• newThoughts of Thanksgiving for All That Is FOSS
    Well Thanksgiving week is upon us here in the land of stars and stripes, and in anticipation of all the social events soon to besiege us, more than a few Linux bloggers have been practicing keeping their favorite barstools warm down at the blogospher…
    - 11 hours ago Monday, November 24, 2014 -
  • newLollipop's Encryption Takes a Hefty Toll
    The new full-disk encryption feature that's enabled by default in Android 5.0 Lollipop comes at a hefty price in terms of performance, according to a recent benchmark report. In fact, when full-disk encryption is enabled, random read performance dro…
    - 12 hours ago Monday, November 24, 2014 -
  • newEFF Spearheads Safer Web Initiative
    The Electronic Frontier Foundation has announced a nonprofit organization that will aim to secure the entire Web. Let's Encrypt, starting in summer 2015, will offer free server certificates to help websites transition from HTTP to the more secure HTT…
    - 16 hours ago Monday, November 24, 2014 -
  • newA View of the Future: Demo 2014
    I attended Demo in Silicon Valley last week and, as always, it showcased things likely to mature in the market 12 to 14 months into the future. The presenters are small companies, hand-selected because they offer something unique and forward-looking.…
    - 21 hours ago Monday, November 24, 2014 -
  • newGadget Ogling: Dueling Tablets, a Smart Scale, and Slooow Games
    Welcome to our weekly look at the latest, greatest, and poorest gadgets to be revealed to the world. Hark as yours truly extols the virtues and horrors of two wildly different tablets, a smart kitchen scale, and video games requiring patience, among…
    - 3 days ago Saturday, November 22, 2014 -
  • NotCompatible Mobile Malware Gets Badder
    A new version of the NotCompatible malware, which first appeared in 2012, is bigger, badder and pretty much indestructible, Lookout Security reported. And it can compromise corporate networks, thanks to the BYOD trend. The malware, called "NotCompati…
    - 4 days ago Friday, November 21, 2014 -
  • Another Bleak Black Friday for Apple Fans
    Apple is a company that bucks trends, that does things its own way, that manages its business through highly tuned cycles. One thing Apple barely does at all, though, is offer any sort of special deal or sale price. Not even on Black Friday. Or Cyber…
    - 4 days ago Friday, November 21, 2014 -
  • Citadel Trojan Adds Keylogging to Arsenal
    Cybercriminals are using a new version of the dangerous Citadel Trojan, which has been employed to attack the financial and petrochemical industries, to compromise password and authentication solutions, IBM Trusteer has reported. The new version begi…
    - 4 days ago Friday, November 21, 2014 -
  • Cinnamon Desktop Spices Up Makulu Linux
    The Makulu Cinnamon Debian Edition 1.1 marks a new path for Makulu. This latest release has numerous new features that could make it a top competitor against the Linux Mint Cinnamon edition. Makulu Cinnamon Debian Edition, or MCDE, has fewer standard…
    - 4 days ago Thursday, November 20, 2014 -
  • Russian Site Exposes Thousands of Private Videocam Streams
    A Russian website has been posting live video streams from unprotected webcams in homes and businesses around the globe, Britain's Information Commissioner's Office warned on Thursday. The website has gained access to the webcams using the cameras' d…
    - 5 days ago Thursday, November 20, 2014 -
  • Twitter Opens Entire Multibillion-Tweet Gold Mine to Searchers
    Twitter this week began indexing every public tweet posted since it began operating in 2006. "Our long-standing goal has been to let people search through every tweet ever published," said Yi Zhuang, who led the project team. Use cases Zhuang cited f…
    - 5 days ago Thursday, November 20, 2014 -
  • newHacker Disrupts Government Websites in Canada
    A gyrating banana greeted many visiting the pages for Parliament, the Supreme Court, the city of Ottawa and the Ottawa and Toronto police forces.
    - 7 hours ago Monday, November 24, 2014 -
  • newSymantec Discovers 'Regin' Spy Code Lurking on Computer Networks
    The security company indicated that a powerful program that could only have been created by a “nation state” has been finding its way into computer systems for six years.
    - 18 hours ago Monday, November 24, 2014 -
  • How to Use a VPN
    Plus, troubleshooting “file in use” messages.
    - 4 days ago Thursday, November 20, 2014 -
  • Malicious Software Said to Spread on Android Phones
    Lookout, a security company, says it has been tracking malware that over the last two years has become more sophisticated as it hit millions of devices.
    - 5 days ago Thursday, November 20, 2014 -
  • The Secret Life of Passwords
    We despise them – yet we imbue them with our hopes and dreams, our dearest memories, our deepest meanings. They unlock much more than our accounts.
    - 6 days ago Tuesday, November 18, 2014 -
  • Profiles in Online Identity Cleansing
    Privacy and anonymity are featured on new social apps, and many websites now offer services that help protect or erase personal information.
    - 6 days ago Tuesday, November 18, 2014 -
  • State Department Targeted by Hackers in 4th Agency Computer Breach
    The agency was forced to temporarily shut down its unclassified email and public websites after the attack on its computer systems.
    - 8 days ago Sunday, November 16, 2014 -
  • The Death of the Private Eye
    Now that we have Facebook and the N.S.A., who needs a gumshoe?
    - 9 days ago Saturday, November 15, 2014 -
  • Some New Frustrations as Health Exchange Opens
    The system opened Saturday and performed much better than last year, but some consumers reported long delays in trying to buy insurance and access their accounts at HealthCare.gov.
    - 9 days ago Saturday, November 15, 2014 -
  • For Guccifer, Hacking Was Easy. Prison Is Hard.
    Marcel-Lehel Lazar, whose pseudonym celebrated “the style of Gucci and the light of Lucifer,” rampaged through the email of rich Americans, showing the ease of going rogue online.
