• newWhich Stars Will Shine Brightest in Apple's Brilliant 2015?
    The end of the year and holiday season is a natural time to look back -- and then look forward to the year to come. Apple started 2014 slowly, but more than made up for it in the long haul, introducing the Apple Watch, Apple Pay, Mac OS X Yosemite, i…
    - 2 days ago Friday, December 19, 2014 -
  • newDefending the Free Linux World
    The Open Invention Network, or OIN, is waging a global campaign to keep Linux out of harm's way in patent litigation. Its efforts have resulted in more than 1,000 companies joining forces to become the largest defense patent management organization i…
    - 2 days ago Friday, December 19, 2014 -
  • newUS Mulls Response to Sony Hack
    Department of Homeland Security Secretary Jeh Johnson on Thursday said the United States "is actively considering a range of options" to take in response to the Sony hack. The hack is "very serious," Johnson said, though he refused to label it as a t…
    - 2 days ago Friday, December 19, 2014 -
  • newDocker CTO Solomon Hykes to Devs: Have It Your Way
    Docker has moved from an obscure Linux project to one of the most popular open source technologies in cloud computing. Project developers have witnessed millions of Docker Engine downloads. Hundreds of Docker groups have formed in 40 countries. Many…
    - 2 days ago Thursday, December 18, 2014 -
  • newMinecraft Players Will Get to Shape the Game's Story
    Mojang has partnered with Telltale Games to create a brand new Minecraft game that will be narrative-driven. Dubbed "Minecraft: Story Mode," the series will be set in the world of Minecraft, but it will feature an original story that combines new cha…
    - 3 days ago Thursday, December 18, 2014 -
  • newExperts Forecast the End of Privacy as We Know It
    Privacy's future appears muddy at best, judging from a survey released Thursday by the Pew Research Center and Elon University's Imagining the Internet Center. More than 2,500 Internet experts and analysts were narrowly divided on whether policy make…
    - 3 days ago Thursday, December 18, 2014 -
  • BMW's Self-Parking Tech Relieves Drivers From Circling the Lot
    BMW Group this week previewed the automated parking technology it will showcase at next month's International CES in Las Vegas. The Remote Valet Parking Assistant features 36-degree collision avoidance with secure position and environment recognition…
    - 3 days ago Thursday, December 18, 2014 -
  • Terrorist Threats May Blow Up 'The Interview's' Box Office
    The now-notoriously controversial action comedy The Interview, which was expected to deliver profits of $90-$95 million for Sony, may have become a financial black hole. The movie's Thursday premiere in New York has been cancelled, and several movie…
    - 4 days ago Wednesday, December 17, 2014 -
  • FIDO Pursues Vision of a Password-Free World
    A group of some 150 companies last week moved closer to eliminating the bane of many an online user: the ubiquitous password. The FIDO Alliance, which counts among its members Microsoft, PayPal, Google, Bank of America, Visa and MasterCard, released…
    - 4 days ago Wednesday, December 17, 2014 -
  • Google's Cardboard VR Kit Is Really No Joke
    Google last week announced an updated app for its minimalist Cardboard virtual-reality viewer, as well as software development kits for both Android and the Unity game engine. It also published new building specifications for those interested in maki…
    - 4 days ago Wednesday, December 17, 2014 -
  • Skype Begins Dismantling the Language Barrier
    Microsoft on Monday announced the first phase of its Skype Translator preview program, which initially will facilitate conversations between English and Spanish speakers. It will convert spoken words both ways. It also will translate instant messages…
    - 5 days ago Tuesday, December 16, 2014 -
  • newHackers Can Read Your Private SMS and Listen to Phone Calls
    Security researchers have discovered a massive security flaw that could let hackers and cybercriminals listen to private phone calls and read text messages on a potentially vast scale – no matter if the cellular networks use the latest and most adv…
    - 2 days ago Friday, December 19, 2014 -
  • newRouter Vulnerability Puts 12 Million Home and Business Routers at Risk
    More than 12 million routers in homes and businesses around the world are vulnerable to a critical software bug that can be exploited by hackers to remotely monitor users’ traffic and take administrative control over the devices, from a variety of…
    - 2 days ago Friday, December 19, 2014 -
  • newCritical Git Client vulnerability Allows Malicious Remote Code Execution
    Developers running the open source Git code-repository software and tools, like GitHub, on Mac OS X and Windows computers are highly being recommended to install a security update that patches a major security vulnerability in Git clients that levera…
    - 2 days ago Friday, December 19, 2014 -
  • newGoogle Releases Chrome Extension for End-To-End Email Encryption
    Back in june this year, Google announced an alpha Google Chrome extension called "End-to-End" for sending and receiving emails securely, in wake of former NSA contractor Edward Snowden’s revelations about the global surveillance conducted by the go…
    - 3 days ago Thursday, December 18, 2014 -
  • Global Internet Authority ICANN Has Been Hacked
    The Internet Corporation for Assigned Names and Numbers (ICANN) has been hacked by unknown attackers that allowed them to gain administrative access to some of the organization's systems, the organization confirmed.The attackers used "spear phish…
    - 3 days ago Thursday, December 18, 2014 -
  • Built-In Backdoor Found in Popular Chinese Android Smartphones
    Chinese smartphone manufacturers have been criticized many times for suspected backdoors in its products, the popular Chinese smartphone brands, Xiaomi and Star N9500 smartphones are the top examples. Now, the China's third-largest mobile and world's…
    - 3 days ago Thursday, December 18, 2014 -
  • Anonymous Hacks Swedish Government in Revenge for 'Pirate Bay' Takedown
    An online "hacktivist" group that calls itself Anonymous has claimed responsibility for hacking into email accounts of Swedish government in response to the seizure of world renowned The Pirate Bay website and server by Swedish police last week.A…
    - 4 days ago Wednesday, December 17, 2014 -
  • Quantum Encryption Makes Credit Cards Fraud-Proof
    Credit card frauds are very common these days – today a data breach occurs in retailer’s shop, online shopping site or banking site and at the next moment millions of cards appears in the underground black market – how simple is that for cyber…
    - 4 days ago Wednesday, December 17, 2014 -
  • Sony Hackers Threaten 9/11 Type Attack at Theaters Showing 'The Interview' Movie
    The massive hacking attack against Sony Pictures Entertainment has yet exposed about 200 gigabytes of confidential data belonging to the company from upcoming movie scripts to sensitive employees data, celebrities phone numbers and their travel alias…
    - 4 days ago Wednesday, December 17, 2014 -
  • Malware Exploits SHELLSHOCK Vulnerability to Hack NAS Devices
    The year is about to end, but serious threats like Shellshock is "far from over". Cyber criminals are actively exploiting this critical GNU Bash vulnerability to target those network attached storage devices that are still not patched and ready for…
    - 5 days ago Tuesday, December 16, 2014 -
  • Chrome Plans to Mark All 'HTTP' Traffic as Insecure from 2015
    Google is ready to give New Year gift to the Internet users, who are concerned about their privacy and security. The Chromium Project's security team has marked all HTTP web pages as insecure and is planning to explicitly and actively inform users t…
    - 5 days ago Tuesday, December 16, 2014 -
  • Log and Event Manager now with File Integrity Monitoring
    Security pros everywhere rely on SolarWinds Log & Event Manager for powerful, affordable, and efficient Security Information and Event Management (SIEM). Our All-In-One SIEM combines log management, event correlation, visualization, reporting, File I…
    - 5 days ago Tuesday, December 16, 2014 -
  • Blackhat – Upcoming Cyber Thriller Movie
    "Hacking" is not just popular among cyber security experts and criminals, but also is a great interest for movies industries as well. Hollywood movies such as 1995 released Hackers and 2001 released Swordfish are examples of it, and now Chris Hemswor…
    - 5 days ago Tuesday, December 16, 2014 -
  • 'SoakSoak' Malware Compromises 100,000 WordPress Websites
    The users of WordPress, a free and open source blogging tool as well as content management system (CMS), are being informed of a widespread malware attack campaign that has already compromised more than 100,000 websites worldwide and still counting.…
    - 6 days ago Monday, December 15, 2014 -
  • GCHQ Releases 'Cryptoy' App for Kids to Teach Encryption
    British government surveillance agency GCHQ – counterpart of NSA – has fired-up another debate over the Internet by launching Android application to encourage teenagers to tackle emerging cybersecurity threats.The newly launched Android app,…
    - 7 days ago Sunday, December 14, 2014 -
  • Alibaba Marketplace Vulnerability Puts Millions Of Shoppers at Risk
    Alibaba Group has patched a major security vulnerability in one of its e-commerce portals that exposed account details of tens of millions of Merchants and shoppers to cyber criminals. An Israeli application security firm, AppSec Labs, found a C…
    - 9 days ago Friday, December 12, 2014 -
  • Las Vegas Sands' Casino Network hit by Destructive Malware
