• newSmart Nightlight Calls Your iPhone When Smoke, CO Alarms Start Wailing
    Leeo on Tuesday introduced the Smart Alert Nightlight, a $99 gadget that can detect when the alarm sounds from a smoke or carbon monoxide detector and send alerts to an iPhone. About the size and shape of a coaster, the Smart Alert Nightlight plugs…
    - 5 hours ago Wednesday, October 22, 2014 -
  • newThe Next-Gen TV Cable Dilemma
    Television manufacturers are moving toward ultra high definition -- also known as "4K" -- which offers four times the resolution of HD. It also offers greater depth of color and faster frame rate. That means more information must travel through the c…
    - 10 hours ago Wednesday, October 22, 2014 -
  • newGoogle Takes a Flyer on Magic Leap
    Magic Leap on Tuesday announced that Google was the lead investor in a $542 million round of funding for its secret endeavors. Also participating were Qualcomm, Legendary Entertainment, KKR, Vulcan Capital, Kleiner Perkins Caufield & Byers, Andreesse…
    - 1 day ago Tuesday, October 21, 2014 -
  • new$10K Will Get You a Clunky, Slow Hoverboard That's Nothing Like Marty McFly's
    The designers behind the Hendo Hoverboard on Tuesday took to the crowdfunding site Kickstarter to help launch a prototype and bring it to actual production. The funding period for this project will run from Tuesday through Dec. 15. The team has set a…
    - 1 day ago Tuesday, October 21, 2014 -
  • newChinese Officials Kick In Apple, MS Cloud Doors
    Chinese authorities have launched man-in-the-middle attacks on Apple's iCloud.com and Microsoft's Login.live.co that are ongoing, according to Greatfire.org. Qihoo 360 browser users' local connections to iCloud.com are being rerouted to a dummy site…
    - 1 day ago Tuesday, October 21, 2014 -
  • newKickstarter Puts Kibosh on Tor-Based Router Funding
    Kickstarter on Friday suspended a crowdfunding campaign for Anonabox, a portable networking device designed specifically to run Tor. The campaign for the privacy-minded router, which launched earlier last week, was wildly successful. In just a few da…
    - 1 day ago Tuesday, October 21, 2014 -
  • newBlack Box Keeps Cybersnoops in Dark
    Following Edward Snowden's revelations about indiscriminate government snooping on U.S. citizens, many Net surfers would like to find a way to lower their visibility on the Internet. There are a number of tools in cyberspace that can help a soul do t…
    - 2 days ago Tuesday, October 21, 2014 -
  • newFOSS and the Fear Factor
    In a world that's been dominated for far too long by the Systemd Inferno, Linux fans will have to be forgiven if they seize perhaps a bit too gleefully upon the scraps of cheerful news that come along on any given day. Of course, for cheerful news, t…
    - 2 days ago Monday, October 20, 2014 -
  • newFBI's Comey Argues Against Encryption: Trust Us
    FBI director James Comey, in a speech last week at the Brookings Institute, reiterated his concerns about encryption built into iOS 8 and Android stymieing law enforcement. "I'm a huge believer in the rule of law, but I also believe that no one in t…
    - 2 days ago Monday, October 20, 2014 -
  • newTablet Wars: The iPad Drifts Toward Mediocrity
    There have been a lot of interesting tablets launched over the last month, but Apple -- the primary driver in this market -- didn't launch one of them. Remember when the first and second iPads came out? They were magical, amazing devices. Fifty perce…
    - 2 days ago Monday, October 20, 2014 -
  • newMicrosoft PowerPoint Vulnerable to Zero-Day Attack
    It seems that there is no end to the Windows zero-days, as recently Microsoft patched three zero-day vulnerabilities in Windows which were actively exploited in the wild by hackers, and now a new Zero-day vulnerability has been disclosed affecting al…
    - 12 hours ago Wednesday, October 22, 2014 -
  • newGoogle Launches USB-Based "Security Key" To Strengthen 2-Step Verification
    Google is taking its users’ privacy very serious and making every possible effort for its users just to make them feel secure when they are online. Today, the tech giant has announced its enhanced two-step verification service that is based on…
    - 13 hours ago Wednesday, October 22, 2014 -
  • newGoogle Search Algorithm to Demote Piracy Sites In Search Results
    The Search Engine giant is not going to spare the Pirated content providing sites. Google is ready to fulfill its commitment to downgrade the search rankings of ‘notorious’ piracy sites globally that often rank above legal and commercial sites.…
    - 16 hours ago Wednesday, October 22, 2014 -
  • newMac OS X 10.10 Yosemite Sends User Location and Safari Search Data to Apple
    Apple's latest desktop operating system, known as Mac OS X 10.10 Yosemite, sends location and search data of users without their knowledge to Apple's remote servers by default whenever a user queries the desktop search tool Spotlight, which questions…
    - 2 days ago Tuesday, October 21, 2014 -
  • newChinese Government Executes MITM Attack against iCloud
    Apple iCloud users in China are not safe from the hackers — believed to be working for Chinese government — who are trying to wiretap Apple customers in the country. Great Fire, a reputed non-profit organization that monitors Internet censors…
