Brian Krebs

From Wikipedia, the free encyclopedia
Brian Krebs
Brian Krebs

KrebsOnSecurity
Nationality American
Occupation Security Journalist and Investigative Reporter
Website
http://krebsonsecurity.com

Brian Krebs (born 1972 in Alabama) is an American journalist and investigative reporter. Krebs is the author of KrebsOnSecurity.com, a daily blog on computer security and cybercrime. From 1995 to 2009, Krebs was a reporter for The Washington Post, where he covered tech policy, privacy and computer security, and authored the Security Fix blog. He is also known for interviewing hacker 0x80.[1] On March 14, 2013, Krebs became one of the first journalists to become a victim of Swatting.[2] On December 18, 2013, Krebs broke the story that Target Corporation had been breached of 40 million credit cards. Six days later Krebs identified a Ukrainian man who Krebs said was behind a primary black market site selling Target customers’ credit and debit card information for as much as $100 a piece.[3]

Education

Krebs earned a B.A. in International Relations from George Mason University in 1994.[4]

Career

Krebs started his career at The Washington Post in the circulation department. From there, he obtained a job as a copy aide in the Post newsroom, where he split his time between sorting mail and taking dictation from reporters in the field. Krebs also worked as an editorial aide for the Editorial Department and the Financial Desk. In 1999, Krebs went to work as a staff writer for Newsbytes.com, a technology newswire owned by The Washington Post.[5]

When the Post sold Newsbytes in 2002, Krebs transitioned to Washingtonpost.com in Arlington, Virginia as a full-time staff writer. Krebs's stories appeared in both the print edition of the paper and Washingtonpost.com. In 2005, Krebs launched the Security Fix blog, a daily blog centered around computer security, cyber crime and tech policy. In December 2009, Krebs left Washingtonpost.com and launched KrebsOnSecurity.com.

Krebs has focused his reporting at his blog on the fallout from the activities of several organized cybercrime groups operating out of eastern Europe that have stolen tens of millions of dollars from small to mid-sized businesses through online banking fraud.[6] Krebs has written more than 75 stories about small businesses and other organizations that were victims of online banking fraud, an increasingly costly and common form of cybercrime.

He is perhaps best known for a series of investigative stories that culminated in the disconnection or dissolution of several Internet service providers that experts said catered primarily to cyber criminals. In August 2008, a series of articles Krebs wrote for The Washington Post's Security Fix blog led to the unplugging of a northern California based hosting provider known as Intercage or Atrivo.[7]

During that same time, Krebs published a two-part investigation on illicit activity at domain name registrar EstDomains, one of Atrivo's biggest customers, showing that the company's president, Vladimir Tšaštšin, recently had been convicted of credit card fraud, document forgery and money laundering.[8] Two months later, the Internet Corporation for Assigned Names and Numbers (ICANN), the entity charged with overseeing the domain registration industry, revoked EstDomains' charter, noting that Tšaštšin's convictions violated an ICANN policy that prohibits officers of a registrar from having a criminal record.[9] In November 2011, Tsastin and five other men would be arrested by Estonian authorities and charged with running a massive click-fraud operation with the help of the DNS Changer Trojan.[10]

In November 2008, Krebs published an investigative series that led to the disconnection of McColo, another northern California hosting firm that experts said was home to control networks for most of the world's largest botnets.[11] As a result of Krebs' reporting, both of McColo's upstream Internet providers disconnected McColo from the rest of the Internet, causing an immediate and sustained drop in the volume of junk e-mail sent worldwide. Estimates of the amount and duration of the decline in spam due to the McColo takedown vary, from 40 percent to 70 percent, and from a few weeks to several months.[12]

Krebs is credited with being the first journalist, in 2010, to report on the malware that would later become known as Stuxnet.[13] In 2012, he was cited in a follow-up to another breach of credit and debit card data, in this case potentially more than 10 million Visa and MasterCard accounts with transactions handled by Global Payments Inc. of Atlanta, Georgia.[14]