    - 14 days ago Monday, November 10, 2014 -
  • WhatsApp Messenger Adds End-to-End Encryption by Default
    Good news for all Privacy Lovers!! Finally the wildly popular messaging app WhatsApp has made end-to-end encryption a default feature, stepping a way forward for the online privacy of its users around the world.WhatsApp, most popular messaging ap…
    - 6 days ago Wednesday, November 19, 2014 -
  • Microsoft Releases Emergency Out-of-Band Patch for Kerberos Bug MS14-068
    Microsoft today released an "out-of-band" security updates to fix a critical vulnerability in all supported versions of its Windows Server software that cyber criminals are exploiting to compromise whole networks of computers.The Emergency patch rel…
    - 6 days ago Wednesday, November 19, 2014 -
  • 81% of Tor Users Can be Easily Unmasked By Analysing Router Information
    Tor has always been a tough target for law enforcement for years and FBI has spent millions of dollars to de-anonymize the identity of Tor users, but a latest research suggests that more than 81% of Tor clients can be "de-anonymised" by exploiting th…
    - 7 days ago Tuesday, November 18, 2014 -
  • Windows Phone 8.1 Hacked
    Do you wanna hack Nokia Lumia phone running the latest mobile operating system Windows 8.1 ?? Hackers have made it very easy for you all..!!Just few weeks after Microsoft announced a 19 year-old critical security hole existed in almost every vers…
    - 7 days ago Tuesday, November 18, 2014 -
  • Suspected Wirelurker iOS Malware Creators Arrested in China
    It’s been almost two weeks since the WireLurker malware existence was revealed for the first time, and Chinese authorities have arrested three suspects who are allegedly the authors of the Mac- and iOS-based malware that may have infected as many a…
    - 7 days ago Tuesday, November 18, 2014 -
  • OnionDuke APT Malware served through Tor Network
    The malicious Russian Tor exit node, which was claimed to be patching binary files, is actually distributing a malware program to launch cyber-espionage attacks against European government agencies.The group behind the rogue Tor exit node had lik…
    - 8 days ago Monday, November 17, 2014 -
  • BASHLITE Malware leverages ShellShock Bug to Hijack Devices Running BusyBox
    Cyber criminals are using new malware variants by exploiting GNU Bash vulnerability referred to as ShellShock (CVE-2014-6271) in order to infect embedded devices running BusyBox software, according to a researcher.A new variant of "Bashlite" malw…
    - 8 days ago Monday, November 17, 2014 -
  • Spy Planes Equipped with Dirtbox Devices Collecting Smartphone Data
    The U.S. government is reportedly using spy airplanes equipped with special military-grade snooping equipment to eavesdrop on cell phone information from millions of smartphone users in U.S, according to a new report.This little device, nicknamed…
    - 10 days ago Saturday, November 15, 2014 -
  • Darkhotel APT Malware Targets Global CEOs Using Hotel Internet
    A seven-year-old cyber espionage campaign has targeted senior level executives from large global companies by using a specialized Advanced Persistent Threat (APT), zero-day exploits, and well-developed keyloggers to extract information from them when…
    - 14 days ago Tuesday, November 11, 2014 -
  • Masque Attack — New iOS Vulnerability Allows Hackers to Replace Apps with Malware
    Android have been a long time target for cyber criminals, but now it seems that they have turned their way towards iOS devices. Apple always says that hacking their devices is too difficult for cyber crooks, but a single app has made it possible for…
    - 14 days ago Tuesday, November 11, 2014 -
  • Chinese Telecom Routes Russian Domestic Internet Traffic through China
    Russian Internet traffic, including the domestic one, has continuously been re-routed outside the country due to routing errors by China Telecom, which could result in compromising the security of Russian communications.Internet monitoring servic…
    - 14 days ago Tuesday, November 11, 2014 -
  • More than 400 Underground Sites seized by FBI in 'Operation Onymous'
    The joint operation by authorities of the U.S. Federal Bureau of Investigation (FBI) and European law enforcement seized Silk Road 2.0, an alternative to the notorious online illegal-drug marketplace last week, and arrested 26-year-old operator Blake…
    - 15 days ago Monday, November 10, 2014 -
  • Microsoft to Issue 16 Security Patches and 60 Other Updates
    Microsoft has this time quite a big pile of security patches in its November 2014 Patch Tuesday, which will address almost 60 non-security updates for its Windows OS along with 16 security updates.The software giant released Advance Notification…
    - 15 days ago Monday, November 10, 2014 -
  • FBI Seize Silk Road 2.0 Servers; Admin Arrested
    The authorities of the U.S. Federal Bureau of Investigation have announced that they have arrested "Silk Road 2.0" operator Blake Benthall, used the alias "Defcon" in California on Wednesday and charged him with conspiracy to commit drug trafficking,…
    - 18 days ago Friday, November 7, 2014 -
  • Google Releases 'nogotofail' Network Traffic Security Testing Tool
    Google introduced a new security tool to help developers detect bugs and security glitches in the network traffic security that may leave passwords and other sensitive information open to snooping.The open source tool, dubbed as Nogotofail, has b…
    - 20 days ago Wednesday, November 5, 2014 -
  • newShelly Palmer: 5 Ways You'll Be Hacked On Cyber Monday
    There's a reason Gmail sent that email to your Spam folder. Leave it there. If you didn't ask for it, don't click on it! Read more: Technology, Tech, Shelly Palmer, Black Friday, Online Safety, Cyber Monday, Thanksgiving, Online Shopping…
    - 24 hours ago Monday, November 24, 2014 -
  • Rebecca Abrahams: Solving the Threat to our Energy Grid
    co-authored by Dr. Stephen Bryen, Founder & CTO Ziklag SystemsAdmiral Michael Rogers, Director of the National Security Agency and head of the US ... Read more: Cyber Attacks, Power Grid, Energy Grid, Chinese Hackers, Russian Hackers, N…
    - 4 days ago Friday, November 21, 2014 -
  • Anonymous To Ferguson Police And KKK: ‘We Are The Law Now'
    A video surfaced Thursday reportedly released by the hacker group Anonymous warning Ferguson, Missouri police officers and the Ku Klux Klan to remain ... Read more: Kkk, Anonymous, Ferguson, Ferguson Protests, Anonymous KKK, Michael Brow…
    - 4 days ago Friday, November 21, 2014 -
  • Adam Levin: 73,000 Webcams Are Open to Peeping Toms -- Is Yours?
    If the thought of being the unwitting star of your own prime time reality show gives you the willies, consider the recent revelation that more than 73,000 unsecured webcams and surveillance cameras are, as I write this column, viewable on a Russian-b…
    - 4 days ago Friday, November 21, 2014 -
  • Dr. Jodi Gold: The Dos and Don'ts of Digital Kindness
    Most parents teach their children to be kind and caring -- but only IRL (in real life). So how do we teach Digital Kindness? My list of Dos and Don'ts gives families a checklist all technology users should memorize -- grown-ups included.…
    - 5 days ago Thursday, November 20, 2014 -
  • David L. Brown: Small Business Poised to Receive a Big Holiday Gift This Year
    With high-profile security breaches continuing to hit major national retailers, affecting tens of millions of shoppers since the 2013 holiday season, it's no surprise to see the that these events are influencing consumers to shop small businesses thi…
    - 7 days ago Tuesday, November 18, 2014 -
  • Andre Bourque: What's Your #SkypeDay? A Lesson in Password Recovery
    According to GoodSecurityQuestions.com (yes, there really is a site by that name, the best IT security questions meet five criteria. Read more: Cyber Security, Skype, Microsoft Skype, Password Protection, Password Security, Microsoft, T…
    - 8 days ago Monday, November 17, 2014 -
  • Hacker Group Goes To War With The KKK Over Ferguson Protests
    WASHINGTON -- Members of the hacker collective Anonymous are targeting the Ku Klux Klan after the designated hate group reportedly threatened proteste... Read more: Kkk, Anonymous, Ferguson, Ferguson Protests, Anonymous KKK, Michael Brow…
    - 8 days ago Monday, November 17, 2014 -
  • State Dept Computers Hacked, Email Shut Down
    WASHINGTON (AP) — The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair ... Read more: Ap, State Department Hacked, State Department, State Department Cybersec…
    - 9 days ago Sunday, November 16, 2014 -
  • Shane Paul Neil: Big Data and Bigger Breaches With Alex Pentland of Monument Capital Group
    He has spent a lot of time addressing the failings of big data systems and pushing for better infrastructure and security protocols across the board. He has even developed a consumer level data platform that mimics what the big guys should be doing.…
    - 11 days ago Friday, November 14, 2014 -
  • Joe Ross: Finding a Cure for Medical Identity Theft
    As we head into the final stretch of 2014, large-scale financial and retail breaches are top-of-mind for many of us, especially as we get ready for holiday shopping. But here is another type of identity theft that all consumers should be aware of and…
    - 11 days ago Friday, November 14, 2014 -
  • Robert Siciliano: How Your Webcam May Be Spying on You
    Remember that song from 1984, "Somebody's watching me?" It was a great foreshadowing of things to come: These days, people really CAN watch you while you go about your business at home...through your computer. Read more: Technology, Iden…
    - 13 days ago Wednesday, November 12, 2014 -
  • Tibetan Monks Plagued By Cyber Attacks Pledging To 'Detach From Attachments'
    DHARAMSALA, India (AP) — Buffeted by persistent cyberattacks, Tibetan monks are giving new meaning to their ancient creed: Detach from attachments.... Read more: Buddhism, Tibetan Buddhism, Buddhist, Buddhist Monks, Computers, Hackers…
    - 14 days ago Tuesday, November 11, 2014 -
  • Brian E. Finch: Five Cyber Security Takeaways From the Mid-Term elections
    While not a much-discussed topic during campaign season, federal policy on cyber-security will likely see some material changes as a result of a Republican-controlled Senate. Just how significant those changes will be have yet to be determined, but h…
    - 14 days ago Tuesday, November 11, 2014 -
  • The Biggest Threat To Gov't Computers: Federal Employees
    They have clicked links in bogus phishing emails, opened malware-laden websites and been tricked by scammers into sharing information.Federal employ... Read more: Defense Department, Education Department, Robert Curtis, Freedom of Infor…
    - 15 days ago Sunday, November 9, 2014 -
  • Google Study Finds Email Scams Are More Effective Than You'd Expect
    You know those weird emails that try to trick you into handing over your information? Turns out they work way better than you'd expect, according to a... Read more: Phishing, Phishing Scam, Email Phishing, Email Privacy, Jpmorgan Chase H…
    - 18 days ago Friday, November 7, 2014 -
  • Rebecca Abrahams: Cyber Retaliation: A Byte for a Byte?
