September 19, 2014
Via: threats-and-malwareLast night, researchers at MalwareBytes noticed strange behavior on sites like Last.fm, The Times of Israel and The Jerusalem Post. Ads on the sites were being unusually aggressive, setting off anti-virus warnings and raising flags in a number of MalwareBytes […]
September 19, 2014
Via: threats-and-malwareThe home page of the General Inspectorate of Romanian Police was hacked by the local Anonymous group, who posted a message on the News Section. “Greetings gentlemen. We are Anonymous. We are Legion. We are THE ROMANIAN PEOPLE or, of […]
September 19, 2014
Via: threats-and-malwareThe Home Depot security breach that was unveiled earlier this month has been assessed and it’s even more terrible than originally thought. 56 million unique credit cards were put to risk by hackers. The company claims that criminals used unique […]
September 19, 2014
Via: threats-and-malwareThe Home Depot said Thursday that about 56 million customer debit and credit cards were put at risk after hackers broke into the company’s payment systems. In a statement , the home improvement retailer said the malicious software used in […]
September 18, 2014
Via: threats-and-malwareLast week, a hacker with the Twitter tag @anonymousglobo posted links to what is allegedly the user names and passwords to the database of the town of Chester government website, as well as websites for the Pakistan and Ukraine government. […]
September 18, 2014
Via: threats-and-malwareOnce mobile devices are connected to car infotainment systems and cars are connected to the Internet, vehicles will become a rich source of data for manufacturers, marketers, insurance providers and the government. Oh, and they’ll be a lucrative target for […]
September 18, 2014
Via: threats-and-malwareBEIJING – Beijing on Thursday strongly denied a US congressional panel’s claim that Chinese government-linked hackers had launched dozens of cyberattacks on American defense contractors, saying the charges were “fabricated out of thin air”.
September 18, 2014
Via: threats-and-malwareApple announced on Wednesday the availability of iOS 8, the eighth major release of iOS. The latest version of the mobile operating system comes with fixes for more than 50 security vulnerabilities.
September 18, 2014
Via: threats-and-malwareMany severe vulnerabilities are fixed in the new version and remain in iOS 7.1.
September 17, 2014
Via: threats-and-malwareThe payment processor at the center of the data breach affecting Goodwill Industries International admitted that hackers held a foothold in their environment for more than year.
September 17, 2014
Via: threats-and-malwareSecurity researchers have uncovered a group of hackers that broke into 300 banks, corporations and governments for 12 years without being caught. The hacker collective from Germany exploited a loophole in the UK which enabled them to obtain security certificates […]
September 17, 2014
Via: threats-and-malwareSenate investigators are blaming China for nearly two dozen successful hacker break-ins of computer networks belonging to Pentagon contractors. A yearlong investigation announced Wednesday by the Senate Armed Services Committee identified at least 50 intrusions since 2012 against unspecified contractors […]
September 17, 2014
Via: threats-and-malwareOnly half of the model-actress and pitcher Justin Verlander’s private photos are removed from indexes as the search engine grapples with legal theories over “selfies,” copyright and fair use When hackers grabbed naked photos of Jennifer Lawrence , Kate Upton […]
September 17, 2014
Via: threats-and-malwareAccording to Steve McConnell, author of “Code Complete”, software development projects that reach 512,000 lines of code or more can see four to 100 coding errors per thousand lines of code. Coding errors create the software vulnerabilities that criminal hackers […]
September 17, 2014
Via: threats-and-malwareCustomers cringe every time they hear about a bank, retail or healthcare hack that puts personal or financial data at risk. Today’s hackers are after much more that credit card numbers, though — and most firms are powerless to stop […]
September 16, 2014
Via: threats-and-malwareAmazon is being forced to investigate a “security hole” that could let hackers gain access to customers’ accounts via Kindle e-books. The security flaw affects Kindle users who downloaded hacked e-books containing a certain script in the title, the Digital […]
September 16, 2014
Via: threats-and-malwareRetailers like Home Depot, which recently suffered a major data breach, have known for years about vulnerabilities in payment systems, but have chosen to ignore them, experts say. Home Depot decided only in January to buy technology that fully encrypts […]
September 16, 2014
Via: threats-and-malwareNew versions fix eight security vulnerabilities, several of which could result in system compromise.
September 16, 2014
Via: threats-and-malwarePayPal definitely does not run iCloud. It did not, through a confusing backup process and potentially weak security system, make it easier for hackers to collect and leak hundreds of nude pictures of female celebrities, which were then widely disseminated on […]
September 16, 2014
Via: threats-and-malwareThere’s an ever-growing feud between book lovers – the choice between paper and electronic seems to split people into groups. These days, however, you should probably be a little more careful if you’ve adopted the latter. It seems that there’s […]