    - 2 days ago Tuesday, October 21, 2014 -
  • 7 Things About Android Lollipop 5.0 You Need To Know
    After offering chocolate (Kit-Kat), now Google is ready to serve you Lollipops. Google on Wednesday finally revealed the official name of its next version Android L — Android 5.0 Lollipop. The newly released Android 5.0 Lollipop ships with the…
    - 4 days ago Saturday, October 18, 2014 -
  • Privacy Tools — Tor Browser 4.0 and Tails 1.2 Update Released
    Tor - Privacy oriented encrypted anonymizing service, has announced the launch of its next version of Tor Browser Bundle, Tor version 4.0, which disables SSL3 to prevent POODLE attack and uses new transports that are intended to defeat the Great Fire…
    - 5 days ago Saturday, October 18, 2014 -
  • Reflection DDoS Attacks Using Millions of UPnP Devices on the Rise
    After successful in launching reflection and amplification Distributed Denial-of-Service (DDoS) attacks by abusing various protocols such as DNS, NTP and SMTP, hackers are now abusing Simple Service Discovery Protocol (SSDP) – part of the UPnP prot…
    - 6 days ago Friday, October 17, 2014 -
  • Hacking Smart Electricity Meters To Cut Power Bills
    Smart devices are growing at an exponential pace with the increase in connecting devices embedded in cars, retail systems, refrigerators, televisions and countless other things people use in their everyday life, but security and privacy are the key i…
    - 6 days ago Friday, October 17, 2014 -
  • Facebook “Safety Check” Allows You to Connect with Family during Natural Disasters
    Facebook is moving a step ahead from others and making its social media service as an information sharing platform in serious situations as well. The social networking giant has announced a new tool, which lets users notify their family and friends t…
    - 7 days ago Thursday, October 16, 2014 -
  • Microsoft Patches 3 Zero-day Vulnerabilities actively being Exploited in the Wild
    As part of monthly patch update, Microsoft released eight security bulletins on Tuesday that address dozens of vulnerabilities including a zero-day flaw reportedly being exploited by Russian hackers to target NATO computers and a pair of zero-day Win…
    - 7 days ago Wednesday, October 15, 2014 -
  • POODLE SSL 3.0 Attack Exploits Widely-used Web Encryption Standard
    Another Heartbleed-like vulnerability has been discovered in the decade old but still widely used Secure Sockets Layer (SSL) 3.0 cryptographic protocol that could allow an attacker to decrypt contents of encrypted connections to websites. Google's S…
    - 8 days ago Wednesday, October 15, 2014 -
  • Nearly 7 Million Dropbox Account Passwords Allegedly Hacked
    Internet users have faced a number of major privacy breaches in last two months. Major in the list are The Fappening, The Snappening and now the latest privacy breach in Dropbox security has gained everybody’s attention across the world. Dropbo…
    - 8 days ago Tuesday, October 14, 2014 -
  • Microsoft Windows Zero-Day Vulnerability "CVE-2014-4114" Used to Hack NATO
    Once again a Russian cyber espionage group has gained media attention by exploiting a Zero-day vulnerability in Microsoft’s Windows operating system to spy on the North Atlantic Treaty Organization (NATO), Ukrainian and Polish government agencies,…
    - 9 days ago Tuesday, October 14, 2014 -
  • SEANux — Syrian Electronic Army To Release its Own Linux-based Distribution
    Lots of Linux distributions are offered free of cost on the Internet by a number of companies, non-commercial organizations and by many individuals as well, and now, the notorious Syrian Electronic Army (SEA) has announced their own Linux distributio…
    - 9 days ago Monday, October 13, 2014 -
  • Core Secrets — NSA Used ‘Undercover Agents’ In Foreign Companies
    Sometimes we wonder that how the National Security Agency (NSA) reached such a wide range of its Surveillance operation across the world – which you can measure from several secret documents released by the former NSA contractor Edward Snowden.…
    - 10 days ago Sunday, October 12, 2014 -
  • The Snappening — Snapchat Hacker Threatens to Leak thousands of Nude Images
    The waves of celebrities nude photos have not yet stopped completely, and a new privacy threat has emerged exposing tens of thousands of private photographs and videos of innocent users are circulating over the Internet.The personal image that ar…
    - 12 days ago Saturday, October 11, 2014 -
  • Authentication Flaw in PayPal mobile API Allows Access to Blocked Accounts
    Payment services provider PayPal is vulnerable to an authentication restriction bypass vulnerability, which could allow an attacker to bypass a filter or restriction of the online-service to get unauthorized access to a blocked users’ PayPal accoun…
    - 13 days ago Friday, October 10, 2014 -
  • iOS 8 'Date Trick' Loophole Allows Play Nintendo Games Using Emulators
    If you are a retro games lover and want to play it on your iPhone, a security loop in iOS 8 makes it possible for you to play classic SNES games on your iPhone, without the need to jailbreak your Apple devices.Since Apple doesn’t allow emulator…