    Co-authored by Dr. Stephen Bryen, Founder & CTO Ziklag SystemsThe Pentagon has Plan X --a scheme to retaliate against cyber attacks. No one knows... Read more: Data Theft, Cyber Espionage, Cyber Spying, China, Russia, Phone Hacking, Cy…
    - 19 days ago Thursday, November 6, 2014 -
  • John Horton: If ICANN Doesn't Keep Registrars Honest, Who Will?
    Last week, The Wall Street Journal detailed the challenges that drug safety authorities like the FDA face when tackling the illegal and unsafe distrib... Read more: Icann, Domain Names, Internet Governance, Pharmaceuticals, Cybercrime,…
    - 20 days ago Wednesday, November 5, 2014 -
  • Franz-Stefan Gady: The Axiom Report: Cybersecurity and Its Impact on China-U.S. Relations
    While the actual impact of the Novetta report on making U.S. systems more secure from Chinese attacks in the long run will be negligible on the diplomatic front, the recent Axiom revelations will allow the U.S. government to press the Chinese side ha…
    - 20 days ago Wednesday, November 5, 2014 -
  • CreditSesame.com: Fear and Worry in America? Identity Theft and Cybercrime
    What's the biggest worry for Americans? Here's a clue. It's not Ebola, terrorism or spiders. According to two separate studies and polls in just the last two weeks, the two things that most Americans worry about, even fear, are identity theft and hac…
    - 20 days ago Wednesday, November 5, 2014 -
  • Jason Glassberg: A Hacker Survival Guide For SMBs
    While cyber attacks on major U.S. corporations like Target and Home Depot garner most of the media coverage on hacking, the reality is, smaller businesses also face significant risks. Read more: Smbs, Small Medium Business, Cybersecurity…
    - 20 days ago Wednesday, November 5, 2014 -
  • John Roman, Ph.D.: #GamerGate, Victimization, and the Role of the FBI
    The FBI cannot prosecute a case without a victim. If you have been a victim of the anonymous #GamerGate mob, let them know. The National Center for Victims of Crime can help too. Read more: Gamergate, #GamerGate, Fbi, Cybercrime, Crime,…
    - 22 days ago Monday, November 3, 2014 -
  • Adam Levin: Here's How the New Chip-and-PIN Credit Cards Could Be DOA
    Whether the hackers banked a false sense of security at the institutional level, knowing that the protocols might be deemed an unnecessary expense, or the recent attacks are merely part of the chip card learning curve, this latest technology is only…
    - 25 days ago Friday, October 31, 2014 -
  • Ashley Massis: What Small Business Owners Need to Know About an IT Security Breach
    If you are the owner of a business or a freelancer like I am, a lot of your work and information is kept through a variety of internet platforms. Additionally, a lot of your transactions are internet based. Read more: Hacking, Computer H…
    - 26 days ago Thursday, October 30, 2014 -
  • Robert Siciliano: Keanu Reeves two Intruders in two Days
    Keanu Reeves recently had a home intruder: a woman. It was 4:00 am when she got into his home and plopped in a chair. The 40-something nut-job told the movie star she was there to meet with him. He nonchalantly called 911. Police took the woman into…
    - 26 days ago Thursday, October 30, 2014 -
  • Luring The Elusive Cyber Security Pro
    Struggling to find scarce IT security talent? Make sure your hiring managers understand the certifications and match candidates for skills fit -- not just credentials.
    - Monday, April 14, 2014 -
  • Amazon Plans 3D Phone: Report
    Amazon phone capable of displaying images in three dimensions could ship this fall.
    - Saturday, April 12, 2014 -
  • Google Glass Goes Public
    Google Glass Explorer Program will be open to US-based adults on tax day.
    - Saturday, April 12, 2014 -
  • Facebook Changes: What To Expect
    Facebook cracks down on spammy posts, tweaks privacy options, and revamps messaging. Here's what it means to you.
    - Saturday, April 12, 2014 -
  • Hacker Weev Free After Appeal
    Andrew "Weev" Auernheimer, who embarrassed AT&T by exposing a security flaw, had his conviction overturned by federal appeals court.
    - Friday, April 11, 2014 -
  • Rogue IT Driven By Need For Speed
    We've lost control to business users before. But this time, the thing that initiated our pain (the cloud) may also be the cure.
    - Friday, April 11, 2014 -
  • 5 Ways Android Won Me Over
    From security to "Lego" programming, Android has more going for it than you might think.
    - Friday, April 11, 2014 -
  • 5 Job Interview Tips Via Alice In Wonderland
    Curiouser and curiouser! Use these techniques during your next interview to win that IT or security job offer.
    - Thursday, April 10, 2014 -
  • Google Glass For Parkinson's: 10 Findings
    Google Glass offers more health benefits than awkwardness, Parkinson's patients in UK study find.
    - Thursday, April 10, 2014 -
  • Hackathons Should Be More Than A Circus
    Tapping into developer talent at a hackathon should be fun, but don't lose sight of the potential business benefits.
    - Thursday, April 10, 2014 -
  • 5 reasons why hackers own your organization
    Last week I noted that most companies are either already hacked or could easily be hacked -- and, when they have anything worth stealing, are probably already owned by multiple APT (advanced persistent threat) groups.
    - 70 days ago Tuesday, September 16, 2014 -
  • How network virtualization is used as a security tool
    When people think of network virtualization, the advantages that come to mind typically include faster provisioning of networks, easier management of networks and more efficient use of resources. But network virtualization can have another major bene…
    - 71 days ago Monday, September 15, 2014 -
  • Sprint, Windstream traffic routing errors hijacked other ISPs
    Internet traffic routing errors made by U.S. operators Sprint and Windstream on the same day last week underscore a long-known Internet weakness, posing both security and reliability issues. Both of the errors involved Border Gateway Protocol (BGP),…
    - 71 days ago Monday, September 15, 2014 -
  • Data protection authorities find privacy lapses in majority of mobile apps
    Many mobile apps request too many permissions and don't explain how they collect users' personal information, a study of 1,211 popular apps by the Global Privacy Enforcement Network has found. The majority of the apps reviewed did not adequately expl…
    - 74 days ago Friday, September 12, 2014 -
  • Yahoo says it faced $250,000 daily fines for defying U.S. surveillance requests
    The U.S. government once threatened to fine Yahoo $250,000 a day if it failed to assist with its surveillance efforts, Yahoo said Thursday. Yahoo said it was threatened with the fines after it challenged surveillance powers granted to the U.S. govern…
    - 74 days ago Friday, September 12, 2014 -
  • How Google's tiff with certificate authorities can impact you
    Miffed certificate authorities are calling on Google to give websites more time to upgrade the security used in browser-to-server communications before displaying warnings in Chrome. The CAs are upset over Google's roughly six-month timetable for rat…
    - 75 days ago Thursday, September 11, 2014 -
  • Enemies no more, McAfee and Symantec agree to share threat data
    The recently launched Cyber Threat Alliance has been given a big boost with the news that Intel's McAfee division and former arch-enemy Symantec are to join the industry group whose mission is to create the first significant cross-vendor movement of…
    - 75 days ago Thursday, September 11, 2014 -
  • 3 security practices IoT will disrupt
    I made it back from DEFCON with both my phone and tablet intact, but I'm happy I didn't bring a light bulb. You see, if had brought a light bulb, and that light bulb was a smart LED bulb running Linux, it might be running someone else's software by n…
    - 75 days ago Thursday, September 11, 2014 -
  • Five million Gmail addresses and passwords dumped online
    An archive containing nearly 5 million Gmail addresses and plain text passwords was posted Tuesday on an online forum, but the data is old and likely sourced from multiple data breaches according to one security firm. A user with the online alias "tv…
    - 76 days ago Wednesday, September 10, 2014 -
  • Internet Explorer steals the Patch Tuesday spotlight again
    It's hard to imagine that we are already three-fourths of the way through 2014 -- at least as measured by Microsoft Patch Tuesdays. Today, Microsoft released four new security bulletins, but only one of them is Critical. Guess which one?
