Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 800 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

Contractor indicted for sabotaging IT system he set up

Friday, March 20, 2009

A grand jury this week indicted a former IT contractor for an oil and gas company on charges that he sabotaged a computer system he was hired to set up, allegedly because he was upset at not being offered a permanent job.

Mario Azar, a 28-year-old man from Upland, California, will be charged with one count of unauthorized impairment of a protected computer, according to the U.S. attorney for the central district of California, Thomas P. O'Brien.

According to the indictment, Azar illegally accessed the PER computer system in May and June of 2008 and "caused damage by impairing the integrity and availability of data," causing thousands of dollars in damages.

Azar was an IT consultant under contract with the Long Beach-based Pacific Energy Resources, Ltd. until May 2008, when he left the company, according to a release from the U.S. attorney.

Azar was reportedly hired to help set up a computer system that PER used to communicate between its offices and its oil platforms. The computer system also was designed to detect oil leaks on the rigs.

The company said the sabotage did not result in any leaks or environmental impacts.

Security experts said the incident underlines the importance of revoking access for former employees the moment they are dismissed and setting up a strong network security system to avoid being compromised.


View more news

 
  Most Popular
. Computer Security

. Ethical Hacking

. Windows 7: the untold story of how the enterprise gets snubbed

. Open source identity: Linux founder Linus Torvalds

. FAQ: How to protect your PC against the Downadup worm

. Brocade's new CTO takes aim at Cisco

. Heartland tries to rally industry in wake of data breach

. IBM confirms layoffs

. Apple puts iPhone Nano and Netbook rumors to rest

. Microsoft 'can't imagine' PS3 catching up to Xbox 360
 
 
  Popular Searches
 
 
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html