    Sony Pictures Entertainment hack that started at the end of the last month and so far has caused a severe damage to its reputation as well as resources, from internal system shutdown to upcoming movies and scripts leak. Now, a similar cyber attack ag…
    - 9 days ago Friday, December 12, 2014 -
  • Smartwatch Hacked... Data Exchange with Smartphone Not So Secure
    We are living in an era of smart devices that we sync with our smartphones and make our lives very simple and easy, but these smart devices that inter-operates with our phones could leave our important and personal data wide open to hackers and cyber…
    - 10 days ago Thursday, December 11, 2014 -
  • Sony Pictures Scarier Hack — Hackers Leak Scripts, Celebrity Phone Numbers and Aliases
    The massive hacking attack against Sony Pictures Entertainment has reached a more scarier phase following another huge leak of sensitive, confidential documents revealing celebrity contact details and upcoming film scripts.The so-called Guardians…
    - 11 days ago Wednesday, December 10, 2014 -
  • 'The Pirate Bay' Goes Down After Swedish Police Raid Server Room
    The Pirate Bay — an infamous Torrent website predominantly used to share copyrighted material such as films, TV shows and music files, free of charge — went dark from the internet on Tuesday after Swedish Police raided the site's server room in S…
    - 11 days ago Wednesday, December 10, 2014 -
  • Microsoft Releases 7 Security Updates
    Last week Microsoft released its Advance Notification for the month of December 2014 Patch Tuesday Updates, and finally today released a total of seven security bulletins, which will address several vulnerabilities in its products, out of which three…
    - 12 days ago Tuesday, December 9, 2014 -
  • POODLE SSL Vulnerability Now Attacking TLS Security Protocol
    POODLE, a critical SSL flaw discovered in October that was patched and fixed by webmasters around the world after Google alerted software and hardware vendors, has again made its way and this time the vulnerability affects implementations of the newe…
    - 12 days ago Tuesday, December 9, 2014 -
  • Powerful Linux Trojan 'Turla' Infected Large Number of Victims
    Security researchers have discovered a highly nasty Linux trojan that has been used by cybercriminals in state sponsored attack in order to steal personal, confidential information from government institutions, military and pharmaceutical companies a…
    - 12 days ago Tuesday, December 9, 2014 -
  • AliExpress WebSite Vulnerability Exposes Millions of Users' Private Information
    A critical, but easily exploitable personal information disclosure vulnerability has been discovered in the widely popular online marketplace AliExpress website that affects its millions of users worldwide.The reported vulnerability could allow a…
    - 12 days ago Tuesday, December 9, 2014 -
  • Google App Engine — More than 30 Vulnerabilities Discovered
    Security researchers have discovered a number of critical vulnerabilities in the Java environment of the Google App Engine (GAE) that enables attackers to bypass critical security sandbox defenses.Google App Engine is Google’s PaaS (Platform as…
    - 13 days ago Monday, December 8, 2014 -
  • newPetitioners Demand Sony Release 'The Interview,' Stand Up To Terrorist Threats
    Want to see "The Interview"? So do a lot of other would-be moviegoers, dissatisfied with Sony Pictures' decision this week to scrap the controversial ... Read more: The Interview, Sony, Sony Pictures, George Clooney, Sony Hack, James Fra…
    - 2 days ago Friday, December 19, 2014 -
  • newCarnegie Corporation of New York: Activating the Power of Ideas
    Stephen Del Rosso,Program Director, International Peace & SecurityThis article is excerpted from The Carnegie ReporterFive bold initiatives br... Read more: International, Academia, Teacher Tenure, North Korea, Cybersecurity, Arctic,…
    - 2 days ago Friday, December 19, 2014 -
  • newRebecca Abrahams: When There Is No Price to Be Paid the Hackers Win
    Despite precautions, cyber attackers can often stay one step ahead of protection mechanisms. Sony, of course, had little in the way of cyber security protections, making it an easy soft target for hackers. But even better protected systems can be pe…
    - 2 days ago Friday, December 19, 2014 -
  • newIra Kalb: Sony Pictures: How Not to Handle a Crisis
    To mitigate the damage and restore confidence, Sony Pictures executives need to develop a plan so this is unlikely to reoccur. While this is easier said than done, IT solutions are available to thwart hackers. Read more: Sony Pictures, H…
    - 3 days ago Thursday, December 18, 2014 -
  • newNorth Korea's Cyberarmy
    SEOUL, South Korea (AP) — Most North Koreans have never seen the Internet.But the country Washington suspects is behind a devastating hack on Sony... Read more: North Korea, Sony Hack, North Korea Hackers, Sony North Korea, Cyberterro…
    - 3 days ago Thursday, December 18, 2014 -
  • newLynda Bekore: Everything I Needed to Know About Corporate Cluelessness I Learned From Chris Rock
    As bad as Sony's cave-in, though, is the ridiculously false "shock" at the hackers' success in exposing the emails. There is incredible naiveté from everyone involved. Read more: Sony, Hackers, Email, Cuba, Chris Rock, North Korea, Nucl…
    - 3 days ago Thursday, December 18, 2014 -
  • Brian E. Finch: Stand Up, Sony!
    I find it more than a little ironic that as we wring our collective hands over the interrogation tactics used by the U.S. intelligence community, we are sitting idly by while attackers unknown are torturing and holding hostage an American company.…
    - 3 days ago Thursday, December 18, 2014 -
  • Alec Ross: Sony Hack Attacks Presage New Warfare: The Weaponization of Code
    What is important is that these hacks presage what is going to happen for years to come and at far greater cost than what is being imposed on Sony. The weaponization of code is the most significant development in warfare since the weaponization of fi…
    - 5 days ago Tuesday, December 16, 2014 -
  • Lu Wei: Cyber Sovereignty Must Rule Global Internet
    The success of the Internet in China over the past 20 years shows that successful foreign companies in China respect China's market environment and abide by China's law and regulations. U.S. companies operating in China show that those who respect th…
    - 6 days ago Monday, December 15, 2014 -
  • Man Posed As Victoria's Secret Rep To Get Underwear Photos: Cops
    A man in Iowa City, Iowa, is accused of posing as a Victoria's Secret representative in order to get women to send him underwear photos.Police sai... Read more: Dumb Crime, Mug Shots, Sean Boies, Sean Boies Victoria's Secret, Victoria's…
    - 9 days ago Friday, December 12, 2014 -
  • Adam Levin: 5 Big Privacy Predictions for 2015
    It seems like there were more companies that had privacy-related problems in 2014 than didn't. And the lucky ones that didn't "get got" were separated by only one or two degrees from those that did. As we look ahead to 2015, I see a mix of old privac…
    - 9 days ago Friday, December 12, 2014 -
  • Scott Sigmund Gartner: Why Do Russia and Iran Have More Cyber Commandos Than the U.S.?
    With new DOD leadership, troops returning to Iraq, and an extension of the U.S. stay in Afghanistan, doing more of the same is clearly not enough; it is time to embrace fresh national security ideas. Read more: Military, America, Cyberse…
    - 12 days ago Tuesday, December 9, 2014 -
  • Joe Ross: December Breach Round Up
    We're only a week in to December and there's already been significant cyber security activity. There have been a number of well publicized high profile breaches, malware attacks and phishing attacks as we head in to the final stretch of the year.…
    - 13 days ago Monday, December 8, 2014 -
  • Franz-Stefan Gady: The Wuzhen Summit and Chinese Internet Sovereignty
    China's concept of Internet sovereignty seems likely to result in a diplomatic cul-de-sac. However, Chinese officials will continue to employ sovereignty issues to occupy conference agendas and stall real progress on international cooperation in cybe…
    - 13 days ago Monday, December 8, 2014 -
  • PlayStation Network Hit By Suspected Hack Attack
    TOKYO (AP) — Sony's online PlayStation store was inaccessible to users for part of Monday in the latest possible cyberattack on the electronics and ... Read more: Sony, Sony Playstation, Playstation, Playstation Store, Cyberattack, Cyb…
    - 14 days ago Sunday, December 7, 2014 -
  • David Ongchoco: MakeSchool Co-Founder Ashu Desai Talks about, "The Computer Science Degree of the Future"
    MakeSchool, which was originally named MakeGamesWithUs, was born after Ashu Desai and Jeremy Rossmann decided that they needed to fix the educational gap in CS education. Read more: Startups, Coding, Programming, Coding Bootcamp, Coding…
    - 14 days ago Sunday, December 7, 2014 -
  • Adam Levin: Colleague or Criminal? The Sneaky New Cyberthreat You Face at Work
    The latest greatest swindlers in the cybercrime racket know you're onto their digital three-card monte, and they've made a few adjustments, putting yet another wrinkle in the corporate-hacking game by targeting top-level employees for major profits.…
    - 16 days ago Thursday, December 4, 2014 -
  • China's Internet Chief To U.S.: We Need Mutual Governance Of The Internet
    While the China-US working group on cyber security has been suspended following the US decision in May to indict five People's Liberation Army officer... Read more: China, China News, u.s. u.s. News, China u.s. Relations, China West Rela…
    - 18 days ago Wednesday, December 3, 2014 -
  • Rebecca Abrahams: Is Hollywood Going Back to Flip Phones?