    - 76 days ago Wednesday, September 10, 2014 -
  • Cloud security: We're asking the wrong questions
    In the wake of the celebrity photo breach, the media is humming with stories disparaging the safety of the cloud.
    - 76 days ago Wednesday, September 10, 2014 -
  • Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates
    Adobe Systems released a critical security update for Flash Player that fixes 12 security vulnerabilities, but pushed back its planned patches for Reader and Acrobat by a week. The Flash Player updates, available for Windows, Mac, and Linux, address…
    - 77 days ago Tuesday, September 9, 2014 -
  • Comcast's open Wi-Fi hotspots inject ads into your browser
    Comcast is giving users a very good reason to demand an HTTPS connection on every site they visit. The Internet service provider has started injecting ads for its services on websites where you wouldn't normally see them when you're using an Xfinity…
    - 77 days ago Tuesday, September 9, 2014 -
  • Salesforce.com warns customers of malware attack
    Salesforce.com users are being targeted by a new version of a computer Trojan that has typically attacked online banking customers until now. The malware threat is called Dyre or Dyreza and came to light in June. Like most online banking Trojans, it…
    - 77 days ago Tuesday, September 9, 2014 -
  • What you need to know about the Home Depot data breach
    On Monday, Home Depot issued a public confirmation to reports that they had experienced a data breach impacting debit and credit cards. They're the world's largest home improvement retailer, operating 2,266 stores in the U.S., as well as 10 Canadian…
    - 77 days ago Tuesday, September 9, 2014 -
  • Tech industry groups ask U.S. Senate to 'swiftly pass' NSA curbs
    Tech industry organizations have written a letter to leaders in the U.S. Senate, to ask them to swiftly pass the USA Freedom Act, legislation that is expected to end the collection of bulk domestic phone data by the National Security Agency.
    - 77 days ago Tuesday, September 9, 2014 -
  • Home Depot confirms breach of its payment systems
    Home Depot said Monday that its payment systems had been breached, potentially affecting any customers who shopped at its stores in the United States and Canada since April. There's no evidence yet that debit card PIN numbers had been compromised, th…
    - 78 days ago Monday, September 8, 2014 -
  • IBM secures SoftLayer with Intel trusted modules
    Fortifying its SoftLayer cloud services for enterprise use, IBM has started using Intel's chip-based Trusted Execution Technology to help organizations in highly regulated industries meet their auditing and security compliance requirements. On Monday…
    - 78 days ago Monday, September 8, 2014 -
  • Adobe slates critical Reader security update for Tuesday
    Adobe yesterday said it would issue security updates next week for its PDF viewer Reader as well as for Acrobat, its PDF creator, to fix critical flaws in the software on Windows and Apple's OS X. But it won't be updating Flash Player, its ultra-popu…
    - 81 days ago Friday, September 5, 2014 -
  • Apple CEO says iCloud security will be strengthened
    Apple, still reeling from the nude celebrity photo incident, plans to soon strengthen security around its iCloud storage service, according to CEO Tim Cook in a news report Thursday.
    - 81 days ago Friday, September 5, 2014 -
  • newReport: Sony Pictures facing full network compromise
    UPDATE 3:Earlier this evening, an email was sent to Salted Hash from someone claiming to be an employee of Sony Pictures.The email used broken English, which would normally raise red flags, but the image attached to the curious message shows an alter…
    - 14 hours ago Monday, November 24, 2014 -
  • Governments act against webcam-snooping websites
    Government officials in the U.S. and the UK are warning people to secure their webcams after websites that broadcast the contents of those cameras have sprung up online.One of the better-known sites, Insecam, appeared to have gone offline after the w…
    - 4 days ago Friday, November 21, 2014 -
  • NSA chief says cyberattacks on industrial systems are his top concern
    Multiple nation-states are investing in their capabilities to hack critical U.S. infrastructure, making defense of those networks a top priority, U.S. National Security Agency chief Admiral Mike Rogers said Thursday.Attackers are seeking detailed inf…
    - 4 days ago Thursday, November 20, 2014 -
  • Next year's DDOS attacks to come from Vietnam, India and Indonesia
    Vietnam, India and Indonesia might not have the most advanced Internet infrastructure, but they do have a large number of insecure smartphones coming online, making them the big botnet sources for next year's distributed denial of service attacks, ac…
    - 6 days ago Tuesday, November 18, 2014 -
  • Microsoft patches Kerberos vulnerability with emergency update
    Microsoft released an out-of-band patch on Tuesday, addressing a vulnerability in Kerberos KBC, a component that handles authentication on local networks.The patch was supposed to have been released earlier this month, but Microsoft withheld it due t…
    - 7 days ago Tuesday, November 18, 2014 -
  • Microsoft: Competing AV vendors need to remember who the bad guys are
    AV vendors, in fierce competition for users, should remember that cooperation is key in fighting malware, a top Microsoft security official said Friday.Data sharing between vendors has resulted in a drop in the overall number of malware families affe…
    - 11 days ago Friday, November 14, 2014 -
  • This suspected cybercriminal may be buying coke with your online bank funds
    On the coffee table was a message etched in powder, presumably cocaine: "I really miss you."The photo was on a social networking profile of a 23-year-old man in Ukraine that analysts with a Danish computer security company believe designed and rents…
    - 11 days ago Friday, November 14, 2014 -
  • Tor-based Anonabox router revises troubled history as it resurfaces on Indiegogo
    Anonabox, a portable router that claims to hide your online tracks, is taking another stab at crowdfunding after getting booted from Kickstarter last month. The Tor-based device has resurfaced on Indiegogo, where it has already surpassed its $13,370…
    - 14 days ago Tuesday, November 11, 2014 -
  • Tor Project mulls how Feds took down hidden websites
    Little is known about how U.S. and European law enforcement shut down more than 400 websites, including Silk Road 2.0, which used technology that hides their true IP addresses.The websites were set up using a special feature of the Tor network, which…
    - 15 days ago Monday, November 10, 2014 -
  • Employee-owned PCs are scaring enterprise IT
    Largely ignored in the enterprise mobility craze of the last few years, which saw the acceptance of bring-your-own device (BYOD) policies, were the risks incurred when employees use their personal computers to access business data. Now, with PCs desi…
    - 19 days ago Thursday, November 6, 2014 -
  • Cisco patches serious vulnerabilities in small business RV Series routers
    Cisco Systems released patches for its small business RV Series routers and firewalls to address vulnerabilities that could allow attackers to execute arbitrary commands and overwrite files on the vulnerable devices.The affected products are Cisco RV…
    - 19 days ago Thursday, November 6, 2014 -
  • Microsoft's top legal gun decries privacy "arms race"
    The conflict between snooping governments seeking to defeat encryption and users demanding ever more robust privacy tools has turned into an arms race -- and it's time for arms control talks, Microsoft's general counsel said on Tuesday.Resolving that…
    - 20 days ago Wednesday, November 5, 2014 -
  • Firewall admins turning off security to boost performance - bad move
    A third of organizations are turning off some of their next-generation firewall's (NGFW) security features to boost performance with the most commonly deactivated layer being intrusion prevention, a McAfee survey has discovered.Of the 504 professio…
    - 22 days ago Monday, November 3, 2014 -
  • Hackers target unclassified White House network
    Hackers targeted an unclassified White House network but did not damage any systems, a White House official said Tuesday.In the course of assessing recent threats, "activity of concern" was found on the unclassified Executive Office of the Presiden…
    - 27 days ago Wednesday, October 29, 2014 -
  • White House officials confirm breach on unclassified network
    A White House official, speaking on the condition of anonymity, said that suspicious activity has been identified on the Executive Office of the President (EOP) network.The official, speaking to Reuters, said that mitigation efforts were ongoing, but…
    - 27 days ago Wednesday, October 29, 2014 -
  • Report: Criminals use Shellshock against mail servers to build botnet
    Targeting message transfer agents (MTAs), and mail delivery agents (MDAs), criminals are using Shellshock as a means to create botnets. The process is slow, but working, thanks to unpatched installations of Bash or certain implementations of it.Whe…
    - 29 days ago Monday, October 27, 2014 -
  • Tor Project flags Russian 'exit node' server for delivering malware
    The Tor Project has flagged a server in Russia after a security researcher found it slipped in malware when users were downloading files.Tor is short for The Onion Router, which is software that offers users a greater degree of privacy when browsin…
    - 29 days ago Sunday, October 26, 2014 -
  • USB is now UEC (use with extreme caution)
    USB is an acronym for Universal Serial Bus; at least that is what it has stood for since 1999 when it was patented. But now it may take on a new meaning and instead stand for Ultimate Security Breakdown. To read this article in full or to leave a c…
    - 35 days ago Tuesday, October 21, 2014 -
  • Staples confirms data breach investigation
    Monday evening, investigative journalist Brian Krebs reported that multiple banking sources were seeing a pattern of credit and debit card fraud. The common thread between each case were purchases made at Staples Inc. stores in the Northeastern U.S.T…
    - 35 days ago Monday, October 20, 2014 -
  • Obama signs Executive Order to bolster federal credit card security
    On Friday, at the headquarters of the Consumer Financial Protection Bureau, President Obama signed an Executive Order that will add chip-and-PIN protections (EMV) to federal credit cards starting in January. The President encouraged the financial an…
    - 36 days ago Monday, October 20, 2014 -
  • Android and iOS apps still being cloned to spread malware
    Mobile app cloning from unauthorised app sites now affects 97 percent of the top 100 paid Android apps and 87 percent of the Apple iOS apps in the same category, with financial services, healthcare and retail popular targets for criminals, Arxan Tech…
    - 8 days ago Monday, November 17, 2014 -
  • Samsung's Knox to be tightly integrated with BlackBerry's BES12
    Under-pressure BlackBerry is fighting back, announcing a tie-up with Samsung that will bring the firm’s BlackBerry Enterprise Service 12 (BES 12) security to Android handsets running the South Korean vendor’s Knox containerisation system.
