Add to MyYahoo RSS

Computer Security News

News on Computer Security continually updated from thousands of sources around the net.

32 min ago |

Here's What Hackers Can Do With Your CRM Data

It is obvious, if not pathetic, why hackers break into the cloud to find and publish private nude photos of celebrities. CRM data may not seem to be the low hanging fruit of, say, a nationwide sweep of Home Depot customer accounts, but a closer look suggests it is - and possibly even more lucrative for hackers.


Related Topix: Science / Technology, Salesforce, Business News

4 hrs ago | Finextra Research news

6 Ways to Protect your Internet of Things from Hackers - community blog from Robert Siciliano

Everything seems like it is connected to the Internet, just about, including TVs, home thermostats, sprinkler controls, door locks, egg trays , tooth brushes , and more. A study by HP shows that 70 percent of devices have vulnerabilities.


Related Topix: Laptops/Notebooks, Emerging Technology, Wireless

8 hrs ago |

Stunning model Joy Corrigan's anger at nude pics being hacked before Jennifer Lawrence scandal

Before Jennifer Lawrence's nude pics were hacked, model Joy says her private photographs were stolen despite her raising concerns with Apple Glamour model Joy Corrigan has hit out at Apple after she says she warned them about a threat to her private pictures. Joy, 20, who posts some pretty racy pictures on her own Instagram page, is not happy that her privacy has been violated by hackers.


Related Topix: Instagram, iPod touch App, iPad App, iPhone and iPad App, iPhone App

13 hrs ago | The Columbus Dispatch

How to keep your private photos safe from hackers

The E-Edition includes all of the news, comics, classifieds and advertisements of the newspaper. And it's available to subscribers before 6 a.m. every day.


Related Topix: Science / Technology, The Hunger Games, Jennifer Lawrence, iCloud

17 hrs ago | NewsFactor

Hackers Crack has been hacked. The U.S. Department of Health and Human Services has confirmed that part of the site was breached in July by hackers who uploaded malware to a test server.


Related Topix: Science / Technology, Medicaid, Health, Medicare, US Politics, US News, Republican, US House of Representatives, Darrell Issa

Sat Sep 13, 2014


Exosyphen Studios Hacker Evolution v3.12-OUTLAWS

You play the role of a former intelligence agent, specializing in computer security. When a chain of events sets off worldwide, leaving critical service disabled, you assume the role a computer hacker to find out what happened and attempt to stop it.


Related Topix: Hacker Evolution, exoSyphen Studios, Video Games, Science / Technology

Vallejo Times-Herald

Apple's new products ratchet up need for privacy protections

Apple's release of the Apple Watch and iPhone6 makes it clear that Silicon Valley's future will be directly tied to its ability to protect tech users' privacy. Securing Americans' personal information in an increasingly tech-dominated world has to be a higher priority for tech leaders and the valley's congressional and legislative delegations.


Related Topix: iPhone, Opinion

Cinema Blend News

Steam Malware Wipes Out Your Steam Wallet Account

What's the most devastating thing you can tell an avid Steam user? No, not that Electronic Arts has somehow miraculously bought out Valve . The most devastating thing you can tell a Steam user is that a hacker has gained access to their Steam account and all their goods could be in danger.


Related Topix: Science / Technology

InformationWeek Customers: Heed This Advice

Beyond making sure all employees have up-to-date anit-virus software, the key advice from this article for SFDC customers: Salesforce offers... a powerful multi-factor authentication feature, which is offered by just 16% of cloud providers. When you have multi-factor authentication turned on, the first time a user accesses from a computer using his username and password, he receives an SMS message with a code he must enter to gain access.


Related Topix: Salesforce, Marketing

Shanghai civil service rolls out non-Apple smartphone programme

Thousands of Shanghai civil servants were given a new work smartphone last week as part of a municipal government effort to bolster information security and spread home-grown brands. The workers received a device made by Coolpad, which was ranked third in the mainland smartphone market by tech research firm IDC.


Related Topix: Science / Technology, iPhone, Cameras


Should You Trust a Site to Check If Your Gmail Password Was Leaked?

In the wake of the latest leak involving 5 million Gmail addresses and passwords, the advice was the same one we give in every situation like this: Change your password - especially if you re-use it on multiple services and websites. But if you're checking to see if your email address and password is on the leaked list, beware of how you do it.