    Flip phones are certainly not "safer" than smartphones. Read more: Smartphones, Phone Hacking, Celebrity Hacking, Privacy, Malware, Smartphone Security, Technology News
    - 19 days ago Tuesday, December 2, 2014 -
  • Movie Studio's Hacked Documents Reveal Huge Gender And Race Gap
    Sony Pictures Entertainment, one of the largest film studios in Hollywood, appears to have been the subject of a massive, devastating computer hack.... Read more: Sony Pictures, Sony Pictures Entertainment, Sony Pictures Hacked, Hacker…
    - 20 days ago Monday, December 1, 2014 -
  • Stay Cyber Safe This Holiday Season
    Attention all Black Friday shoppers -- or at least the 40% of you who make the majority of your purchases online! We have some security news for you. ... Read more: Hplifestyle, Cyber Security, Cyber Safe Shopping, Private Wi-Fi, Public-…
    - 20 days ago Monday, December 1, 2014 -
  • Robert Siciliano: How the Internet of Things Can Go Very Wrong
    The Internet--one of history's greatest inventions--is also one of history's greatest platforms for crime. Here are ways things can go very wrong with the Internet of Things. Read more: Social Media, Identity Theft, Privacy, Hacking, Hac…
    - 26 days ago Tuesday, November 25, 2014 -
  • Shelly Palmer: 5 Ways You'll Be Hacked On Cyber Monday
    There's a reason Gmail sent that email to your Spam folder. Leave it there. If you didn't ask for it, don't click on it! Read more: Technology, Tech, Shelly Palmer, Black Friday, Online Safety, Cyber Monday, Thanksgiving, Online Shopping…
    - 27 days ago Monday, November 24, 2014 -
  • Rebecca Abrahams: Solving the Threat to our Energy Grid
    co-authored by Dr. Stephen Bryen, Founder & CTO Ziklag SystemsAdmiral Michael Rogers, Director of the National Security Agency and head of the US ... Read more: Cyber Attacks, Power Grid, Energy Grid, Chinese Hackers, Russian Hackers, N…
    - 30 days ago Friday, November 21, 2014 -
  • Lauren Coles: 6 Yoga Moves for Hackers
    As the founder of an office yoga company, I'm constantly spreading the word about ways to bring yoga into your work day. I write about ways to deal wi... Read more: Hackers, Office Yoga, Healthy Living News
    - 32 days ago Wednesday, November 19, 2014 -
  • Luring The Elusive Cyber Security Pro
    Struggling to find scarce IT security talent? Make sure your hiring managers understand the certifications and match candidates for skills fit -- not just credentials.
    - Monday, April 14, 2014 -
  • Amazon Plans 3D Phone: Report
    Amazon phone capable of displaying images in three dimensions could ship this fall.
    - Saturday, April 12, 2014 -
  • Google Glass Goes Public
    Google Glass Explorer Program will be open to US-based adults on tax day.
    - Saturday, April 12, 2014 -
  • Facebook Changes: What To Expect
    Facebook cracks down on spammy posts, tweaks privacy options, and revamps messaging. Here's what it means to you.
    - Saturday, April 12, 2014 -
  • Hacker Weev Free After Appeal
    Andrew "Weev" Auernheimer, who embarrassed AT&T by exposing a security flaw, had his conviction overturned by federal appeals court.
    - Friday, April 11, 2014 -
  • Rogue IT Driven By Need For Speed
    We've lost control to business users before. But this time, the thing that initiated our pain (the cloud) may also be the cure.
    - Friday, April 11, 2014 -
  • 5 Ways Android Won Me Over
    From security to "Lego" programming, Android has more going for it than you might think.
    - Friday, April 11, 2014 -
  • 5 Job Interview Tips Via Alice In Wonderland
    Curiouser and curiouser! Use these techniques during your next interview to win that IT or security job offer.
    - Thursday, April 10, 2014 -
  • Google Glass For Parkinson's: 10 Findings
    Google Glass offers more health benefits than awkwardness, Parkinson's patients in UK study find.
    - Thursday, April 10, 2014 -
  • Hackathons Should Be More Than A Circus
    Tapping into developer talent at a hackathon should be fun, but don't lose sight of the potential business benefits.
    - Thursday, April 10, 2014 -
  • 5 reasons why hackers own your organization
    Last week I noted that most companies are either already hacked or could easily be hacked -- and, when they have anything worth stealing, are probably already owned by multiple APT (advanced persistent threat) groups.
    - 96 days ago Tuesday, September 16, 2014 -
  • How network virtualization is used as a security tool
    When people think of network virtualization, the advantages that come to mind typically include faster provisioning of networks, easier management of networks and more efficient use of resources. But network virtualization can have another major bene…
    - 97 days ago Monday, September 15, 2014 -
  • Sprint, Windstream traffic routing errors hijacked other ISPs
    Internet traffic routing errors made by U.S. operators Sprint and Windstream on the same day last week underscore a long-known Internet weakness, posing both security and reliability issues. Both of the errors involved Border Gateway Protocol (BGP),…
    - 97 days ago Monday, September 15, 2014 -
  • Data protection authorities find privacy lapses in majority of mobile apps
    Many mobile apps request too many permissions and don't explain how they collect users' personal information, a study of 1,211 popular apps by the Global Privacy Enforcement Network has found. The majority of the apps reviewed did not adequately expl…
    - Friday, September 12, 2014 -
  • Yahoo says it faced $250,000 daily fines for defying U.S. surveillance requests
    The U.S. government once threatened to fine Yahoo $250,000 a day if it failed to assist with its surveillance efforts, Yahoo said Thursday. Yahoo said it was threatened with the fines after it challenged surveillance powers granted to the U.S. govern…
    - Friday, September 12, 2014 -
  • How Google's tiff with certificate authorities can impact you
    Miffed certificate authorities are calling on Google to give websites more time to upgrade the security used in browser-to-server communications before displaying warnings in Chrome. The CAs are upset over Google's roughly six-month timetable for rat…
    - Thursday, September 11, 2014 -
  • Enemies no more, McAfee and Symantec agree to share threat data
    The recently launched Cyber Threat Alliance has been given a big boost with the news that Intel's McAfee division and former arch-enemy Symantec are to join the industry group whose mission is to create the first significant cross-vendor movement of…
    - Thursday, September 11, 2014 -
  • 3 security practices IoT will disrupt
    I made it back from DEFCON with both my phone and tablet intact, but I'm happy I didn't bring a light bulb. You see, if had brought a light bulb, and that light bulb was a smart LED bulb running Linux, it might be running someone else's software by n…
    - Thursday, September 11, 2014 -
  • Five million Gmail addresses and passwords dumped online
    An archive containing nearly 5 million Gmail addresses and plain text passwords was posted Tuesday on an online forum, but the data is old and likely sourced from multiple data breaches according to one security firm. A user with the online alias "tv…
    - Wednesday, September 10, 2014 -
  • Internet Explorer steals the Patch Tuesday spotlight again
    It's hard to imagine that we are already three-fourths of the way through 2014 -- at least as measured by Microsoft Patch Tuesdays. Today, Microsoft released four new security bulletins, but only one of them is Critical. Guess which one?
    - Wednesday, September 10, 2014 -
  • Cloud security: We're asking the wrong questions
    In the wake of the celebrity photo breach, the media is humming with stories disparaging the safety of the cloud.
    - Wednesday, September 10, 2014 -
  • Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates
    Adobe Systems released a critical security update for Flash Player that fixes 12 security vulnerabilities, but pushed back its planned patches for Reader and Acrobat by a week. The Flash Player updates, available for Windows, Mac, and Linux, address…
    - Tuesday, September 9, 2014 -
  • Comcast's open Wi-Fi hotspots inject ads into your browser
    Comcast is giving users a very good reason to demand an HTTPS connection on every site they visit. The Internet service provider has started injecting ads for its services on websites where you wouldn't normally see them when you're using an Xfinity…
    - Tuesday, September 9, 2014 -
  • Salesforce.com warns customers of malware attack
    Salesforce.com users are being targeted by a new version of a computer Trojan that has typically attacked online banking customers until now. The malware threat is called Dyre or Dyreza and came to light in June. Like most online banking Trojans, it…
    - Tuesday, September 9, 2014 -
  • What you need to know about the Home Depot data breach
    On Monday, Home Depot issued a public confirmation to reports that they had experienced a data breach impacting debit and credit cards. They're the world's largest home improvement retailer, operating 2,266 stores in the U.S., as well as 10 Canadian…
    - Tuesday, September 9, 2014 -
  • Tech industry groups ask U.S. Senate to 'swiftly pass' NSA curbs
    Tech industry organizations have written a letter to leaders in the U.S. Senate, to ask them to swiftly pass the USA Freedom Act, legislation that is expected to end the collection of bulk domestic phone data by the National Security Agency.
    - Tuesday, September 9, 2014 -
  • Home Depot confirms breach of its payment systems
    Home Depot said Monday that its payment systems had been breached, potentially affecting any customers who shopped at its stores in the United States and Canada since April. There's no evidence yet that debit card PIN numbers had been compromised, th…
    - Monday, September 8, 2014 -
  • IBM secures SoftLayer with Intel trusted modules
    Fortifying its SoftLayer cloud services for enterprise use, IBM has started using Intel's chip-based Trusted Execution Technology to help organizations in highly regulated industries meet their auditing and security compliance requirements. On Monday…
    - Monday, September 8, 2014 -
  • Adobe slates critical Reader security update for Tuesday
    Adobe yesterday said it would issue security updates next week for its PDF viewer Reader as well as for Acrobat, its PDF creator, to fix critical flaws in the software on Windows and Apple's OS X. But it won't be updating Flash Player, its ultra-popu…
    - Friday, September 5, 2014 -
  • Apple CEO says iCloud security will be strengthened
    Apple, still reeling from the nude celebrity photo incident, plans to soon strengthen security around its iCloud storage service, according to CEO Tim Cook in a news report Thursday.
