Bookmark

Add to MyYahoo RSS

Computer Security News

News on Computer Security continually updated from thousands of sources around the net.

2 hrs ago | Switched

Healthcare Records vulnerable to Criminals

Just about every kind of healthcare related entity-hospitals, rehab centers, pharma companies, insurance carriers and more-have been and continue to be compromised by cyber criminals.

Comment?

Related Topix: Medicine, Science / Technology

6 hrs ago | Sky News

Chinese Government Shuns 'Expensive' Windows 8

The Chinese government will try to patch up the outdated Windows XP operating system -because it is too expensive to upgrade.

Comment?

Related Topix: Microsoft Windows, Science / Technology, Microsoft, Startups, Computers

10 hrs ago | Townhall

Privacy, Please

Scarlett Johansson left nude photos of herself on her computer. A hacker grabbed them and sent them to gossip websites.

Comment?

Related Topix: Computers, Celebrities, Scarlett Johansson, Hot Chicks, Science / Technology, Startups, Facebook, Social Software, Opinion

Tue Apr 22, 2014

ITworld

While Heartbleed distracts, hackers hit US universities

The panic over the Heartbleed bug is proving to be a convenient distraction for hackers using standard techniques in a fresh wave of attacks targeting at least 18 U.S. universities, according to a computer security researcher.

Comment?

Related Topix: Science / Technology

WHO-TV

Servers Hacked: Isu Information Vulnerable

Iowa State University says there is no evidence the data files containing the confidential information were accessed but it is still warning nearly 30,000 former students to be vigilant about their identity protection.

Comment?

Related Topix: Iowa State University, Science / Technology

Daily Mail

The Heartbleed bug poses the biggest threat to bank security by...

Online shoppers and internet bank customers are being warned to change their passwords to reduce the risk of falling victim to the online bug that can allow hackers to snatch credit card and bank details.

Comment?

Related Topix: Science / Technology, Parenting, Family

Linux Journal

Quantum Cryptography

Classical cryptography provides security based on unproven mathematical assumptions and depends on the technology available to an eavesdropper.

Comment?

Related Topix: Cryptography, Science, Computer Science, Science / Technology, Physics

IPod Observer

Jailbroken iPhones Give Up Apple IDs in Malware Attack

The iPhone jailbreak community is facing a malware threat that steals user's Apple IDs and passwords.

Comment?

Related Topix: Apple, Startups, iPhone

StarNewsOnline.com

Wilmington's Michaels store hit by hackers

Michaels has announced that its Wilmington's store at Mayfaire Town Center was one of the chain's outlets targeted by hackers last year and part of January this year.

Comment?

Related Topix: Michaels Stores, Retail, Science / Technology, CPU, New Bern, NC

Aurora Era-Banner

5 security vulnerabilities found in Google Glass

CBR rounds up five vulnerabilities already found in Google Glass by hackers just a week after Google made the high-tech specs available to the entire public for one day.

Comment?

Related Topix: Google, Startups, Science / Technology

CED

Service providers prime targets for hackers

The world's networks are under constant, relentless attack, including - perhaps especially - the networks of service providers.

Comment?

Related Topix: Science / Technology

Mon Apr 21, 2014

The Age

Spammers have ramped up their attacks on Twitter.

We seem to be in the middle of another wave of Twitter hacking, with spammers worming their way into your account so they can bombard your followers with tweets about miracle weight loss tips.

Comment?

Related Topix: Twitter, Science / Technology, Email Spam

The Age

The hidden costs of Heartbleed bug

The Heartbleed security bug is set to cost millions to clean up, according to an internet company that has crunched the numbers on the extra internet traffic costs imposed by it.

Comment?

Related Topix: CloudFlare

Truthdig

Hacker 'Weev' Is Out of Jail, But His 'Fight for Freedom' Isn't Over Yet

Andrew "Weev" Auernheimer walked out of the Federal Correctional Institution Allenwood in White Deer, Pa., on April 11 after spending over a year there when a federal appeals court vacated his conviction on hacking charges.

Comment?

Related Topix: Prison, Science / Technology, Ipad, US News, Liberal Political News

BayStreet.ca

Peter Publishing Newly Created DpaContactUs Contact Us Form Foils Hackers and Spammers

Due to the high number of hackers and spammers, dpaContactUs, a Contact Us Form was developed by Peter Publishing so that webmasters can protect their websites and their visitors from breaches of privacy and annoying practices.

Comment?

Related Topix: Science / Technology, World News, Malaysia, Email Spam

KRDO-TV Colorado Springs

Extreme password protection: How hackers keep themselves safe

That's what David Kennedy did. He's a security researcher and "ethical hacker," and remembers only one: It unlocks a password vault, an encrypted database that stores dozens of his other passwords.

Comment?

Related Topix: Science / Technology, iPhone

Daily Record

Take back a hacked email account

Q. My email account was hacked. What can I do to get it back? A. Your first step is to change your password.

Comment?

Related Topix: Science / Technology

Lowell Sun

Cyber cops: Target hackers may take years to find

Secret Service investigators say they are close to gaining a full understanding of the methods hackers used to breach Target's computer systems in December.

Comment?

Related Topix: US Secret Service, Science / Technology, Prison

The Daily Caller

Hacker resurrects late atheist Hitchens on Easter to push weight loss drug

Christopher Hitchens, author of "God is Not Great," poses in this Jan. 9, 2007 handout photo.

Comment?

Related Topix: Science / Technology, Garcinia cambogia, Supplement, Conservative Political News, US News

Sun Apr 20, 2014

NEWS.com.au

Facebook's extremely creepy new feature

FACEBOOK has introduced a new feature for its mobile users. On the surface, it seems to be a useful tool for people to use, but it's actually really creepy, THIS boy is Corey Worthington, but worse.

Comment?

Related Topix: Startups, Facebook, Social Software, Science / Technology, Marketing, Wireless, Emerging Technology, iPod touch App, iPad App, iPhone and iPad App, Gmail, iPhone App

•••
•••
•••
•••

Computer Security Jobs

•••
•••
•••
•••
•••