Computer Security News
News on Computer Security continually updated from thousands of sources around the net.
3 hrs ago | NewsFactor
The National Security Agency is hacking into corporate servers and attacking global ISPs as part of its effort to map off the entire Internet according to a report Sunday in Der Spiegel, a German daily, citing new documents leaked by NSA whistleblower Edward Snowden. The spy agency is also placing under surveillance the CEOs and other employees at telecom companies it considers vital to the infrastructure of the Internet, the documents reportedly reveal.
7 hrs ago | Ars Technica
Doom on a printer's menu screen! Personally, we can't wait until someone makes Descent playable on a toaster. On Friday, a hacker presenting at the 44CON Information Security Conference in London picked at the vulnerability of Web-accessible devices and demonstrated how to run unsigned code on a Canon printer via its default Web interface.
8 hrs ago | The Daily Caller
Top Obama administration officials knew just how vulnerable HealthCare.gov was to malicious security breaches when it launched, leaving data at risk to hackers that have already breached the website at least once. According to documents obtained by government oversight nonprofit Judicial Watch, Centers for Medicare and Medicaid Services officials knew about the depth of HealthCare.gov's security problems but didn't stop to fix them before the launch, as many reports have previously indicated.
11 hrs ago | Information Technology
Belden Inc. , a global leader in signal transmission solutions for mission-critical applications, today releases new research that shows the recently revealed Dragonfly malware is likely targeting the pharmaceutical sector, not the energy sector as previously believed. Until now, advanced cyberattacks against industry have focused on the critical energy and chemical sectors.
15 hrs ago | Insurance Journal West
At a recent "Hacker Lab" event, "white hat" hackers revealed how cybercriminals work - and what businesses can do to protect themselves. The multimedia presentation used a simulated small business system to demonstrate how hackers choose their targets, how they enter the system and what they do post-infiltration.
15 hrs ago | Finextra Research news
Nigerian police are on the hunt for an IT staffer at Skye Bank who hacked into the bank's systems and transferred $40 million to a raft of bogus accounts before going on the run. Thirty-eight year old Isoko resident Godswill Oyegwa Uyoyou is alleged to have conspired with a criminal gang to access the bank's computer system and inflate the balances of various accounts.
It is obvious, if not pathetic, why hackers break into the cloud to find and publish private nude photos of celebrities. CRM data may not seem to be the low hanging fruit of, say, a nationwide sweep of Home Depot customer accounts, but a closer look suggests it is - and possibly even more lucrative for hackers.
Everything seems like it is connected to the Internet, just about, including TVs, home thermostats, sprinkler controls, door locks, egg trays , tooth brushes , and more. A study by HP shows that 70 percent of devices have vulnerabilities.
Before Jennifer Lawrence's nude pics were hacked, model Joy says her private photographs were stolen despite her raising concerns with Apple Glamour model Joy Corrigan has hit out at Apple after she says she warned them about a threat to her private pictures. Joy, 20, who posts some pretty racy pictures on her own Instagram page, is not happy that her privacy has been violated by hackers.
The E-Edition includes all of the news, comics, classifieds and advertisements of the newspaper. And it's available to subscribers before 6 a.m. every day.
You play the role of a former intelligence agent, specializing in computer security. When a chain of events sets off worldwide, leaving critical service disabled, you assume the role a computer hacker to find out what happened and attempt to stop it.
Apple's release of the Apple Watch and iPhone6 makes it clear that Silicon Valley's future will be directly tied to its ability to protect tech users' privacy. Securing Americans' personal information in an increasingly tech-dominated world has to be a higher priority for tech leaders and the valley's congressional and legislative delegations.
What's the most devastating thing you can tell an avid Steam user? No, not that Electronic Arts has somehow miraculously bought out Valve . The most devastating thing you can tell a Steam user is that a hacker has gained access to their Steam account and all their goods could be in danger.
Beyond making sure all employees have up-to-date anit-virus software, the key advice from this article for SFDC customers: Salesforce offers... a powerful multi-factor authentication feature, which is offered by just 16% of cloud providers. When you have multi-factor authentication turned on, the first time a user accesses Salesforce.com from a computer using his username and password, he receives an SMS message with a code he must enter to gain access.
Thousands of Shanghai civil servants were given a new work smartphone last week as part of a municipal government effort to bolster information security and spread home-grown brands. The workers received a device made by Coolpad, which was ranked third in the mainland smartphone market by tech research firm IDC.
JPMorgan Chase & Co said it had not seen any unusual customer fraud related to a recent cyber attack on the bank. Chase customers will not be liable for unauthorized transactions on their account provided they promptly alerted the bank, it said in a filing.
Updated: Mon Sep 15, 2014 04:30 pm
Copyright © 2014 Topix LLC