    - Friday, September 5, 2014 -
  • newFBI Officially Blames North Korea in Sony Pictures Hack
    Following the high-profile cyber attack against Sony Pictures Entertainment, and continuous threats against  employees and celebrities, the FBI has released an official statement declaring the investigation has lead to “enough information to concl…
    - 2 days ago Friday, December 19, 2014 -
  • newCritical Git Vulnerability Allows for Remote Code Execution
    A critical Git vulnerability that affects all Git client versions as well as any software that interacts with Git repositories has been discovered. Ken Westin, Sr. Technical Marketing Manager and Security Analyst at Tripwire, explains the nature of t…
    - 2 days ago Friday, December 19, 2014 -
  • newSony & North Korea: A Call to Cyber Arms or Better Defense?
    (Updated 12/9/14 11:15AM to reflect FBI announcement of North Korean attribution) There has been a great deal of “cyber saber rattling” in response to North Korea allegedly being connected to the recent Sony Pictures Entertainment breach. The FBI…
    - 2 days ago Friday, December 19, 2014 -
  • newThe Syrian Electronic Army Strikes Again! International Business Times Hacked
    Online news site International Business Times has revealed that the notorious Syrian Electronic Army hacking group had successfully breached its security, and removed a story that was embarrassing to the country’s regime. The Syrian Electronic Army…
    - 2 days ago Thursday, December 18, 2014 -
  • newSecurity Slice: The Sony Pictures Breach – Part Two
    It’s been nearly a month since Sony Pictures suffered from a serious data breach and the damage is still acruing. Cyber threats connected with the attack have turned physical and hackers seem to reveal more company information each day. In the wake…
    - 2 days ago Thursday, December 18, 2014 -
  • newExecutive Cyber Intelligence Report: December 18, 2014
    This report was prepared by The Institute for National Security Studies (INSS) and The Cyber Security Forum Initiative (CSFI) to create better cyber situational awareness (Cyber SA) of the nature and scope of threats and hazards to national security…
    - 3 days ago Thursday, December 18, 2014 -
  • The Sony Hack – A Lesson in Cyber Terrorism
    This week, Sony Pictures has announced that it will not release “The Interview,” a film whose controversial subject matter is alleged to be one of the motivating factors behind a recent cyber attack against the company. Sony released a statement…
    - 3 days ago Thursday, December 18, 2014 -
  • 10 Notorious Cyber Criminals Brought to Justice – No. 8
    We continue our series of some of the most dangerous hackers brought to justice with this week’s cyber criminal: Egor Shevelev. Shevelev, also known as “Excalibur” online, is a Ukranian carder who helped lead an international cybercrime ring th…
    - 3 days ago Wednesday, December 17, 2014 -
  • 70 Percent of Employees Admit Having Unnecessary Access to Confidential Data
    A new survey conducted by the Ponemon Institute revealed a growing risk posed by corporations as employees report a lack of control over file access and use of company data. The survey of nearly 2,300 employees in US- and European-based organizations…
    - 4 days ago Wednesday, December 17, 2014 -
  • Delta Airlines Patches Boarding Pass URL Bug
    Delta Airlines has patched a bug that passengers could have used to view other people’s boarding passes. Paul Skrbec, a spokesman for the airline company, made the following comments about the incident: “Security is a top priority for Delta, and…
    - 4 days ago Wednesday, December 17, 2014 -
  • Raising Your Threat Intelligence
    Although the practice of threat intelligence for many industries is still emerging, the ability to consume and analyze the information relevant to an organization’s industry, environment and brand can prove highly beneficial for any security portfo…
    - 4 days ago Wednesday, December 17, 2014 -
  • The 12 Hacks of Christmas: Part 1
    People of all ages look forward to Christmas. Children dream of the gifts they’ll receive on Christmas Day, and those of us who are older savor the thought of spending the holidays in joyous company with friends and family. It is no wonder we have…
    - 4 days ago Tuesday, December 16, 2014 -
  • Passwords Are The New Data: Protecting Healthcare’s First Line of Defense
    From a security perspective, 2014 has clearly been the year of the compromised password. From Yahoo Mail to Apple iCloud to JP Morgan Chase, an alarming number of data breaches are successfully carried out using misappropriated account credentials. T…
    - 4 days ago Tuesday, December 16, 2014 -
  • FBI Used Metasploit Hacking Tool in ‘Operation Torpedo’
    The FBI used a powerful app called Metasploit in “Operation Torpedo,” a 2012 sting against the users of three dark net child porn websites. Metasploit is one of the world’s most popular penetration testing software. A community of over 200,000…
    - 5 days ago Tuesday, December 16, 2014 -
  • Debunking The Biggest Cyber Security Myths for Businesses
    A glimpse at the world of cyber security can be a frightening one. Stories revolving around security breaches hitting major companies, like Target and Home Depot, can fill any business executive with trepidation. As a result, companies both large and…
    - 5 days ago Monday, December 15, 2014 -
  • How Disgruntled Employees Can Damage The Business
    Employees come and go throughout the time that you run your business, and sometimes these relationships may end with a bad taste in the mouth for the employee, employer, or both. In today’s world, it is important to account for every possible tie t…
    - 5 days ago Monday, December 15, 2014 -
  • Integrating Threat Detection and Prevention with Tripwire and Check Point
    The radical evolution of the nature of malware has fueled the rise of targeted attacks, forcing security professionals to recognize that the traditional mass-market threats have now become sophisticated, modern attacks that are customized and relentl…
    - 6 days ago Monday, December 15, 2014 -
  • ‘SoakSoak’ Malware Compromises More Than 100,000 WordPress Websites
    A particular type of malware has infected more than 100,000 WordPress specific websites, according to a security firm. Tony Perez, CEO and Co-Founder of Sucuri, a web protection and malware removal company, notes in a blog post that the malware first…
    - 6 days ago Monday, December 15, 2014 -
  • The Voice of the CISO: Interview with Amar Singh
    This article marks the beginning of a new series for entitled “The Voice of the CISO.” By conducting interviews with prominent individuals in the field, we hope to gain detailed insight into the mind of a CISO in an attempt to better understand t…
    - 6 days ago Sunday, December 14, 2014 -
  • Security Slice: The Sony Pictures Breach – Part One
    The recent breach at Sony Pictures is on everyone’s minds; it’s being called one of the “worst hacks of all time,” after celebrities’ social security numbers, embarrassing emails, unreleased films and much more were stolen and leaked online…
    - 6 days ago Sunday, December 14, 2014 -
  • Quiz: Which Classic Holiday Character Are You?
    ‘Tis the 12th day before Christmas… Are you anxiously counting down the days to unwrap presents and drink more eggnog? Or wishing you could fast forward into 2015 and leave the “holidaze” behind? Would the Griswold’s welcome you with open a…
    - 8 days ago Saturday, December 13, 2014 -
  • New Phishing Emails Descend On GoDaddy Customers
    This month, several new phishing emails have been targeting customers of the popular web hosting service and Internet domain registrar GoDaddy. The attacks began on December 3 when a GoDaddy user spotted a phishing email that plays on the verificatio…
    - 9 days ago Friday, December 12, 2014 -
  • Trust, Honesty, Integrity: Do They Exist In Information Security?