    - 8 days ago Monday, November 17, 2014 -
  • Malware served through rogue Tor exit node tied to cyberespionage group
    A malware program distributed recently through a rogue server on the Tor anonymity network was also used in targeted attacks against European government agencies.
    - 8 days ago Monday, November 17, 2014 -
  • Coca Cola sued by former employee over unencrypted laptop data theft
    Coca Cola is facing a potential class-action lawsuit after one of the people whose personal data was on one of a clutch of laptops stolen from the company says he suffered identity theft as a result of the breach.
    - 12 days ago Thursday, November 13, 2014 -
  • Is this app the answer to account hijacking? LogDog launches on Google Play
    Orange-backed Israeli startup LogDog has launched a new smartphone app it believes offers a way for users of services such as Gmail and Twitter to secure these accounts against hijacking by monitoring for unauthorised access.
    - 12 days ago Thursday, November 13, 2014 -
  • Microsoft fixes critical crypto flaw, strengthens encryption for older systems
    Microsoft fixed a critical vulnerability Tuesday in the Windows cryptographic library that could expose Windows servers to remote code execution attacks. The update also adds support for stronger and more modern cryptographic ciphers to older Windows…
    - 12 days ago Thursday, November 13, 2014 -
  • Sophos CEO: We're betting entirely on the cloud
    Sophos is betting entirely on the cloud in a bid to make it easier for understaffed IT departments to manage cyberattacks.
    - 12 days ago Thursday, November 13, 2014 -
  • Adobe fixes eighteen vulnerabilities in Flash Player
    Adobe Systems released critical security updates Tuesday for Flash Player to address 18 vulnerabilities, many of which can be remotely exploited to compromise underlying systems.
    - 13 days ago Wednesday, November 12, 2014 -
  • Google warns of deadly manual account hijacking attacks
    If an attacker compromises an online account what damage can they do and how does the user wrest back control?
    - 13 days ago Wednesday, November 12, 2014 -
  • Microsoft releases 14 patches for Windows security problems
    Microsoft released patches for 14 vulnerabilities in its Windows operating system, Office and Internet Explorer software on Tuesday, including four it deemed critical, it's highest severity rating.
    - 13 days ago Wednesday, November 12, 2014 -
  • US Government hit by 46,000 data breaches in 2013, research finds
    The number of data breaches suffered by US Government networks reached more than 46,000 in 2013, many of them caused by the incompetence or mistakes of workers, a Freedom of Information survey by the Associated Press has discovered.
    - 14 days ago Tuesday, November 11, 2014 -
  • The 7 deadly sins of startup security
    For startups, user growth, product growth, virality, marketing usually goes on the top of their priority list. As part of product planning cycles, embedding information security into their product/service is the last concern for most startups.
    - 14 days ago Tuesday, November 11, 2014 -
  • Vulnerability leaves iPhones open to fake app attack
    Security researchers have discovered a vulnerability in iPhones and iPads that allows attackers to install fake apps that take the place of legitimate ones.
    - 14 days ago Tuesday, November 11, 2014 -
  • Darkhotel APT hackers campaign 'followed' global CEOs using hotel networks
    A state-backed espionage group has spent years targeting senior executives from large global companies using a specialised Advanced Persistent Threat (APT) that can follow and steal data from them as they move around the globe from hotel to hotel, Ka…
    - 15 days ago Monday, November 10, 2014 -
  • Darkhotel APT campaign 'follows' global CEOs using hotel networks
    A state-backed espionage group has spent years targeting senior executives from large global companies using a specialised Advanced Persistent Threat (APT) that can follow and steal data from them as they move around the globe from hotel to hotel, Ka…
    - 15 days ago Monday, November 10, 2014 -
  • Malware on Central Dermatology Center server since August 2012
    Central Dermatology Center is notifying more than 76,000 patients that one of its servers had been compromised by malware for roughly two years, and their personal information may or may not have been accessed.
    - 8 days ago Monday, November 17, 2014 -
  • Safe tether: Wearables
    Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.
    - 22 days ago Monday, November 3, 2014 -
  • Acting out: Cyber simulation exercises
    Simulation exercises show how companies should respond under a cyberattack, says HHS's Sara Hall. Teri Robinson reports.
    - 22 days ago Monday, November 3, 2014 -
  • Network care: Case study
    When a care provider supplied laptops to its roving employees, it added a security solution to enable efficient collaboration. Greg Masters reports.
    - 22 days ago Monday, November 3, 2014 -
  • A balancing act: Apple technology
    Apple's iPhone 6 and iOS 8 offer encryption for mobile users, but a focus on consumers can create security conundrums, reports Lee Sustar.
    - 22 days ago Monday, November 3, 2014 -
  • Upping the ante: PCI Security Standard
    The latest iteration of the PCI Security Standard calls for moving beyond simply meeting compliance mandates, reports Jim Romeo.
