Computer Security News
News on Computer Security continually updated from thousands of sources around the net.
32 min ago | Forbes.com
It is obvious, if not pathetic, why hackers break into the cloud to find and publish private nude photos of celebrities. CRM data may not seem to be the low hanging fruit of, say, a nationwide sweep of Home Depot customer accounts, but a closer look suggests it is - and possibly even more lucrative for hackers.
4 hrs ago | Finextra Research news
Everything seems like it is connected to the Internet, just about, including TVs, home thermostats, sprinkler controls, door locks, egg trays , tooth brushes , and more. A study by HP shows that 70 percent of devices have vulnerabilities.
8 hrs ago | Mirror.co.uk
Before Jennifer Lawrence's nude pics were hacked, model Joy says her private photographs were stolen despite her raising concerns with Apple Glamour model Joy Corrigan has hit out at Apple after she says she warned them about a threat to her private pictures. Joy, 20, who posts some pretty racy pictures on her own Instagram page, is not happy that her privacy has been violated by hackers.
13 hrs ago | The Columbus Dispatch
The E-Edition includes all of the news, comics, classifieds and advertisements of the newspaper. And it's available to subscribers before 6 a.m. every day.
You play the role of a former intelligence agent, specializing in computer security. When a chain of events sets off worldwide, leaving critical service disabled, you assume the role a computer hacker to find out what happened and attempt to stop it.
Apple's release of the Apple Watch and iPhone6 makes it clear that Silicon Valley's future will be directly tied to its ability to protect tech users' privacy. Securing Americans' personal information in an increasingly tech-dominated world has to be a higher priority for tech leaders and the valley's congressional and legislative delegations.
What's the most devastating thing you can tell an avid Steam user? No, not that Electronic Arts has somehow miraculously bought out Valve . The most devastating thing you can tell a Steam user is that a hacker has gained access to their Steam account and all their goods could be in danger.
Beyond making sure all employees have up-to-date anit-virus software, the key advice from this article for SFDC customers: Salesforce offers... a powerful multi-factor authentication feature, which is offered by just 16% of cloud providers. When you have multi-factor authentication turned on, the first time a user accesses Salesforce.com from a computer using his username and password, he receives an SMS message with a code he must enter to gain access.
Thousands of Shanghai civil servants were given a new work smartphone last week as part of a municipal government effort to bolster information security and spread home-grown brands. The workers received a device made by Coolpad, which was ranked third in the mainland smartphone market by tech research firm IDC.
JPMorgan Chase & Co said it had not seen any unusual customer fraud related to a recent cyber attack on the bank. Chase customers will not be liable for unauthorized transactions on their account provided they promptly alerted the bank, it said in a filing.
The Director of Information Technology at Quincy University said we should all become more aware as these attacks become more frequent. "I get my homework through Gmail and like our PowerPoint notes, our grades kind of sometimes go through that because if you send a paper, if you email a paper to our teacher, and it gets emailed back you us that's our grade," Caitlin Rotunda, a sophomore at QU, said.
The Gospel Herald reports that the a website promoting "Saving Christmas, an upcoming movie form Kirk Cameraon, was twice hacked by "a Turkish hacker group described as anti-Christian, anti-Israel and anti-American[.]" The production team was able to quickly restore the website Sunday, but the hackers struck again Monday morning, filling the website's main page with Turkish text and a picture of the Islamic historical figure Saladin. Visitors were automatically forwarded to Ayyildiz Tim's Twitter page after hearing music and a loud gunshot, The Blaze reported.
Known as a visionary for his numerous contributions to the fields of cryptography and computer science, will provide attendees with an insider's view into his historical work as well as a look into where we are going as an industry. Returning for its 14th year, Black Hat Europe will welcome the world's brightest information security professionals and researchers to reveal vulnerabilities that impact everything from the latest mobile and consumer devices to critical international infrastructure.
At a recent "Hacker Lab" event, "white hat" hackers revealed how cybercriminals work - and what businesses can do to protect themselves. The September 9 multimedia presentation used a simulated small business system to demonstrate how hackers choose their targets, how they enter the system and what they do post-infiltration.
The rapid growth of the BYOD market, coupled with an explosion in 4G networks fed by small cell deployment, is creating an IT security threat that the global market needs to urgently address. This was the message given today at 4G World by Dr. Martin Nuss, CTO of Vitesse Semiconductor , a leading provider of advanced IC solutions for Carrier , Enterprise and Internet of Things networks worldwide.
The launch of Apple's mobile payment system could prove a turning point in the battle to secure your debit and credit card information from hackers. Tens of millions of card numbers have been stolen in the last few months from malware-infected payment terminals in stores including Target and Home Depot .
Updated: Sun Sep 14, 2014 08:44 pm
Copyright © 2014 Topix LLC