    I am starting to wonder if I have been in the industry of information security for too long now with 30 years under my belt. I am equally wondering if my style and approach to doing the right thing with the application of ethical conduct is misplaced…
    - 9 days ago Thursday, December 11, 2014 -
  • Microsoft Partners with BitPay, Begins Accepting Cryptocurrency Payments
    Microsoft is the latest major company to partner with bitcoin payment processor BitPay, allowing customers to purchase digital goods with the increasingly popular method of payment. In one of the largest sponsorships to date, the tech giant will now…
    - 10 days ago Thursday, December 11, 2014 -
  • IDG Contributor Network: Virtual machines could be the gold standard for network security
    From researchers working with protected health information to administrators and executives working with financial numbers to the business offices dealing with credit card transactions, many individuals and groups within an organization need secure…
    - 5 days ago Tuesday, December 16, 2014 -
  • Ontario Government website hijacked
    If you can remember when MC Hammer was big you recall the ear-worm of a song that was his big hit called “U Can’t Touch This”. In the music video he danced around in cartoonish looking pants and generally have a good time. Well, the good times…
    - 5 days ago Tuesday, December 16, 2014 -
  • Breach insurance might not cover losses at Sony Pictures
    Documents leaked by the group claiming responsibility for the attack on Sony Pictures show that the company has upwards of $60 million in cyber insurance coverage after consolidating coverage with Sony Corporation of America. But will that be enough…
    - 6 days ago Monday, December 15, 2014 -
  • Retailers must not ignore security alerts, court says
    In what some are calling a "game changer," a Minnesota federal court said earlier this month that Target could liable for banks' data breach costs because the retailer had ignored its own security alerts.Target is based in Minnesota, but the Minnes…
    - 6 days ago Monday, December 15, 2014 -
  • Death of antivirus software greatly exaggerated
    An executive at a company whose name is synonymous with antivirus software raised eyebrows earlier this year when he pronounced the death of that form of system protection. Nevertheless, while the effectiveness of that software may have waned over t…
    - 6 days ago Monday, December 15, 2014 -
  • How to bridge and secure air gap networks
    One of the more interesting security best practices is about to get turned on its head, thanks to some cutting-edge research at a small Israeli think tank and elsewhere. The notion is called an "air gap network" and the idea is to isolate a PC from t…
    - 9 days ago Friday, December 12, 2014 -
  • Mandiant to Sony Pictures: Nothing could have prepared you for this
    In a letter to Sony Pictures' top executive on Saturday, Kevin Mandia, the CEO of Mandiant, said that the company's recent security problems were a well-planned crime that is unparalleled to anything his company has seen in recent years. Nothing, his…
    - 13 days ago Monday, December 8, 2014 -
  • Microsoft slates 7 security updates for next week, resurrects Exchange fix
    Microsoft today announced it will release seven security updates on Tuesday, three of them critical, to patch Internet Explorer (IE), Windows, various pieces of the Office suite, and the SharePoint and Exchange server software.The Exchange update was…
    - 17 days ago Thursday, December 4, 2014 -
  • Bank-backed security utility service to serve all industry sectors
    In an attempt to get ahead of cybercriminals, 16 banks have donated between $50,000 and $500,000 each to a build a new platform for sharing threat information. That platform is going live today -- and it's not just for banks.The Soltra Edge software…
    - 17 days ago Thursday, December 4, 2014 -
  • FBI memo warns of malware possibly linked to hack at Sony Pictures
    A Flash Alert issued by the FBI on Monday is warning those within its distribution circle about a type of malware that has the ability to destroy any system it infects. The memo, #A-000044-MW, was obtained by Salted Hash from a source that wishes to…
    - 20 days ago Monday, December 1, 2014 -
  • Siemens patches critical SCADA flaws likely exploited in recent attacks
    Siemens released security updates for several of its SCADA (supervisory control and data acquisition) products for industrial environments, in order to fix critical vulnerabilities that may have been exploited in recent attacks.One of the vulnerabi…
    - 20 days ago Monday, December 1, 2014 -
  • Over 23,000 Web servers infected with CryptoPHP backdoor
    Over 23,000 Web servers were infected with a backdoor called CryptoPHP that's bundled with pirated themes and plug-ins for popular content management systems.CryptoPHP is a malicious script that provides remote attackers with the ability to execute r…
    - 20 days ago Monday, December 1, 2014 -
  • Syrian Electronic Army posts hacking message on several news sites
    A hacker group called the Syrian Electronic Army (SEA) scared visitors to several news websites on Thursday by posting rogue pop-up messages saying they'd been hacked.According to reports from users on Twitter the affected sites included those of C…
    - 21 days ago Sunday, November 30, 2014 -
  • Sales contracts and other data published by Sony's attackers
    Update: A recent FBI memo on destructive malware might offer some clues into the Sony attack. Further details are here.On Saturday, GOP published sales and contract data from Sony Pictures Television, taken after the group compromised the entertainme…
    - 22 days ago Saturday, November 29, 2014 -
  • Report: Sony Pictures facing full network compromise
    UPDATE 4:This story has been updated in a new article, which is available here.UPDATE 3:Earlier this evening, an email was sent to Salted Hash from someone claiming to be an employee of Sony Pictures.The email used broken English, which would no…
    - 27 days ago Monday, November 24, 2014 -
  • Governments act against webcam-snooping websites
    Government officials in the U.S. and the UK are warning people to secure their webcams after websites that broadcast the contents of those cameras have sprung up online.One of the better-known sites, Insecam, appeared to have gone offline after the w…
    - 30 days ago Friday, November 21, 2014 -
  • NSA chief says cyberattacks on industrial systems are his top concern
    Multiple nation-states are investing in their capabilities to hack critical U.S. infrastructure, making defense of those networks a top priority, U.S. National Security Agency chief Admiral Mike Rogers said Thursday.Attackers are seeking detailed inf…
    - 30 days ago Thursday, November 20, 2014 -
  • Next year's DDOS attacks to come from Vietnam, India and Indonesia
    Vietnam, India and Indonesia might not have the most advanced Internet infrastructure, but they do have a large number of insecure smartphones coming online, making them the big botnet sources for next year's distributed denial of service attacks, ac…
    - 33 days ago Tuesday, November 18, 2014 -
  • Microsoft patches Kerberos vulnerability with emergency update
    Microsoft released an out-of-band patch on Tuesday, addressing a vulnerability in Kerberos KBC, a component that handles authentication on local networks.The patch was supposed to have been released earlier this month, but Microsoft withheld it due t…
    - 33 days ago Tuesday, November 18, 2014 -
  • Microsoft: Competing AV vendors need to remember who the bad guys are
    AV vendors, in fierce competition for users, should remember that cooperation is key in fighting malware, a top Microsoft security official said Friday.Data sharing between vendors has resulted in a drop in the overall number of malware families affe…
    - 37 days ago Friday, November 14, 2014 -
  • Stolen EMCOR Services laptop contained Social Security numbers, other data
    EMCOR Services Mesa Energy Systems is notifying an undisclosed number of individuals that their personal information was on a company laptop that was stolen.
    - 6 days ago Monday, December 15, 2014 -
  • Safe tether: Wearables
    Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.
    - 48 days ago Monday, November 3, 2014 -
  • Acting out: Cyber simulation exercises
    Simulation exercises show how companies should respond under a cyberattack, says HHS's Sara Hall. Teri Robinson reports.
    - 48 days ago Monday, November 3, 2014 -
  • Network care: Case study
    When a care provider supplied laptops to its roving employees, it added a security solution to enable efficient collaboration. Greg Masters reports.
    - 48 days ago Monday, November 3, 2014 -
  • A balancing act: Apple technology
    Apple's iPhone 6 and iOS 8 offer encryption for mobile users, but a focus on consumers can create security conundrums, reports Lee Sustar.
    - 48 days ago Monday, November 3, 2014 -
  • Upping the ante: PCI Security Standard
    The latest iteration of the PCI Security Standard calls for moving beyond simply meeting compliance mandates, reports Jim Romeo.
    - 48 days ago Monday, November 3, 2014 -
  • newGit thee behind me, Git crit security bug!
    Update anything on the desktop that touches GitHub if you want to live GitHub has acknowledged there's a flaw in its client software and recommended that users upgrade as soon as possible.…
    - 2 days ago Friday, December 19, 2014 -
  • newMovie industry's evil plan to destroy the internet is going precisely nowhere
    Yes, it would damage the DNS; no, it's not going to happen As well as finding out that Jennifer Lawrence earns less than her male counterparts, Hollywood studio execs are self-important a-holes and Sony Pictures has a password policy that a baby coul…
    - 2 days ago Friday, December 19, 2014 -
  • newHack hijacks electric skateboards, dumps hipsters in the gutter
    Automated attacks crash riders on the fly A hacker duo have shown how to hijack "Boosted" brand electricity-assisted skateboards.…
    - 2 days ago Friday, December 19, 2014 -
  • newKiwi hacker 'menace' pops home detention tracker cuffs
    Hack unit worn by on-parole crim. Blackmail said crim. Profit Kiwicon  Christchurch bus hacker William Turner has demonstrated how to trick home detention ankle monitors used in New Zealand.…
    - 2 days ago Thursday, December 18, 2014 -
  • newNew fear: ISIS killers use 'digital AK-47' malware to hunt victims
    New code built in-house targets innocents fending off deranged terrorists Malware has emerged from war-torn Syria targeting those protesting the rule of ISIS (ISIL, Islamic State, whatever the murderous humanity-hating fanatics are calling themselves…
    - 3 days ago Thursday, December 18, 2014 -
  • newMisfortune Cookie crumbles router security: '12 MILLION+' in hijack risk
    New claim: Homes, businesses menaced by vulnerable firmware Infosec biz Check Point claims it has discovered a critical software vulnerability that allows hackers to hijack home and small business broadband routers across the web.…
    - 3 days ago Thursday, December 18, 2014 -
  • newSecurity SEE-SAW: $3 MEEELLION needed to fight a $100k hack
    Threat intelligence 'mostly snake oil and marketing' It costs a whopping $3.1m to defend against a $100,000 advanced attack, a security duo claims.…
    - 3 days ago Thursday, December 18, 2014 -
  • CoolReaper pre-installed malware creates backdoor on Chinese Androids
    This a lot worse than just bloatware, say analysts Security researchers have discovered a backdoor in Android devices sold by Coolpad, a Chinese smartphone manufacturer.…
    - 3 days ago Thursday, December 18, 2014 -
  • TorrentLocker ransomware pestilence plagues Europe, bags $500k
    Too many people still running random .exe files in spam attachments TorrentLocker, one of the most widespread pieces of ransomware, has claimed thousands of victims since it first surfaced in February 2014, according to new research.…
    - 3 days ago Thursday, December 18, 2014 -
  • Social sniffer predicts which Nigerian prince has the best chance of scamming you
    Data matching tool will be open source, intended for good not evil Kiwi penetration tester Laura Bell has released a social engineering analysis tool to allow analysis of risky behaviour by punters.…
    - 3 days ago Thursday, December 18, 2014 -
  • URL LOL: Delta splats web flight boarding pass snoop bug
    Mobile site spits out details on fellow passengers Delta Airlines techies have fixed a flaw in the biz's paperless boarding pass system that allowed a hacker to access information on strangers' flights.…
    - 4 days ago Wednesday, December 17, 2014 -
  • Nork-ribbing flick <i>The Interview</i> AXED: Sony caves under hack terror 'menace'
    Terrorists win, Kim Jong Un fingered again Sony Pictures has confirmed the inevitable and cancelled the December 25 launch of The Interview after most major theater chains refused to run it.…
    - 4 days ago Wednesday, December 17, 2014 -
  • ICANN HACKED: Intruders poke around global DNS innards
    Spear-phishing attack timing couldn't be worse for domain name overseer Domain-name overseer ICANN has been hacked and its DNS zone database compromised, the organization has said.…
    - 4 days ago Wednesday, December 17, 2014 -
  • Can't stop Home Depot-style card pwning, but suppliers will feel PCI regulation pain
    Third parties must comply to new standard Third-party providers will face more stringent regulations as part of a revamp in payment card industry regulations due to go into full effect in the new year.…
    - 4 days ago Wednesday, December 17, 2014 -
  • London teen pleads guilty to Spamhaus DDoS
    Sentence will be passed in January next year A 17 year-old Londoner has pleaded guilty to a series of denial-of-service attacks against internet exchanges and the Spamhaus anti-spam service last year.…
    - 4 days ago Wednesday, December 17, 2014 -
  • Google bakes W3C malware-buster into Gmail
    Content Security Policy standard means non-complying extensions SHALL NOT PASS! If an online service offers even the slightest gap through which miscreants can launch an attack, they will do so. It's therefore not surprising that Google feels some ex…
    - 5 days ago Tuesday, December 16, 2014 -
  • Sony sued by ex-staff over daft security, leaked privates
    What if movie studio loses? Big biz liable for big data blunders? As if Sony Pictures didn't have enough on its plate, now former employees have launched a class-action lawsuit against the Hollywood giant over the parlous state of its security – an…
    - 5 days ago Tuesday, December 16, 2014 -
  • Banks, UK.gov must work together to beat cyber-nasties
    BoE also warns of IT failures 'exacerbating' sector instability Government must work closely with UK banks to improve financial institutions' infrastructure and resilience to cyber attacks, the Bank of England has warned.…
    - 5 days ago Tuesday, December 16, 2014 -
  • Sony hackers dump more hunks of stolen data, promise another 'Christmas gift'
    Still creepily trying to woo Sony staff too The Guardians of Peace, the hackers who plundered Sony Pictures' servers, has leaked more data swiped from the movie studio – and threatened a bigger document dump in the run up to Christmas in a set of s…
    - 5 days ago Monday, December 15, 2014 -
  • Chrome devs hatch plan to mark all HTTP traffic insecure
    Browsers tell us when content is secure, but not when to feel NAKED AND AFRAID The Chromium Project's security team has kicked off a debate on whether browser will mark all HTTP pages as insecure.…
    - 6 days ago Monday, December 15, 2014 -
  • Roll up, come see the BOOMING HACKER BAZAAR!
