September 16, 2014
Via: threats-and-malwareMore details have emerged about the attack on banking giant JP Morgan, which saw sensitive banking systems hacked and details about clients and deals apparently transmitted to systems in Russia. According to the latest disclosures, the hackers were able to […]
September 16, 2014
Via: threats-and-malwareTwo computer experts have discovered a way for strangers to get your personal information using a security hole that could leave you and your children vulnerable. Bryan Seely and Ben Caudill say they’ve discovered one of the biggest potential security […]
September 15, 2014
Via: threats-and-malwareDoom on a printer’s menu screen! Personally, we can’t wait until someone makes Descent playable on a toaster. On Friday, a hacker presenting at the 44CON Information Security Conference in London picked at the vulnerability of Web-accessible devices and demonstrated […]
September 15, 2014
Via: threats-and-malwareTop Obama administration officials knew just how vulnerable HealthCare.gov was to malicious security breaches when it launched, leaving data at risk to hackers that have already breached the website at least once. According to documents obtained by government oversight nonprofit […]
September 15, 2014
Via: threats-and-malwareA security researcher has uncovered several vulnerabilities, including a critical issue that exposed sensitive information, on the website of home automation company Nest Labs.
September 15, 2014
Via: threats-and-malwareLast month a story in the Wall Street Journal article sent a shudder down our collective parental spine. Google is planning to open Gmail and YouTube to kids under the age of 13. While the company will restrict this king’s […]
September 15, 2014
Via: threats-and-malwareIt is obvious, if not pathetic, why hackers break into the cloud to find and publish private nude photos of celebrities. CRM data may not seem to be the low hanging fruit of, say, a nationwide sweep of Home Depot […]
September 14, 2014
Via: threats-and-malwareEverything seems like it is connected to the Internet, just about, including TVs, home thermostats, sprinkler controls, door locks, egg trays , tooth brushes , and more. A study by HP shows that 70 percent of devices have vulnerabilities.
September 14, 2014
Via: threats-and-malwareBefore Jennifer Lawrence’s nude pics were hacked, model Joy says her private photographs were stolen despite her raising concerns with Apple Glamour model Joy Corrigan has hit out at Apple after she says she warned them about a threat to […]
September 14, 2014
Via: threats-and-malwareYou play the role of a former intelligence agent, specializing in computer security. When a chain of events sets off worldwide, leaving critical service disabled, you assume the role a computer hacker to find out what happened and attempt to […]
September 13, 2014
Via: threats-and-malwareWhat’s the most devastating thing you can tell an avid Steam user? No, not that Electronic Arts has somehow miraculously bought out Valve . The most devastating thing you can tell a Steam user is that a hacker has gained […]
September 12, 2014
Via: threats-and-malwareThe Gospel Herald reports that the a website promoting “Saving Christmas, an upcoming movie form Kirk Cameraon, was twice hacked by “a Turkish hacker group described as anti-Christian, anti-Israel and anti-American[.]” The production team was able to quickly restore the […]
September 12, 2014
Via: threats-and-malwareF-Secure has uncovered an unusual kind of malware thats spreading through Twitchs chat feature, which theyre calling Eskimo. The virus starts with a simple phishing scheme, claiming the target has won a phony raffle and offering a bad link to […]
September 12, 2014
Via: threats-and-malwareKnown as a visionary for his numerous contributions to the fields of cryptography and computer science, will provide attendees with an insider’s view into his historical work as well as a look into where we are going as an industry. […]
September 12, 2014
Via: threats-and-malwareThe launch of Apple’s mobile payment system could prove a turning point in the battle to secure your debit and credit card information from hackers. Tens of millions of card numbers have been stolen in the last few months from […]
September 11, 2014
Via: threats-and-malwareThere’s no need to panic about the nearly five million compromised Gmail passwords that appeared in a Russian Bitcoin security forum this week, according to Google. Fewer than 2% of the compromised username and password combinations work, Google’s spam and […]
September 11, 2014
Via: threats-and-malwareMIT is putting its considerable might behind a problem that many mothers would agree needs solving: the breast pump. Yes, the university is holding a particularly focused hackathon aimed at making the breast pump not suck. On September 20th and […]
September 11, 2014
Via: threats-and-malwareFinancial institutions are top spenders for cybersecurity, and with good reason: As data breaches become more sophisticated and commonplace, the industry’s vulnerabilities are becoming apparent. One of those worries is the risk of losing something that’s vital to the industry’s […]
September 10, 2014
Via: threats-and-malwareAdobe Flash Player 15.0.0.152, released on Tuesday, addresses a total of 12 security vulnerabilities, many of which could be exploited for code execution.
September 10, 2014
Via: threats-and-malwareThe Better Business Bureau said it expected scammers and hackers to take advantage of the recent news that photos of stars like Jennifer Lawrence and Kate Upton were leaked on the internet. It said it was too soon to know […]