    - 22 days ago Monday, November 3, 2014 -
  • newWho's been writing in my apps? Googlilocks builds new apps-tracker
    Google offers new dashboards for Work and frees Zix crypto Google has bolstered the security of its Apps platform with new reports providing insight into the number of devices accessing the account over the past month.…
    - 4 hours ago Tuesday, November 25, 2014 -
  • newCraigslist pushes punters to YouTube, hacker site
    FLUSH US OUT of your system, says flesh and furniture site Craigslist is asking users to flush their DNS after one or more pranksters twice changed the DNS records of the popular flesh and furniture classifieds site so it redirects users to a website…
    - 7 hours ago Monday, November 24, 2014 -
  • newGoogle's elves work on Santa to rein(deer) in grinchware
    Unofficial app sorts niceware from naughtyware Google's elves have been busy working on a toy for all the girls and boys who run Mac OS and worry about getting a virus.…
    - 10 hours ago Monday, November 24, 2014 -
  • newSony Pictures in IT lock-down after alleged hacker hosing
    Data caches uploaded as hackers deface internal staff boxes Sony Pictures is investigating a breach that has seen hackers supposedly steal reams of internal data and splash defacements across staff computers. The company is now in lock-down as it wre…
    - 11 hours ago Monday, November 24, 2014 -
  • newHow secure is Docker? If you're not running version 1.3.2, NOT VERY
    UPGRADE NOW to fix vuln found in all previous versions A nasty vulnerability has been discovered in the Docker application containerization software for Linux that could allow an attacker to gain elevated privileges and execute code remotely on affec…
    - 12 hours ago Monday, November 24, 2014 -
  • newRegin: The super-spyware the security industry has been silent about
    NSA fingered as likely source of complex malware family A public autopsy of sophisticated intelligence-gathering spyware Regin is causing waves today in the computer security world.…
    - 14 hours ago Monday, November 24, 2014 -
  • newYou stupid BRICK! PCs running Avast AV can't handle Windows fixes
    Fix issued, fingers pointed, forums in flames Security software outfit Avast are trying to figure out why the combination of recent Windows patches and updates to the latter company's software are breaking PCs.…
    - 1 day ago Monday, November 24, 2014 -
  • newSony quietly POODLE-proofs Playstations
    Innocuous 'system software stability' update brings no patch, no surf, regime Sony has patched the POODLE SSL vulnerability in its Playstation 3 and 4 gaming consoles.…
    - 1 day ago Monday, November 24, 2014 -
  • new'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
    'A degree of technical competence rarely seen' A highly advanced malware instance said to be as sophisticated as the famous Stuxnet and Duqu has has been detected. "Regin" has security researchers opining it may be nastier than both.…
    - 1 day ago Sunday, November 23, 2014 -
  • newCrypto protocols held back by legacy, says ENISA
    EU takes the microscope to security The EU Agency for Network Information and Security (ENISA) has updated its 2013 crypto guidelines, designed to help developers protect personal information in line with EU law, and has sternly told crypto designers…
    - 1 day ago Sunday, November 23, 2014 -
  • Parental Controls For YouTube
    Kids seem to be glued to YouTube these days. As a parent, it can be daunting to try and police the content that they watch. What's a parent to do?In our featured article: YouTube Parental Controls...Read Full Post
    - Saturday, May 31, 2014 -
  • Craigslist Safety and Security Tips
    Craigslist can be both a fun and scary place. You never know what you'll find for sale, and you often don't know who is on the other end of that sale until you complete the deal....Read Full Post
    - Saturday, May 31, 2014 -
  • 5 Tips to Help You Land an IT Security Job
    IT security jobs are still in high demand, especially given the fact that cyber crime seems to be a constant fixture in the news with data breaches becoming an almost daily occurrence....Read Full Post
    - Saturday, May 31, 2014 -
  • How to Avoid Becoming a Victim of the iPhone Lock Ransom Scam
    There is a new scam sweeping through Australia and other parts of the world this week. Victims are having their iPhones locked remotely by hackers who apparently compromised their iCloud account credentials. The victims are then being issued ransom d…
    - Saturday, May 31, 2014 -
  • Are Your Employees Leaking Sensitive Company Information on Facebook?
    Like it or not, Facebook is here to stay. Some companies allow employees to use Facebook at work and some strictly prohibit it. If your company allows it then you might want to continue reading....Read Full Post
    - Thursday, May 29, 2014 -
  • Rev up Your Security with a 10-minute PC Security Tune-up
    Securing your PC doesn't have to take hours and hours of your time. There are a lot of things you can do in just a few minutes to help improve your security posture....Read Full Post
    - Thursday, May 29, 2014 -
  • How to Prevent Your Web Browser From Being Hijacked
    Did you just try to Google something but instead of going to Google, your browser took you to some strange search engine you've never heard of?You might have just become a victim of browser hijacking. In this week's featured article: How to Prevent…
    - Wednesday, May 28, 2014 -
  • Are Your Clicks Getting Jacked?
    Have you ever been clickjacked? While it may sound like some kind of pro wrestling move, I assure you it is not.Clickjacking is a security threat that users all over the world are experiencing. How can you stay safe from clickjacking? Check out our…
    - Wednesday, April 30, 2014 -
  • Is Your Google+ Account Secure?
    Google+ seems to be slowly gaining some traction. It's probably not quite the big Facebook contender that Google had hoped it would be, but it is gaining steamJust like Facebook, Google+ has privacy and security settings that you should configure t…
    - Wednesday, April 30, 2014 -
  • If Your PC Was Just Hacked, Read This:
    You've just discovered that your PC has been hacked. You could run away and go hide in a corner, or you can take action and do something about it.If you opt for taking action, then you need to check out our article: I've Been Hacked! Now What? We'l…
    - Wednesday, April 30, 2014 -
  • newENISA Issues Guidelines on Cryptographic Solutions
    ENISA Details Use of Cryptography For Securing Personal DataThe European Union Agency for Network and Information Security (ENISA) has released two reports that aim to inform and guide decision makers in the public and private sector on the use and…
    - 8 hours ago Monday, November 24, 2014 -
  • newCyberspying Tool Could Have US, British Origins
    A sophisticated cybersespionage tool has been stealing information from governments and businesses since 2008, researchers said Monday, and one report linked it to US and British intelligence. read more
    - 8 hours ago Monday, November 24, 2014 -
  • newPrivacy Groups Call for NIST to Keep Development of Crypto Standards Independent of NSA Influence
    The Electronic Frontier Foundation (EFF) and several privacy and civil liberties groups have joined forces to urge the National Institute of Standards and Technology (NIST) act strongly to keep encryption standards free of backdoors and known vulnera…
    - 13 hours ago Monday, November 24, 2014 -
  • new'Regin' Attack Platform Targeted GSM Networks
    The layers of the Regin cyber-attack platform are just beginning to be pulled back. One of those layers gives attackers the means to penetrate and monitor GSM base station controllers. read more
    - 16 hours ago Monday, November 24, 2014 -
  • newGoogle's "Santa" Tracks Naughty and Nice Binaries on Mac OS X
    Google's Macintosh Operations Team announced the availability of the source code for "Santa," a tool designed for whitelisting and blacklisting binaries on Apple's Mac OS X operating systems.read more
    - 17 hours ago Monday, November 24, 2014 -
  • newWhen Panic Leads to Poor Decisions
    We’ve all been there before. Something unforeseen happens that triggers a panic response. More often than not we look back at that response and wish we could have done things differently. read more
    - 21 hours ago Monday, November 24, 2014 -
  • new'League of Legends' Creators Unveil Details of Bug Bounty Program
    Riot Games, the developer of the popular multiplayer online game League of Legends, has shared some details on its bug bounty program.read more
    - 22 hours ago Monday, November 24, 2014 -
  • newSymantec Uncovers Stealthy Nation-State Cyber Attack Platform
    Symantec has released details of an extremely sophisticated cyber espionage tool that the company says has been used in “systematic spying campaigns” against a range of international targets since at least 2008. read more
    - 23 hours ago Monday, November 24, 2014 -
  • newFraud Service Uses Charity Websites to Validate Stolen Credit Card Data
    Cybercriminals who specialize in payment card fraud can verify the validity of stolen data by using an automated tool which conducts transactions on the websites of non-profit organizations, researchers at PhishLabs reported on Friday.read more…
    - 24 hours ago Monday, November 24, 2014 -
  • newAttackers Hijack Craigslist Domain Name
    [UPDATE] Users looking to visit online classifieds titan Craigslist on Sunday evening were redirected to a site hosted at the domain DigitalGangster(dot)Com, as a result of a DNS hijack.read more
    - 1 day ago Sunday, November 23, 2014 -
  • Backdoored CMS Plugins Used to Hijack Web Servers
    Malicious CMS Plugins Used to Hijack Web Servers For Black Hat SEOThousands of backdoored plugins and themes for popular content management systems (CMS) are being leveraged by a threat group to abuse Web servers on a large scale.read more