    Fake credential, premier credit cards, and 100% satisfaction, guaranteed Underground hacker markets are booming with counterfeit documents, premiere credit cards, hacker tutorials, and "complete satisfaction guarantees", according to a new report fro…
    - 6 days ago Monday, December 15, 2014 -
  • Senator: Backdoor for the Feds is a backdoor for hackers
    Wyden pushes for law banning special access in software, hardware for cops and spies A US Senator is urging Congress to pass laws forbidding Uncle Sam's spies from forcing software and hardware makers to build backdoors.…
    - 6 days ago Monday, December 15, 2014 -
  • Next gen ransomware: Elliptic cryptic, talks on Tor, demands Bitcoin
    All the gear and will cost you dear Cybercrooks have brewed a strain of ransomware that uses elliptic curve cryptography for file encryption, and Tor for communication.…
    - 6 days ago Monday, December 15, 2014 -
  • UK banks ill-prepared for return of the rabid POODLE
    Only 4,096 requests needed to uncover a 16-character cookie The latest evolution of a high-profile security flaw potentially exposes UK banks' web site traffic to eavesdropping.…
    - 6 days ago Monday, December 15, 2014 -
  • Uber surge pricing kicks in during Sydney siege
    Big bucks go to drivers, passengers go free Update  The central business district of Australia's largest city, Sydney, is today in lockdown after a man shut himself and around 40 people in a cafe. The man reportedly has a gun and has insisted his ca…
    - 7 days ago Sunday, December 14, 2014 -
  • Sony to media: stop publishing our stolen stuff or we'll get nasty
    Is this the moment celebrity rags get busted for making stuff up? Sony Pictures Entertainment has reportedly written a tersely-worded letter to lots of media outlets that have run stories based on material supposedly liberated from its servers.…
    - 7 days ago Sunday, December 14, 2014 -
  • Sony hackers PINCH early version of James Bond <i>Spectre</i> script
    Producers are shaken AND stirred An early screenplay of the upcoming James Bond movie Spectre was stolen by hackers who ransacked Sony Pictures Entertainment's computer system, the film's producers confirmed on Saturday.…
    - 7 days ago Sunday, December 14, 2014 -
  • Iranian CLEAVER hackers may DRAIN energy and defence firms, warn Feds
    FBI pins down possible biz targets in secret file – report Iranian hackers may be sniffing out education, defence and energy targets as part of a well-planned operation, the US Federal Bureau of Investigation has reportedly warned.…
    - 7 days ago Sunday, December 14, 2014 -
  • Batten down the patches: New vuln found in Docker container tech
    Last month's patch brought new privilege escalation flaw More security woes plagued users of the Docker application containerization tech for Linux this week, after an earlier security patch was found to have introduced a brand-new critical vulnerabi…
    - 9 days ago Friday, December 12, 2014 -
  • Sony Pictures hit by 'fightback on filesharers' DDoS claims – report
    War on Guardians of Peace? Sony Pictures is alleged to have conducted a retaliatory DDoS attack against websites currently holding its leaked information for public download, according to a media report.…
    - 9 days ago Friday, December 12, 2014 -
  • GCHQ releases teen-friendly code-busting app
    Cryptology fun for the whole family British surveillance agency GCHQ has launched its first app today in the hopes of encouraging 14- to 16-year-olds to get interested in cryptography.…
    - 9 days ago Friday, December 12, 2014 -
  • Hackable intercom lets you SPY on fellow apartment-dwellers
    He knows if you are sleeping, he knows if you're awake ... Kiwicon  Kiwi hacker Caleb "alhazred" Anderson has popped a video intercom device that could have allowed him to spy on the 700 apartments in his building.…
    - 9 days ago Friday, December 12, 2014 -
  • VMware exiting 2014 with a bang and a security whimper
    AirWatch p0wned, but vRealize and CloudVolumes realized and DevOps embraced The productive bits of 2014 may be ebbing away fast, but VMware's not slowing down: the company's shoved a few notables out the door in recent days.…
    - 9 days ago Thursday, December 11, 2014 -
  • Cisco to release flying pig – Snort 3.0
    Sourcefire's been making bacon, now wants you to fry it Cisco's going to release a flying pig.…
    - 9 days ago Thursday, December 11, 2014 -
  • Craft bazaar Etsy's security plan is candy to get devs talking
    Don't be that grumpy security guy people are afraid to approach Kiwicon podcast  Etsy's security chieftain Rich Smith has told the hacker faithful to secure their organisations by buttering-up devs with beer and candy.…
    - 9 days ago Thursday, December 11, 2014 -
  • Microsoft pulls a patch and offers PHANTOM FIX for the mess
    KB3004394 is a hot mess and the replacement KB3024777 was elusive Another Patch Tuesday, another mess for Microsoft, which has pulled update 3004394, aka “December 2014 update for Windows Root Certificate Program in Windows”.…
    - 9 days ago Thursday, December 11, 2014 -
  • FreeBSD developers VANQUISH Demon bug
    Hostile code injection averted Developers have quashed a potentially nasty security bug in FreeBSD.…
    - 10 days ago Thursday, December 11, 2014 -
  • Elderly zombie Asprox botnet STILL mauling biz bods, says survey
    Unkillable nasty still climbs out of the grave to this day The Asprox botnet was responsible for about 80 per cent of all attack sessions recorded during October 2014, impacting nearly 2,000 different organisations.…
    - 10 days ago Thursday, December 11, 2014 -
  • GCHQ, police to team up to hunt down child abuse on the darknet
    Major crackdown includes new 'self-abuse' grooming laws GCHQ is to team up with the UK's National Crime Agency to target paedophiles sharing child abuse images on the "dark net".…
    - 10 days ago Thursday, December 11, 2014 -
  • Charge Anywhere? More like Hacked Everywhere: Mobe cash biz admits 5-year security breach
    Who's been spying on our network? Anyone know? Mobile payments biz Charge Anywhere has admitted a hacker may have been snooping on its systems for FIVE years.…
    - 10 days ago Thursday, December 11, 2014 -
  • Parental Controls For YouTube
    Kids seem to be glued to YouTube these days. As a parent, it can be daunting to try and police the content that they watch. What's a parent to do?In our featured article: YouTube Parental Controls...Read Full Post
    - Saturday, May 31, 2014 -
  • Craigslist Safety and Security Tips
    Craigslist can be both a fun and scary place. You never know what you'll find for sale, and you often don't know who is on the other end of that sale until you complete the deal....Read Full Post
    - Saturday, May 31, 2014 -
  • 5 Tips to Help You Land an IT Security Job
    IT security jobs are still in high demand, especially given the fact that cyber crime seems to be a constant fixture in the news with data breaches becoming an almost daily occurrence....Read Full Post
    - Saturday, May 31, 2014 -
  • How to Avoid Becoming a Victim of the iPhone Lock Ransom Scam
    There is a new scam sweeping through Australia and other parts of the world this week. Victims are having their iPhones locked remotely by hackers who apparently compromised their iCloud account credentials. The victims are then being issued ransom d…
    - Saturday, May 31, 2014 -
  • Are Your Employees Leaking Sensitive Company Information on Facebook?
