Add to MyYahoo RSS

Computer Security News

News on Computer Security continually updated from thousands of sources around the net.

1 hr ago |

New tech protects cars from hackers

Two security experts who a year ago exposed methods for hacking the Toyota Prius and Ford Escape say they have developed technology that would keep cars safe from cyber attacks.


Related Topix: Science / Technology, Hybrid, Ford Escape, Ford, SUV, Coupe, Toyota Prius, Hatchback, Toyota, Sedan

5 hrs ago | CNews

StubHub was victim of cyber fraud ring; arrests to be announced

SEATTLE/BOSTON - eBay Inc's StubHub online ticket resale service said it was the victim of a massive international cyber fraud ring, the details of which authorities plan to disclose on Wednesday as they announce arrests in the case.


Related Topix: Science / Technology

Tue Jul 22, 2014

The Arizona Republic

9/11 panel: Terrorism fight in 'dangerous phase'

The global struggle against terrorism has "entered a new and dangerous phase" with growing threats posed by foreign fighters returning from the civil war in Syria and the vulnerability of critical systems to cyber attack, the original authors of the 9/11 Commission report concluded in a new analysis.


Related Topix: Terrorism, Science / Technology, US News, US Politics, Michael McCaul, Republican, US House of Representatives

CNet News

Two Major Media Outlets Fall Prey to Hackers

NEWS ANALYSIS: The Wall Street Journal and MSNBC were victims of hackers. The attacks show insecurity on major media platforms that can potentially be fixed.


Related Topix: Science / Technology, Social Software, Startups, Facebook


Hacker Musician Turns E-Waste Into an Awesome Instrument

We tend to think of musical instruments in fixed terms: that's a guitar, this is a saxophone, that's a synthesizer.


Related Topix: Science / Technology, Urbana, IL

DNA India

Over 30 financial institutions defrauded by phone apps used to intercept passwords

More than 30 financial institutions in six countries have been defrauded by sophisticated criminal software that convinces bank customers to install rogue smartphone programs, a major security company reported on Tuesday.


Related Topix: Science / Technology, Trend Micro, Software


Phishing Alert: 8 Tips to Protect Yourself from Attacks

It's as easy for hackers to phish out your personal data as it is to sit in a canoe on a still pond, cast the bait and wait for the fish to bite.


Related Topix: Science / Technology

Snowden: hackers must make privacy tools for everybody

Edward Snowden has upped the ante in his war against government surveillance, addressing attendees of a hacking conference to join together in fighting snooping by building tools to help protect the public.


Related Topix: Science / Technology


Big DDoS Attacks Hit Record in 2014

NTP attacks provide hackers with the ability to generate high-volume DDoS traffic to target Web sites or public-facing devices in order to disrupt services.


Related Topix: Science / Technology, Computers, Arbor Networks, Software

Mon Jul 21, 2014

The Age

'Anonymous' strikes Kenya defence ministry's Twitter account

Johannesburg: Hackers hijacked the Twitter accounts of Kenya's Ministry of Defence and its spokesman, sending out tweets Sunday and Monday about corruption and starving children.


Related Topix: World News, Kenya, Africa, Science / Technology, Twitter

Fast Company

How Hackers Are Hijacking News Sites Using Bitly

Hackers are using the custom shortened links of real media outlets, including MSNBC and Fox News, to send readers to fake news sites instead.


Related Topix: Science / Technology, Email Spam, Business News

Government Executive

Hackers Exploit MH17 Sorrow; Redirect Online Tributes to Malware

A man holds a sign which reads " MH17 Victims Rest In Peace" during a candlelight vigil for the victims who were on board the Malaysia Airlines jetliner.


Related Topix: Science / Technology, Air Accidents


Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

Cybercriminals are spreading a new file-encrypting ransomware program that's more powerful and resilient than Cryptolocker, a threat recently shut down by the U.S. Department of Justice.


Related Topix: US News, Economics News, Bitcoin, Science, Computer Science, Cryptography, Science / Technology

CNet News

'Zombie Zero' Cyber-Attacks Hit Logistics, Robotic Firms for Months

The supply-chain cyber-attack infiltrated logistics firms and robotics manufacturers for more than a year, according to new details provided by TrapX Security.


The Washington Post

Kenya military Twitter account hacked

A military spokesman says the Twitter account run by Kenya's military has been taken over by hackers claiming to be from the activist collective Anonymous.


Related Topix: Science / Technology, World News

Information Technology

SPYRUS Announces New Ruggedized Water Resistant Versions of Certified Windows To Go Live Drives

The drive can function in temperatures as low as 0C degrees or as high as 70C degrees, and function if accidentally submerged in water.


Related Topix: Microsoft, Startups, Science, Computer Science, Weather, Cryptography, Science / Technology

Express India

Trend Micro builds safer mobile gaming experience in India

Trend Micro Inc has come together with mobile game developers from India and around Asia to set up the Safe Gaming Alliance.


Related Topix: Trend Micro, Science / Technology, Software, Social Software


Hackers Extorting With Stolen Photos Increasingly Common

The e-mail terrified the young mother. "What if I told you I had pics of you?" the unknown writer asked.


Related Topix: Science / Technology, Criminal Defense Law, Law, Dover, NH, US News

Sun Jul 20, 2014


Domestic and Foreign Spying Threaten Cloud Data Security

If your organization's got a lot riding on the continued security of its confidential or proprietary data, then you need to stay informed on the threats and how to address them.


Related Topix: Science / Technology, Cloud Computing, Science, Computer Science


Wilson's Weekend Whine: Snowden's call for online encryption is sad but necessary

It was quite a coup for HOPE . At the 2014 hacker event, Hope X, in New York City this weekend, Edward Snowden delivered a speech to those in attendance, advocating the use of encryption online.


Related Topix: Science / Technology


Computer Security Jobs