Related Topix: Science / Technology

Fri Sep 12, 2014


JPMorgan says no cyber attack-related customer fraud seen

JPMorgan Chase & Co said it had not seen any unusual customer fraud related to a recent cyber attack on the bank. Chase customers will not be liable for unauthorized transactions on their account provided they promptly alerted the bank, it said in a filing.


Related Topix: Science / Technology, Banking, JP Morgan Chase

KHQA-TV Quincy

Google falls victims to hackers

The Director of Information Technology at Quincy University said we should all become more aware as these attacks become more frequent. "I get my homework through Gmail and like our PowerPoint notes, our grades kind of sometimes go through that because if you send a paper, if you email a paper to our teacher, and it gets emailed back you us that's our grade," Caitlin Rotunda, a sophomore at QU, said.


Related Topix: Science / Technology, Google, Startups, Quincy University

Islamic Hackers Attack Kirk Cameron Site

The Gospel Herald reports that the a website promoting "Saving Christmas, an upcoming movie form Kirk Cameraon, was twice hacked by "a Turkish hacker group described as anti-Christian, anti-Israel and anti-American[.]" The production team was able to quickly restore the website Sunday, but the hackers struck again Monday morning, filling the website's main page with Turkish text and a picture of the Islamic historical figure Saladin. Visitors were automatically forwarded to Ayyildiz Tim's Twitter page after hearing music and a loud gunshot, The Blaze reported.


Related Topix: Science / Technology

Sys-Con Media

Adi Shamir, a Founding Father of Public-Key Cryptography, to Keynote Black Hat Europe 2014

Known as a visionary for his numerous contributions to the fields of cryptography and computer science, will provide attendees with an insider's view into his historical work as well as a look into where we are going as an industry. Returning for its 14th year, Black Hat Europe will welcome the world's brightest information security professionals and researchers to reveal vulnerabilities that impact everything from the latest mobile and consumer devices to critical international infrastructure.


Related Topix: Cryptography, Science, Computer Science, Science / Technology, Mathematics, Inventions

Hispanic Business

Hacker Lab Shows Small Firms How to Prevent Attacks

At a recent "Hacker Lab" event, "white hat" hackers revealed how cybercriminals work - and what businesses can do to protect themselves. The September 9 multimedia presentation used a simulated small business system to demonstrate how hackers choose their targets, how they enter the system and what they do post-infiltration.


WALB-TV Albany

Justice Dept. seeks new tool against data fraud

Working to combat an increasingly lucrative crime that crosses national boundaries, Justice Department officials are pressing for a new law to help them prosecute criminals overseas who traffic in stolen credit cards. Authorities say the current law is too weak because it allows people in other countries to avoid prosecution if they buy and sell stolen card data entirely outside the United States.


Related Topix: Prison, Science / Technology

Thu Sep 11, 2014

Information Technology

A Billion Devices on LTE Networks by 2017 Face BYOD Security Threat, Says Vitesse

The rapid growth of the BYOD market, coupled with an explosion in 4G networks fed by small cell deployment, is creating an IT security threat that the global market needs to urgently address. This was the message given today at 4G World by Dr. Martin Nuss, CTO of Vitesse Semiconductor , a leading provider of advanced IC solutions for Carrier , Enterprise and Internet of Things networks worldwide.


Related Topix: Semiconductors, Electronics, Vitesse Semiconductor


How Apple Pay could make the Target and Home Depot breaches a thing of the past

The launch of Apple's mobile payment system could prove a turning point in the battle to secure your debit and credit card information from hackers. Tens of millions of card numbers have been stolen in the last few months from malware-infected payment terminals in stores including Target and Home Depot .


Related Topix: Home Depot, Retail, Household Products, Science / Technology

Chicago Tribune

Home Depot's malware details hint its hackers weren't Target's

Home Depot Inc. was hacked with a malicious software program that plunders store registers while disguising itself as antivirus software, according to two security researchers. The credit card-stealing program used in the attack on the Atlanta-based retailer is being dubbed FrameworkPOS, and differs significantly from the software used last year to hack Target Corp., said Dan Guido, chief executive officer of Trail of Bits, an information security company.


Related Topix: Home Depot, Retail, Household Products, Target, Science / Technology, Travel


Computer Security Jobs