    Like it or not, Facebook is here to stay. Some companies allow employees to use Facebook at work and some strictly prohibit it. If your company allows it then you might want to continue reading....Read Full Post
    - Thursday, May 29, 2014 -
  • Rev up Your Security with a 10-minute PC Security Tune-up
    Securing your PC doesn't have to take hours and hours of your time. There are a lot of things you can do in just a few minutes to help improve your security posture....Read Full Post
    - Thursday, May 29, 2014 -
  • How to Prevent Your Web Browser From Being Hijacked
    Did you just try to Google something but instead of going to Google, your browser took you to some strange search engine you've never heard of?You might have just become a victim of browser hijacking. In this week's featured article: How to Prevent…
    - Wednesday, May 28, 2014 -
  • Are Your Clicks Getting Jacked?
    Have you ever been clickjacked? While it may sound like some kind of pro wrestling move, I assure you it is not.Clickjacking is a security threat that users all over the world are experiencing. How can you stay safe from clickjacking? Check out our…
    - Wednesday, April 30, 2014 -
  • Is Your Google+ Account Secure?
    Google+ seems to be slowly gaining some traction. It's probably not quite the big Facebook contender that Google had hoped it would be, but it is gaining steamJust like Facebook, Google+ has privacy and security settings that you should configure t…
    - Wednesday, April 30, 2014 -
  • If Your PC Was Just Hacked, Read This:
    You've just discovered that your PC has been hacked. You could run away and go hide in a corner, or you can take action and do something about it.If you opt for taking action, then you need to check out our article: I've Been Hacked! Now What? We'l…
    - Wednesday, April 30, 2014 -
  • newPrivilege Escalation Vulnerability Found in Linux Kernel
    A researcher has identified a serious vulnerability in the Linux kernel that can be exploited by a local attacker to escalate privileges on affected systems.read more
    - 2 days ago Friday, December 19, 2014 -
  • newCan We Learn from Big Breaches?
    Starting with the Target breach from the fall of 2013, it seems like the last year or so has almost been “The Year of PoS Breaches.” P.F. Chang, Michael’s Stores, United Parcel Service and more. If you are a security professional in retail, thi…
    - 2 days ago Friday, December 19, 2014 -
  • newApple, Microsoft, GitHub Release Updates to Fix Critical Git Vulnerability
    The distributed revision control system Git is affected by a serious vulnerability that could be exploited by an attacker to execute arbitrary commands and take over a developer's machine.read more
    - 2 days ago Friday, December 19, 2014 -
  • newIreland Doubles Down on Data Protection Funding
    Ireland’s Office of the Data Protection Commissioner will enjoy more funding in 2015, thanks to a new budget that effectively doubles what it received in 2014. In total, €3.65 million has been allocated to the Office for 2015, according to a Dec…
    - 2 days ago Friday, December 19, 2014 -
  • newSony Attack: Implications for 2015
    What will the world of cyber threats look like in 2015?  Will the New Year be defined by continuation, perhaps escalation, of data breaches as experienced by Home Depot, read more
    - 2 days ago Friday, December 19, 2014 -
  • newCyberattack on German Steel Plant Caused Significant Damage: Report
    An attack launched by an advanced persistent threat (APT) group against an unnamed steel plant in Germany resulted in significant damage, according a new report.read more
    - 3 days ago Thursday, December 18, 2014 -
  • newResearchers ID New Variant of Alina PoS Malware
    Researchers at Trustwave have uncovered a new variant of the Alina point-of-sale (PoS) malware. read more
    - 3 days ago Thursday, December 18, 2014 -
  • newSony Hack a 'Serious National Security Matter': White House
    The White House called the cyber-attack on Sony Pictures a serious national security matter Thursday, threatening an "appropriate response" as others pointed the finger at Pyongyang. read more
    - 3 days ago Thursday, December 18, 2014 -
  • newSAP Patches Bugs in Business Apps
    SAP has patched two serious vulnerabilities affecting users of their SAP BASIS and SAP BusinessObjects enterprise software. read more
    - 3 days ago Thursday, December 18, 2014 -
  • new"USBdriveby" Emulates Mouse and Keyboard to Hijack Computers
    A $20 USB microcontroller that someone can wear around their neck can be used to weaponize mouse clicks and keyboard actions in an effort to install backdoors, evade firewalls and modify DNS settings in a matter of seconds, a researcher has demonstra…
    - 3 days ago Thursday, December 18, 2014 -
  • Serious Vulnerabilities Found in Schneider Electric's ProClima Solution
    The ProClima configuration utility developed by Schneider Electric is affected by several command injection vulnerabilities, the Industrial Control Systems Computer Emergency Response Team (ICS-CERT) reported on Tuesday.read more
    - 3 days ago Thursday, December 18, 2014 -
  • Linux Systems Affected by "Grinch" Vulnerability: Researchers
    Researchers at cloud security company Alert Logic have discovered a vulnerability in the Linux platform that can lead to privilege escalation. The flaw has been dubbed "Grinch."read more
    - 3 days ago Thursday, December 18, 2014 -
  • Good News for Control Freaks: Help is on the Way
    If you are in the business of security, chances are your middle name is “control.” You could call it a behavioral bias, an occupational hazard, or just a tendency for those that are trying to keep some assembly of order in the chaotic world of cy…
    - 3 days ago Thursday, December 18, 2014 -
  • The Virtual Currency Taking Over the World isn’t the One You Think
    Currency is a technology that evolves according to the needs of the people who use it. Throughout history, the forcing function for an evolutionary step in currency has usually been to meet an efficiency gap such as arbitrage, auditing, or fraud cont…
    - 3 days ago Thursday, December 18, 2014 -
  • Hackers Compromise ICANN Computers
    Hackers Trick Way Into ICANN Computers The private agency that acts as a gatekeeper for the Internet on Wednesday said that hackers tricked their way into its computers. read more
    - 3 days ago Wednesday, December 17, 2014 -
  • Sony Cancels Parody Film as North Korea Suspected Over Hack
    Sony Pictures on Wednesday cancelled the release of a madcap comedy about North Korea that triggered chilling threats from hackers, as US investigators reportedly blamed Pyongyang for a damaging cyber-raid on the movie giant. read more
    - 3 days ago Wednesday, December 17, 2014 -
  • Xsser Malware Targeting iOS, Android Devices
    Researchers at Akamai Technologies released an advisory today about a mobile remote access Trojan (mRAT) used to target iOS and Android devices.read more
    - 4 days ago Wednesday, December 17, 2014 -
  • IPO Prospect Rapid7 Takes $30 Million Investment
    Rapid7, a Boston, Mass.-based provider of security analytics software and services, today announced that it has received $30 million in funding, bringing the total raised by the company to-date to $93 million. read more
    - 4 days ago Wednesday, December 17, 2014 -
  • US Cinemas Cancel Film Parody of North Korea Leader After Threats
    LOS ANGELES - US cinemas canceled screenings, including a red-carpet New York premiere, of a madcap comedy that offended North Korea, after mysterious computer hackers issued a chilling threat. read more
    - 4 days ago Wednesday, December 17, 2014 -
  • Zen and the Art of Cloud Database Security (Part 2)
    The benefits of the cloud are clear – better application flexibility and control at a lower cost. But you can’t think about moving to the cloud without addressing the inherent security concerns. In part-one of this series we discussed how to unde…
    - 4 days ago Wednesday, December 17, 2014 -
  • newBrace for more cyber attacks
    PETALING JAYA: If you think that a cyber attack like what happened to Sony Pictures Entertainment could only happen in Hollywood, think again. In the attack on Sony on Nov 24, the attackers hacked the company's network and took terabytes of private d…
    - 10 hours ago Saturday, December 20, 2014 -
  • newCIA Panel Recommends Against Penalizing Officers Responsible For Hacking Into Senate Computers
    CIA officials implicated in improperly accessing the computer network used by staff members of the Senate Intelligence Committee to produce a report accusing the Agency of torturing detainees will not be punished, the New York Times reported on Satur…
    - 18 hours ago Saturday, December 20, 2014 -
  • newLIST: 5 ways to make your email safer in case of a hack attack
    The Sony hack, the latest in a wave of company security breaches, exposed months of employee emails. Other hacks have given attackers access to sensitive information about a company and its customers, such as credit-card numbers and email addresses.
    - 22 hours ago Saturday, December 20, 2014 -
  • newHackers hold man's computer for ransom
    Hackers hold a Des Moines man's computers for ransom! Larry Marlin tells our Vanessa Peng he was locked out of his computer unless his paid up. She joins us LIVE from Ames with tonight's top story.
    - 1 day ago Saturday, December 20, 2014 -
  • newGovernment hacks and security breaches skyrocket
    There were nearly 61,000 cyberattacks and security breaches across the federal government last year, according to a recent Obama Administration report. Unclassified networks at the White House and State Department were recently hacked.
    - 1 day ago Saturday, December 20, 2014 -
  • newCEO Says Sony Pictures 'Did Not Capitulate,' Is Exploring Options
    On a day when President Obama added his voice to criticisms over the decision to pull the satire The Interview , Sony Pictures CEO Michael Lynton says the studio "did not capitulate" to hackers, and that its actions have been misunderstood. Lynton de…
    - 1 day ago Friday, December 19, 2014 -
  • newStaples hack exposes 1.2 million credit cards
    After a two-month wait, Staples on Friday evening announced hackers broke into its computers and stole data on 1.16 million shoppers' credit cards and debit cards. Staples first announced it was investigating a potential data breach in the Northeast…
    - 2 days ago Friday, December 19, 2014 -
  • new5 ways to make email safer and limit how much a hacker can access in an attack
    LOS ANGELES, Calif. - The Sony hack, the latest in a wave of company security breaches, exposed months of employee emails.