    - 4 days ago Friday, November 21, 2014 -
  • Radware Launches Hybrid DDoS Attack Protection Solution
    Radware, a company best known for its DDoS attack mitigation and application deliver appliances, this week announced a new hybrid solution designed to help enterprise organizations detect and protect against sophisticated and volumetric DDoS attacks.…
    - 4 days ago Friday, November 21, 2014 -
  • WordPress 4.0.1 Released to Address Critical XSS, Other Vulnerabilities
    With the release of WordPress 4.0.1, the developers of the popular blogging tool and a content management system (CMS) have addressed several vulnerabilities, including a critical flaw that could have been exploited to compromise websites.read more…
    - 4 days ago Friday, November 21, 2014 -
  • Siemens Fixes Critical Vulnerabilities in WinCC SCADA Products
    Vulnerabilities Expose SCADA Systems to Remote AttacksSiemens has released software updates to address two critical vulnerabilities in its SIMATIC WinCC supervisory control and data acquisition (SCADA) system, one of which could be exploited remotel…
    - 4 days ago Friday, November 21, 2014 -
  • Windows RCE Vulnerability Exploited in the Wild
    Security companies have started detecting attacks that leverage a critical remote code execution (RCE) vulnerability in Windows, which Microsoft patched last week.read more
    - 4 days ago Friday, November 21, 2014 -
  • Internal and External Forces Shaping Cybersecurity in Financial Services
    Financial services already being one of America’s most highly regulated industries, recent news that Wall Street’s top trade group was calling for creation of a new inter-agency working group comprised of data security regulators at first seems l…
    - 4 days ago Friday, November 21, 2014 -
  • NexDefense Launches Anomaly Detection Solution for Industrial Networks
    NexDefense, a provider of cybersecurity solutions for automation and control systems, this week announced the availability of a new an Industrial Network Anomaly Detection (INAD) system designed to help customers detect and respond to abnormal behavi…
    - 5 days ago Thursday, November 20, 2014 -
  • CIA Chief Weighs Ambitious Overhaul of Spy Agency
    CIA Director John Brennan has ordered a sweeping internal review that could dramatically change how the country's leading spy agency is organized, officials said Thursday. read more
    - 5 days ago Thursday, November 20, 2014 -
  • Cybercriminals Use Macros to Deliver Rovnix Malware
    The Rovnix Trojan has started leveraging macros embedded in innocent-looking Microsoft Word documents to infect computers, researchers at Trend Micro reported on Wednesday.read more
    - 5 days ago Thursday, November 20, 2014 -
  • DDoS Attacks Over 10 Gbps Jump in Q3: Verisign
    A new report from Verisign on distributed denial-of-service attacks showed that the number of distributed denial-of-service [DDoS] attacks exceeding 10 Gbps grew substantially between the second and third quarters of the year.read more
    - 5 days ago Thursday, November 20, 2014 -
  • Drupal Fixes Session Hijacking, DoS Vulnerabilities
    Drupal 6.34 and Drupal 7.34 were released on Wednesday to address multiple moderately critical vulnerabilities affecting prior versions.read more
    - 5 days ago Thursday, November 20, 2014 -
  • Multiple Vulnerabilities Found in Hikvision DVR Devices
    New research from Rapid7 has uncovered multiple vulnerabilities in the Hikvision DVR (Digital Video Recorder) devices.Researchers discovered three buffer overflow vulnerabilities in Hikvision's RTSP request handling code: CVE-2014-4878, CVE-2014-487…
    - 5 days ago Thursday, November 20, 2014 -
  • Security is a People Problem, Training is the Solution
    Enterprises Must be Committed to Keeping their IT Security Staff Highly Trained on the Current Threat Landscape and Advanced Approaches to Security.read more
    - 5 days ago Thursday, November 20, 2014 -
  • Developers Fix XSS Vulnerability in jQuery Validation Plugin Script
    The creators of the jQuery Validation Plugin have finally addressed a vulnerability in a demo component that was first reported to them more than three years ago.read more
    - 5 days ago Thursday, November 20, 2014 -
  • Russia Hacking Site Spying Webcams Worldwide: Britain
    LONDON - Britain's privacy watchdog on Thursday called on Russia to take down a site showing hacked live feeds from thousands of homes and businesses around the world and warned it was planning "regulatory action". read more
    - 5 days ago Thursday, November 20, 2014 -
  • Citadel Trojan Targets Password Managers, Authentication Solutions
    A new variant of the notorious information-stealing malware Citadel captures keystrokes in an effort to obtain the passwords that protect access to authentications solutions and password managers, IBM Trusteer reported on Wednesday.read more…
    - 5 days ago Thursday, November 20, 2014 -
  • Court Order Shuts Down Alleged $120M Tech Support Scam
    A federal court has temporarily shut down and frozen the assets of two telemarketing operations accused by the Federal Trade Commission (FTC) of scamming customers out of more than $120 million by deceptively marketing computer software and tech supp…
    - 6 days ago Wednesday, November 19, 2014 -
  • Hackers Turning Smartphones Into Slave Armies
    SAN FRANCISCO - Mobile security firm Lookout on Wednesday warned that Android-powered smartphones or tablets are being targeted with malicious software that puts them at the mercy of hacker overlords. read more
    - 6 days ago Wednesday, November 19, 2014 -
  • Apple Fixes Jailbreak Vulnerabilities With Release of iOS 8.1.1
    Apple's first update for the iOS 8.1 mobile operating system includes bug fixes, increased stability and performance improvements for older devices, and also addresses several security issues.read more
    - 6 days ago Wednesday, November 19, 2014 -
  • Core Security Releases Security Advisories on Advantech Product Vulnerabilities
    Researchers at Core Security have disclosed multiple vulnerabilities affecting products from Advantech Corp., which provides industrial automation and embedded solutions.read more
    - 6 days ago Wednesday, November 19, 2014 -
  • newHackers replace Sony's backup app on Google Play
    Be very careful if you're updating apps on your Sony Xperia smartphone this week. It looks like as if an app called Sony Backup & Restore was compromised by a group calling itself the "HeArT HaCkEr Group."
    - 4 hours ago Tuesday, November 25, 2014 -
  • newSony Paralyzed By Computer Hacker Attack With Ominous Message
    UPDATE : While it seems that a world leading tech company would have be last to be brought down by a hacker, this Sony thing is serious. I've come across a still photo of the hacked message that appeared on screens, posted by a site called business2c…
    - 16 hours ago Monday, November 24, 2014 -
  • newAutomakers aim to drive away car computer hackers
    Meticulously overwhelming its computer networks, the hackers showed that - given time - they would be able to pop the trunk and start the windshield wipers, cut the brakes or lock them up, and even kill the engine. Their motives were not malicious.
    - 20 hours ago Monday, November 24, 2014 -
  • newAutomakers aim to drive away car computer hackers
    Defense Secretary Chuck Hagel is stepping down under pressure from President Barack Obama's Cabinet, senior administration officials said Monday, following a tenure in which he has struggled to break through the White... Where consumers see an advant…
    - 20 hours ago Monday, November 24, 2014 -
  • newAutomakers aim to drive away car computer hackers
    Chris Valasek, poses for a picture at the during the Los Angeles Auto Show on Wednesday, Nov. 19, 2014, in Los Angeles. Valasek, who helped catapult car hacking into the public eye when he and a partner revealed last year they had been able to contro…
    - 20 hours ago Monday, November 24, 2014 -
  • newNetwork Security Needs Big Data
    There are two types of organization now: those that have been breached, and those that just don't know it yet. A big part of the problem is that the traditional approach to network security, relying on perimeter-centric strategies, is failing.
    - 21 hours ago Monday, November 24, 2014 -
  • newHacker claiming ties to Anonymous forces Toronto police website offline for hours
    The Toronto Police Service's website went offline Sunday after a Twitter user who claims to be connected with the hacker group Anonymous threatened to infiltrate it. The City of Ottawa website was hacked late Friday afternoon, with the name of an Ott…
    - 24 hours ago Monday, November 24, 2014 -
  • newOne in six smartphone users victim of cyber attack: Study
    London: One in six smartphone users in the world have fallen prey to a cyber attack, reveals a new study, adding that 60 percent of smartphone users and almost half of tablet users are vulnerable to hacking as these devices have no protection against…
    - 1 day ago Monday, November 24, 2014 -
  • newOne in six adults 'fallen prey to a cyber attack'
    One in six adults has been stung online and been the victim of a cyber attack, fresh data has shown. Global information services Experian revealed the 16% of adults had fallen victim to a phishing scam, had personal data taken to use offline or had a…
    - 1 day ago Monday, November 24, 2014 -
  • new[Sprite_TM]'s Keyboard Plays Snake
    Hackaday Prize judge, hacker extraordinaire, and generally awesome dude [Sprite_TM] spends a lot of time at his computer, and that means a lot of time typing on his keyboard. He recently picked up a board with the latest fad in the world of keyboards…
    - 1 day ago Sunday, November 23, 2014 -
  • new'No one is safe': Hacking threat
    YOU'VE been hacked and you don't even know it. In fact, you're probably being hacked right now, at this very moment.
