new breed of Internet scanners such as Sh0dan (PDF). Internet Explorer users not as smart when it comes to security. Of course not. No real Geek would use IE. Handful of Chinese hackers responsible for majority of attacks. Majority of attacks and intrusions from China conducted by as few as a dozen hacker groups, many in coordination with or under the direction of Chinese government. Congress officially approves military action in cyberspace. Defense authorization act states that “Congress affirms that the Department of Defense has the capability, and upon direction by the President may conduct offensive operations in cyberspace to defend our Nation, allies and interests.” Still no definition of what a cyber act of war is. Also: U.S. Army inaugurates first dedicated computer network operations brigade. FTC reportedly probing Carrier IQ over tracking software in phones. Software lets companies track cell phone use without permission. Related content opinion Why Bitcoins are Just as Viable as Any Other Currency The true value of any currency is a reflection of how much people believe it's worth, according to CIO blogger Constantine von Hoffman. But it's wise to remember just how fast beliefs can change. By Constantine von Hoffman Apr 15, 2013 4 mins Government Technology Industry opinion No Surprise: Docs Show Obama Administration Lying About Drones President Obama has repeatedly said drones would only be used against members of al Qaida and allied groups. However, leaked intelligence documents show the administration has been using them to settle political and tribal feuds for at least four yea By Constantine von Hoffman Apr 10, 2013 3 mins Regulation Government opinion How Big Data Can Quickly Become Big Garbage The bigger the data the bigger the chance of mistakes or inaccuracies. In that vein, a large database used by retailers to screen people accused of stealing from employers is identifying innocent people and could result in major lawsuits, according t By Constantine von Hoffman Apr 04, 2013 2 mins Big Data opinion Why Crazy Trumps Logic on the Internet The earth is flat. Vaccines cause autism. 9/11 was a government conspiracy. These are just a few of the many ideas that continue to find adherents online despite overwhelming proof that they're not based on fact. CIO.com blogger Constantine von By Constantine von Hoffman Apr 02, 2013 3 mins Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe