Computer Security News
News on Computer Security continually updated from thousands of sources around the net.
5 min ago | CIO
Customers cringe every time they hear about a bank, retail or healthcare hack that puts personal or financial data at risk. Today's hackers are after much more that credit card numbers, though -- and most firms are powerless to stop them.
4 hrs ago | Network World
Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's software vendor. In its first public statement since being identified by Goodwill as its technology partner, C&K Systems of Murrells Inlet, South Carolina, said two other customers were also affected by the unauthorized access, though it didn't name them.
6 hrs ago | Mashable
Apple is making good on CEO Tim Cook's promise to beef up iCloud security in the wake of the recent celebrity photo hack . Now, if you log into iCloud on a web browser, you will be prompted for a code if you have enabled two-factor authentication on your Apple account.
7 hrs ago | Los Angeles Times
Amazon is being forced to investigate a "security hole" that could let hackers gain access to customers' accounts via Kindle e-books. The security flaw affects Kindle users who downloaded hacked e-books containing a certain script in the title, the Digital Reader reports .
11 hrs ago | InfoWorld
Retailers like Home Depot, which recently suffered a major data breach, have known for years about vulnerabilities in payment systems, but have chosen to ignore them, experts say. Home Depot decided only in January to buy technology that fully encrypts payment card data the moment a card is swiped, The Wall Street Journal reported Monday.
11 hrs ago | InfoWorld
The Target and Home Depot breaches should've been wake-up calls. Instead, the bad guys remain free to wreak havoc everywhere Last week I noted that most companies are either already hacked or could easily be hacked -- and, when they have anything worth stealing, are probably already owned by multiple APT groups.
15 hrs ago | Lowell Sun
Google was hacked? I didn't say, "I told you so." However, I frequently don't have good reviews of Google or any cloud services.
19 hrs ago | Computing.co.uk
More details have emerged about the attack on banking giant JP Morgan, which saw sensitive banking systems hacked and details about clients and deals apparently transmitted to systems in Russia. According to the latest disclosures, the hackers were able to access information about one million customer accounts and also obtained a list of the software applications installed on the bank's computers.
The Internet of Things will create additional security risks for businesses and consumers, according to network security experts at the APNIC 38 conference in Brisbane. Eric Vyncke, an engineer with Cisco, said the extent of damage caused by hacking an IoT device can range from minor to devastating.
The National Security Agency is hacking into corporate servers and attacking global ISPs as part of its effort to map off the entire Internet according to a report Sunday in Der Spiegel, a German daily, citing new documents leaked by NSA whistleblower Edward Snowden. The spy agency is also placing under surveillance the CEOs and other employees at telecom companies it considers vital to the infrastructure of the Internet, the documents reportedly reveal.
Doom on a printer's menu screen! Personally, we can't wait until someone makes Descent playable on a toaster. On Friday, a hacker presenting at the 44CON Information Security Conference in London picked at the vulnerability of Web-accessible devices and demonstrated how to run unsigned code on a Canon printer via its default Web interface.
Top Obama administration officials knew just how vulnerable HealthCare.gov was to malicious security breaches when it launched, leaving data at risk to hackers that have already breached the website at least once. According to documents obtained by government oversight nonprofit Judicial Watch, Centers for Medicare and Medicaid Services officials knew about the depth of HealthCare.gov's security problems but didn't stop to fix them before the launch, as many reports have previously indicated.
Belden Inc. , a global leader in signal transmission solutions for mission-critical applications, today releases new research that shows the recently revealed Dragonfly malware is likely targeting the pharmaceutical sector, not the energy sector as previously believed. Until now, advanced cyberattacks against industry have focused on the critical energy and chemical sectors.
At a recent "Hacker Lab" event, "white hat" hackers revealed how cybercriminals work - and what businesses can do to protect themselves. The multimedia presentation used a simulated small business system to demonstrate how hackers choose their targets, how they enter the system and what they do post-infiltration.
Nigerian police are on the hunt for an IT staffer at Skye Bank who hacked into the bank's systems and transferred $40 million to a raft of bogus accounts before going on the run. Thirty-eight year old Isoko resident Godswill Oyegwa Uyoyou is alleged to have conspired with a criminal gang to access the bank's computer system and inflate the balances of various accounts.
It is obvious, if not pathetic, why hackers break into the cloud to find and publish private nude photos of celebrities. CRM data may not seem to be the low hanging fruit of, say, a nationwide sweep of Home Depot customer accounts, but a closer look suggests it is - and possibly even more lucrative for hackers.
Everything seems like it is connected to the Internet, just about, including TVs, home thermostats, sprinkler controls, door locks, egg trays , tooth brushes , and more. A study by HP shows that 70 percent of devices have vulnerabilities.
Updated: Tue Sep 16, 2014 10:33 pm
Copyright © 2014 Topix LLC