    - 2 days ago Sunday, November 23, 2014 -
  • newPopeyes comes to North Olmsted; hacker attacks Olmsted Falls website: Best of the Beat
    Popeyes comes to North Olmsted; a hacker attacks Olmsted Falls website, and Fairview Park's mayor wants improvements to Giant Eagle. Catch up on these stories and others you might have missed over the past week from Fairview Park, Lakewood, North Olm…
    - 2 days ago Sunday, November 23, 2014 -
  • newCyber-crime unit launched by police
    Congratulations, you're now registered! Let us know what news and updates you want to hear about and we'll send them straight to your inbox. Internet hackers target more than 40 people in the county every month according to Northants Police, which ha…
    - 2 days ago Sunday, November 23, 2014 -
  • newPurported City of Ottawa website hacker returns to social media
    The tweeter purporting to be behind the hacking of the City of Ottawa website returned to social media late Saturday afternoon with a barrage of messages. After spending much of Saturday off the Internet, the tweeter purporting to be behind the hacki…
    - 2 days ago Sunday, November 23, 2014 -
  • newHacking for nude pics on the rise, say experts
    Hacking into computers for nude photos and threatening to expose victims online is among a growing type of crime, say cyber experts and police. With a proliferation of apps and websites in an increasingly digitalized world, sharing sexually-explicit…
    - 2 days ago Saturday, November 22, 2014 -
  • newAfter Backlash, Computer Engineer Barbie Gets New Set Of Skills
    Women in the technology field have faced all manner of insults, including, most recently, GamerGate, which highlighted sexism and harassment in video game culture. This week, another insult - from a seemingly more benign source - set off a loud onlin…
    - 2 days ago Saturday, November 22, 2014 -
  • newAnonymous pledges more attacks in Canada
    The Anonymous hacker group that took credit for Friday's cyber attack on Ottawa City Hall has pledged eight more targets in Canada, including Ottawa Police and the Supreme Court. The group has taken responsibility for Friday's hack, in which Ottawa.c…
    - 3 days ago Saturday, November 22, 2014 -
  • newDocker Releases Security Advisory
    Original release date: November 24, 2014Docker has released a critical security advisory to address vulnerabilities in Docker versions prior to version 1.3.2, one of which could allow an attacker to escalate privileges and execute remote code on an a…
    - 9 hours ago Monday, November 24, 2014 -
  • newUS-CERT Alerts Users to Holiday Phishing Scams and Malware Campaigns
    Original release date: November 24, 2014US-CERT reminds users to remain vigilant when browsing online this holiday season. E-cards from unknown senders may contain malicious links. Fake advertisements or shipping notifications may deliver infected at…
    - 22 hours ago Monday, November 24, 2014 -
  • WordPress Releases Security Update
    Original release date: November 21, 2014WordPress 4.0.1 has been released to address multiple vulnerabilities, one of which could allow a site to be compromised by a remote attacker. WordPress 3.9.2 and earlier are affected by this vulnerability. US…
    - 4 days ago Friday, November 21, 2014 -
  • Drupal Releases Security Advisory
    Original release date: November 20, 2014Drupal has released an advisory to address multiple vulnerabilities in Drupal core 6.x versions prior to 6.34 and Drupal core 7.x versions prior to 7.34, one of which could allow a remote attacker to cause a de…
    - 4 days ago Thursday, November 20, 2014 -
  • Google Releases Security Update for Chrome
    Original release date: November 19, 2014Google has released Chrome 39.0.2171.65 for Windows, Mac and Linux. This update addresses multiple vulnerabilities, one of which could cause a denial of service condition.Users and administrators are encouraged…
    - 6 days ago Wednesday, November 19, 2014 -
  • Microsoft Releases Out-of-Band Security Bulletin for Windows Kerberos Vulnerability
    Original release date: November 18, 2014 | Last revised: November 19, 2014Microsoft has released security updates to address a remote elevation of privilege vulnerability which exists in implementations of Kerberos KDC in Microsoft Windows. Exploitat…
    - 7 days ago Tuesday, November 18, 2014 -
  • IC3 Releases Scam Alert for Fraudulent Online Advertisements
    Original release date: November 18, 2014The Internet Crime Complaint Center (IC3) released a Scam Alert regarding fraudulent ads for normally expensive items, such as cars and boats, at discounted prices. Scam operators often use false contact inform…
    - 7 days ago Tuesday, November 18, 2014 -
  • Apple Releases Security Updates for iOS, OS X Yosemite, and Apple TV
    Original release date: November 17, 2014Apple released security updates for iOS devices, OS X Yosemite and Apple TV to address multiple vulnerabilities, one of which could allow remote attackers to execute arbitrary commands.Updates available include…
    - 8 days ago Monday, November 17, 2014 -
  • IC3 Releases “Tech Support” Themed Scam Alert
    Original release date: November 13, 2014The Internet Crime Complaint Center (IC3), a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C) to combat Internet crime, has released a Scam Alert a…
    - 12 days ago Thursday, November 13, 2014 -
  • Google Releases Security Update for Chrome
    Original release date: November 11, 2014Google has released Chrome 38.0.2125.122 for Windows, Mac and Linux. This update addresses a vulnerability which could potentially allow an attacker to take over an affected system.US-CERT encourages users and…
    - 13 days ago Tuesday, November 11, 2014 -
  • Дураки на экранах

    - Saturday, December 13, 2008 -
  • Казаки-разбойники

    - Wednesday, December 10, 2008 -
  • 22
    Привет.Сегодня 22.Сегодня госстат установил инфляцию на уровне почти 22%.Через 22 дня Новый Год!Конечно настроение не праздничное: кризис, р…
    - Monday, December 8, 2008 -
  • Маразм крепчал
    Привет.Государственный комитет статистики сообщил, что в октябре доходы населения сократились на 1% по сравнению с сентябрем до 77 627 млн.…
    - Friday, December 5, 2008 -
  • Защити себя сам
    Привет.Сокращения на многих промышленных предприятиях и массовое обналичивание всех вкладов привело к росту краж и грабежей.Наша добле…
    - Thursday, December 4, 2008 -
  • Спасите отечественного автопроизводителя
    Привет.Продолжаем наблюдать за кризисом. Очень интересно сравнивать действия в разных государствах.В нашей стране хотят ввести дополни…
    - Thursday, December 4, 2008 -
  • Шоу маст гоу вон
    Привет.Шоу под названием "антикризис в Украине" продолжается.Комментарии.net пишут, что министр финансов предлагает навязать всем банкам…
    - Wednesday, December 3, 2008 -
  • Вот такой у нас футбол
    Привет.Не запланированная заметка.Случайно зашел на Корреспондент.net:Вот такой у нас футбол: УЕЫИ на это все уже было 53 комментария.Посто…
    - Wednesday, December 3, 2008 -
  • Доллар гудбай...
    Привет.Наша страна (Украина) - оплот свободы и демократии.Сейчас многие говорят о конце доллара США - переход стран Северной Америки на ед…
    - Wednesday, December 3, 2008 -
  • Итоги ноября
    Привет.Давно я не проводил анализа входящего трафика. Сегодня подводим итоги ноября 2008 года. Общее число посещений 1038, посещено страниц -…
    - Tuesday, December 2, 2008 -
  • Пришла зима - пропала "зелень"
    Привет.В нашем "замечательном" государстве в течение последних нескольких лет национальная валюта была "жестко" привязана к национально…
    - Monday, December 1, 2008 -
  • А кто считает расходы на эксплуатацию?

    - Friday, November 28, 2008 -
  • Мой дом - моя крепость
    Привет.В нашем регионе кризис продолжает бушевать. Количество безработных (реальных) растет. Людей могут и не сокращать, но отправляют в…
    - Friday, November 28, 2008 -
  • И эти люди запрещают мне в носу ковыряться

    - Tuesday, November 25, 2008 -
  • Кризис не хотят замечать
    Привет.Кризис бушует. Предприятия сокращают свой штат. Многих отправляют в "бесплатные" отпуска. Многим задерживают зарплаты. Многим офи…
    - Monday, November 24, 2008 -