Regional Computer Crime Education and Enforcement Group

RCCEEG StL is an organization of law enforcement officers, prosecutors and computer professionals in the St. Louis area and surrounding counties; dedicated to providing manpower, technical and legal assistance in computer crime education and investigation. Because of the technical complexities associated with computer-related crimes and evidence, and limitations of personnel and training, the RCCEEG was formed.

St. Charles County Cyber Crime Task Force

The St. Charles County Cyber Crime Task Force serves St. Charles, Lincoln, Warren,Pike, Marion, Ralls Counties, and all their municipalities. It is staffed by personnel from the St. Charles County Police Department, Franklin County Sheriff's Department, Lincoln County Sheriff's Department and the Police Departments of O'Fallon, St. Peters, Wentzville, St. Charles City, and St. Louis City.

The Missouri Internet Crimes Against Children Task Force

The Missouri Internet Crimes Against Children Task Force (MOICAC), as one of 61 Task Force Units funded by the United States Department of Justice, Office of Juvenile Justice and Delinquency Prevention, serves criminal justice agencies and citizens of Missouri by offering investigative, forensic and prevention training and resources in an effort to fight online child exploitation. Click to go to thier website.

IC3.gov News

IC3.gov News

Krebs on Security

In-depth security news and investigation

Author: BrianKrebs
Posted: 02-03-16
Author: BrianKrebs
Posted: 02-02-16
Author: BrianKrebs
Posted: 01-30-16
Author: BrianKrebs
Posted: 01-28-16
Author: BrianKrebs
Posted: 01-27-16

CERT Recently Published Vulnerability Notes

Comodo Chromodo browser,version 45.8.12.391,and possibly earlier,bundles the Ad Sanitizer extension,version 1.4.0.26,which disables same origin policy,allowing for the possibility of cross-domain attacks by malicious or compromised web hosts. Chromodo is based on an outdated release of Chromium with known vulnerabilities.
Author: CERT
Posted: 02-04-16
Netgear Management System NMS300,version 1.5.0.11 and earlier,is vulnerable to arbitrary file upload,which may be leveraged by unauthenticated users to execute arbitrary code with SYSTEM privileges. A directory traversal vulnerability enables authenticated users to download arbitrary files.
Author: CERT
Posted: 02-03-16
OpenELEC and derivatives utilize a hard-coded default root password,and enable SSH root access by default.
Author: CERT
Posted: 02-02-16
The Fisher-Price Smart Toy does not perform proper authentication of some API commands,and it may also use a vulnerable version of Android.
Author: CERT
Posted: 02-02-16
Huawei Mobile WiFi E5151,firmware version 21.141.13.00.1080,and E5186,firmware version V200R001B306D01C00,use insufficiently random values for DNS queries and are vulnerable to DNS spoofing attacks.
Author: CERT
Posted: 02-01-16