    - 2 days ago Friday, December 19, 2014 -
  • newHackers pry into websites using 'portals of entry'
    "If a website [input field] is meant to only accept numbers but the way the code is written didn't specifically look for numbers, you can modify that to insert something else and it will trick the application into returning data it wasn't designed to…
    - 2 days ago Friday, December 19, 2014 -
  • newMessage Purportedly From Hackers Calls Sony Film Cancellation 'Wise'
    Sony Pictures executives received an email claiming to be from the same people who hacked the studio's computers recently, praising its decision not to release the movie "The Interview," according to a person familiar with the matter.
    - 2 days ago Friday, December 19, 2014 -
  • newHackers May Have Planted Their 'Time Bomb' Inside Sony Months Ago
    We're starting to get more details on how the massive hack against Sony Pictures' computer network may have taken place. Bloomberg interviewed a security analyst at Trend Micro , a security software company that claims to have copies of the malware u…
    - 2 days ago Friday, December 19, 2014 -
  • newThe App That Makes It Incredibly Easy For Hackers To Break Into Your...
    The update allows users to break into iCloud accounts that have two-factor authentication enabled, the company announced on Thursday . It requires that you type in a one-time code that the service sends via text message to your phone after you enter…
    - 2 days ago Friday, December 19, 2014 -
  • newSecurity Experts on Sony Hack: "WWIII Looks Like This"
    Scott Budman reports. The term "cyber warfare" has been thrown around for years, with security experts wondering what the effects of a damaging cyber attack might look like.
    - 2 days ago Friday, December 19, 2014 -
  • newResearchers discover security flaws that could let anyone hear your cell calls
    German researchers have discovered security flaws that could let hackers, spies and criminals listen to private phone calls and intercept text messages on a potentially massive scale - even when cellular networks are using the most advanced encryptio…
    - 2 days ago Friday, December 19, 2014 -
  • newFirst Bush, then Cuba: Rubio rides political wave
    In that time... By The Associated Press It's been four weeks since hackers calling themselves Guardians of Peace began their cyberterrorism campaign against Sony Pictures Entertainment. In that time thousands of... As the 2016 Republican presidential…
    - 3 days ago Thursday, December 18, 2014 -
  • newJust How Bad Was the ICANN Database Breach?
    The Internet Corp. for Assigned Names and Numbers has been hacked. The nonprofit organization that manages several databases of domain names is investigating a system intrusion that compromised its domain name servers.
    - 3 days ago Thursday, December 18, 2014 -
  • newBotched cyberattack on Syria group blamed on IS
    Cyber Arabs is an online s... . WITH STORY MIDEAST ISLAMIC STATE CYBERATTACK BY RAPHAEL SATTER - In this photo dated Wednesday, Dec. 17, 2014, Lebanese Bahaa Nasr of Cyber Arabs checks his email from his office in Beirut, Lebanon.
    - 3 days ago Thursday, December 18, 2014 -
  • new"Misfortune Cookie" Broadband Router Vulnerability
    Original release date: December 20, 2014Broadband routers employing the Allegro RomPager firmware prior to versions 4.34 contain a vulnerability in HTTP cookie processing code. Exploitation of this vulnerability could allow a remote attacker to take…
    - 21 hours ago Saturday, December 20, 2014 -
  • newVulnerabilities Identified in Network Time Protocol Daemon
    Original release date: December 19, 2014NTP has released an update that addresses multiple vulnerabilities in the Network Time Protocol daemon. Exploitation of these vulnerabilities may allow a remote attacker to execute malicious code.US-CERT encour…
    - 2 days ago Friday, December 19, 2014 -
  • newFTC Releases "Package Delivery" Themed Scam Alert
    Original release date: December 19, 2014The Federal Trade Commission (FTC) has released a Scam Alert addressing a "Package Delivery" themed phishing campaign regarding package delivery notifications from the U.S. Postal Service.  Scam operators ofte…
    - 2 days ago Friday, December 19, 2014 -
  • Docker Releases Security Updates
    Original release date: December 12, 2014Docker versions 1.3.3 and 1.4.0 have been released to address multiple security vulnerabilities, one of which could allow a remote attacker to take control of a vulnerable system.Users and administrators are en…
    - 8 days ago Friday, December 12, 2014 -
  • VMware Releases Updates for vCAC
    Original release date: December 09, 2014VMware has released security updates to address a critical vulnerability in vCloud Automation Center (vCAC), which could allow a remote attacker to take control of a vulnerable system.US-CERT encourages users a…
    - 12 days ago Tuesday, December 9, 2014 -
  • Certain TLS Implementations Vulnerable to POODLE Attacks
    Original release date: December 09, 2014A new variant of the POODLE attack may affect some TLS implementations on account of an issue similar to one present in SSL 3.0. Successful exploitation may enable actors to derive plaintext from encrypted comm…
    - 12 days ago Tuesday, December 9, 2014 -
  • Adobe Releases Security Updates for Flash, Reader, Acrobat, and ColdFusion
    Original release date: December 09, 2014Adobe has released security updates to address multiple vulnerabilities in Flash, Reader, Acrobat, and ColdFusion. Exploitation of these vulnerabilities may allow a remote attacker to take over an affected syst…
    - 12 days ago Tuesday, December 9, 2014 -
  • Microsoft Releases December 2014 Security Bulletin
    Original release date: December 09, 2014Microsoft has released updates to address vulnerabilities in Exchange, Windows, Internet Explorer, and Office as part of the Microsoft Security Bulletin Summary for December 2014. Some of these vulnerabilities…
    - 12 days ago Tuesday, December 9, 2014 -
  • ISC Releases Security Updates for BIND
    Original release date: December 08, 2014The Internet Systems Consortium (ISC) has released security updates to address multiple vulnerabilities in BIND, one of which may allow a remote attacker to cause a denial of service.Updates available include:B…
    - 13 days ago Monday, December 8, 2014 -
  • VMware Releases Security Updates for vCenter Server, vCenter Server Appliance, and ESXi
    Original release date: December 05, 2014VMware has released a security advisory to address multiple vulnerabilities in vCenter Server, vCenter Server Appliance, and ESXi. Exploitation of these vulnerabilities may allow a remote attacker to perform ma…
    - 16 days ago Friday, December 5, 2014 -
  • Дураки на экранах

    - Saturday, December 13, 2008 -
  • Казаки-разбойники

    - Wednesday, December 10, 2008 -
  • 22
    Привет.Сегодня 22.Сегодня госстат установил инфляцию на уровне почти 22%.Через 22 дня Новый Год!Конечно настроение не праздничное: кризис, р…
    - Monday, December 8, 2008 -
  • Маразм крепчал
    Привет.Государственный комитет статистики сообщил, что в октябре доходы населения сократились на 1% по сравнению с сентябрем до 77 627 млн.…
    - Friday, December 5, 2008 -
  • Защити себя сам
    Привет.Сокращения на многих промышленных предприятиях и массовое обналичивание всех вкладов привело к росту краж и грабежей.Наша добле…
    - Thursday, December 4, 2008 -
  • Спасите отечественного автопроизводителя
    Привет.Продолжаем наблюдать за кризисом. Очень интересно сравнивать действия в разных государствах.В нашей стране хотят ввести дополни…
    - Thursday, December 4, 2008 -
  • Шоу маст гоу вон
    Привет.Шоу под названием "антикризис в Украине" продолжается.Комментарии.net пишут, что министр финансов предлагает навязать всем банкам…
    - Wednesday, December 3, 2008 -
  • Вот такой у нас футбол
    Привет.Не запланированная заметка.Случайно зашел на Корреспондент.net:Вот такой у нас футбол: УЕЫИ на это все уже было 53 комментария.Посто…
    - Wednesday, December 3, 2008 -
  • Доллар гудбай...
    Привет.Наша страна (Украина) - оплот свободы и демократии.Сейчас многие говорят о конце доллара США - переход стран Северной Америки на ед…
    - Wednesday, December 3, 2008 -
  • Итоги ноября
    Привет.Давно я не проводил анализа входящего трафика. Сегодня подводим итоги ноября 2008 года. Общее число посещений 1038, посещено страниц -…
    - Tuesday, December 2, 2008 -
  • Пришла зима - пропала "зелень"
    Привет.В нашем "замечательном" государстве в течение последних нескольких лет национальная валюта была "жестко" привязана к национально…
    - Monday, December 1, 2008 -
  • А кто считает расходы на эксплуатацию?

    - Friday, November 28, 2008 -
  • Мой дом - моя крепость
    Привет.В нашем регионе кризис продолжает бушевать. Количество безработных (реальных) растет. Людей могут и не сокращать, но отправляют в…
    - Friday, November 28, 2008 -
  • И эти люди запрещают мне в носу ковыряться

    - Tuesday, November 25, 2008 -
  • Кризис не хотят замечать
    Привет.Кризис бушует. Предприятия сокращают свой штат. Многих отправляют в "бесплатные" отпуска. Многим задерживают зарплаты. Многим офи…
    - Monday, November 24, 2008 -