Selected articles from The Washington Post

Awards and recognition

  • 2011 Security Bloggers Network, "Blog That Best Represents the Industry"[15]
  • 2010 SANS Institute Top Cybersecurity Journalist Award[16]
  • 2010 Security Bloggers Network, "Best Non-Technical Security Blog"[17]
  • 2009 Winner of Cisco Systems' 1st Annual "Cyber Crime Hero" Award[18]
  • 2005 CNET News.com listed Security Fix as one of the top 100 blogs, saying "Good roundup of significant security issues. The Washington Post's Brian Krebs offers a userful, first-person perspective".[19]
  • 2004 Carnegie Mellon CyLab Cybersecurity Journalism Award of Merit[20]

Media appearances

Krebs is a frequent speaker on computer security and cybercrime topics.

In October 2011, he gave keynote addresses at

References

  1. Krebs, Brian. "Security Fix — Brian Krebs on computer and Internet security". Voices.washingtonpost.com. Retrieved 2012-02-14. 
  2. Jackman, Tom (2013-03-27). "‘SWATing,’ the seamy ‘underweb,’ and award-winning Fairfax cybercrime journalist Brian Krebs". The Washington Post. Retrieved 2013-07-27. 
  3. "Who Is Selling Target’s Data?". The New York Times Company. 2013-12-24. Retrieved 2013-12-27. 
  4. Krebs, Brian. "Symposium III: Cybersecurity". UC Santa Barbara. Retrieved 2013-07-27. 
  5. Weise, Karen (January 16, 2014). "Brian Krebs: The cybersecurity blogger hackers love to hate". Business Week. Retrieved January 17, 2014. 
  6. Krebs, Brian. "Security Fix — Report Slams U.S. Host as Major Source of Badware". Voices.washingtonpost.com. Retrieved 2012-02-14. 
  7. Krebs, Brian. "Security Fix — EstDomains: A Sordid History and a Storied CEO". Voices.washingtonpost.com. Retrieved 2012-02-14. 
  8. Krebs, Brian. "Security Fix — ICANN De-Accredits EstDomains for CEO's Fraud Convictions". Voices.washingtonpost.com. Retrieved 2012-02-14. 
  9. "The United States Department of Justice — United States Attorney's Office". Justice.gov. 2011-11-09. Retrieved 2012-02-14. 
  10. The Washington Post http://voices.washingtonpost.com/securityfix/2008/11/major_source_of_online_scams_a.htm |url= missing title (help). 
  11. "McColo Outage". Cbl.abuseat.org. Retrieved 2012-02-14. 
  12. Gross, Michael Joseph, "Stuxnet Worm: A Declaration of Cyber-War", Vanity Fair, April 2011.
  13. Waters, Jennifer, "What to do if you fear your credit card’s hacked", MarketWatch, March 30, 2012. Retrieved 2012-03-31.
  14. "RSA Conference | Security Blogger Meetup | And the Winners Are". 365.rsaconference.com. Retrieved 2012-02-14. 
  15. "2010 Top Cyber Security Journalist Award Winners". SANS. 2012-02-10. Retrieved 2012-02-14. 
  16. https://365.rsaconference.com/blogs/security-blogger-meetup/2010/03/04/theyre-all-winners
  17. http://www.cisco.com/en/US/prod/collateral/vpndevc/cisco_2009_asr.pdf
  18. "News.com's Blog 100 | CNET News.com". News.com.com. Archived from the original on 2012-07-17. Retrieved 2012-02-14. 
  19. "2004 Cybersecurity Journalism Awards :: CyLab". Cylab.cmu.edu. Retrieved 2012-02-14. 
  20. "Govcert.nl". Govcert.nl. Retrieved 2012-02-14. 
  21. "SECURE 2011". Secure.edu.pl. Retrieved 2012-02-14. 
  22. "Security Conference Toronto Canada — Sector 2012 | Schedule". Sector.ca. Retrieved 2012-02-14. 
  23. http://conference.first.org/2011/program/index.aspx"

External links

This article is issued from Wikipedia. The text is available under the Creative Commons Attribution/Share Alike; additional terms may apply for the media files.