    - 14 days ago Thursday, October 9, 2014 -
  • SQL Injection Vulnerability in 'Yahoo! Contributors Network'
    Yahoo! Contributors Network (contributor.yahoo.com), the network of authors that generated the contents such as photographs, videos, articles and their knowledge to more than 600 million monthly visitors, was vulnerable to a Time based Blind SQL Inje…
    - 14 days ago Thursday, October 9, 2014 -
  • "Pakistan People's Party" Website Hacked — Message for Bilawal Bhutto
    On Tuesday, Indian and Pakistani army forces continued to exchange fire along the Line of Control (LoC) in Jammu and Kashmir, which was started when Pakistan’s military fired machine guns and mortars at about 60 Indian army posts during last week.…
    - 15 days ago Wednesday, October 8, 2014 -
  • Tyupkin Malware Hacking ATM Machines Worldwide
    Money is always a perfect motivation for cyber criminals who tries different tricks to solely target users with card skimmers that steal debit card numbers, but now the criminals are using specialized malware that targets ATM (Automated Teller Machin…
    - 15 days ago Wednesday, October 8, 2014 -
  • The Fappening 4 — More Celebrity Nude Photos Leaked Online
    Week passed, and here comes the fourth wave of celebrity nude photos leak, revealing its first male victim. As part of the Fappening 4, 24-year-old Nick Hogan, the son of ex-wrestler Hulk Hogan has become the first male celebrity to fall victim to th…
    - 16 days ago Tuesday, October 7, 2014 -
  • Zero-Day in Bugzilla Exposes Zero-Day Vulnerabilities to Hackers
    A critical zero-day vulnerability discovered in Mozilla’s popular Bugzilla bug-tracking software used by hundreds of prominent software organizations, both private and open-source, could expose sensitive information and vulnerabilities of the softw…
    - 16 days ago Tuesday, October 7, 2014 -
  • Over 17000 Mac Machines Affected by 'iWorm' Botnet Malware
    A newly discovered zombie network that exclusively targets Apple computers running Mac OS X across the globe has compromised roughly 17,000 machines so far, giving hackers backdoor access to infected computers, researchers at Russian antivirus firm D…
    - 16 days ago Monday, October 6, 2014 -
  • newTractor beam breaks distance record
    Scientists have turned a laser into a reversible "tractor beam" that can repel or attract objects.
    - 1 day ago Tuesday, October 21, 2014 -
  • newStudents build Oculus Moon robot
    US team develop a robot that can send back live pictures from the Moon as part of attempt to win Google's Lunar X-Prize.
    - 1 day ago Tuesday, October 21, 2014 -
  • newAudi claims self-drive speed record
    Audi says one of its self-drive test cars topped 149mph (240km/h) at a race track in Germany, beating a human-driven version.
    - 1 day ago Tuesday, October 21, 2014 -
  • newUK spy drones to fly over Syria
    The UK will fly unmanned drones over Syria in the battle against Islamic State militants, the government says.
    - 1 day ago Tuesday, October 21, 2014 -
  • newStaples investigating hack attack
    Staples becomes latest US retailer to investigate data thefts, leading the US government to call for a swift move to chip-and-pin.
    - 2 days ago Tuesday, October 21, 2014 -
  • newChina denies backing iCloud hack
    The Chinese government has denied reports that it was involved in an attempt to steal user data from iCloud accounts.
    - 2 days ago Tuesday, October 21, 2014 -
  • newVIDEO: New smart glasses 'look to rival Google'
    BBC Click's Marc Cieslak looks at the smart glasses on show at the annual Ceatec electronics exhibition in Japan.
    - 2 days ago Tuesday, October 21, 2014 -
  • newVIDEO: Man guilty of fake-girl webcam sex
    An Australian man is convicted of performing a sex act in front of a webcam "watched by" a computer-generated child he believed was real.
    - 2 days ago Tuesday, October 21, 2014 -
  • newMan guilty of fake-girl webcam sex
    An Australian man is convicted of performing a sex act in front of a webcam "watched by" a computer-generated child he believed was real.
    - 2 days ago Monday, October 20, 2014 -
  • newWill we podcast in virtual reality?
    Will virtual reality take podcasting into a new era?
    - 2 days ago Monday, October 20, 2014 -
  • newConnecting India's offline millions
    Mark Zuckerberg wants to bring the internet to the country's masses
    - 2 days ago Monday, October 20, 2014 -
  • newPeers back revenge porn 'offence'
    The House of Lords agrees unanimously to make "revenge porn" a criminal offence in England and Wales.
    - 2 days ago Monday, October 20, 2014 -
  • newApple's iPhone sales boost earnings
    Apple reports fourth-quarter earnings of $8.47bn (£5.24bn), beating analysts' expectations, helped by sales of its new iPhone models.
    - 2 days ago Monday, October 20, 2014 -
  • newSome paedophiles 'won't be charged'
    Some of the UK's estimated 50,000 paedophiles with images of child abuse will escape prosecution, the head of the National Crime Agency says.
    - 2 days ago Monday, October 20, 2014 -
  • newVIDEO: Bringing internet to India's poorest
    More than a billion Indians don't use the internet - and addressing that was the focus of a summit in Delhi where Facebook's Mark Zuckerberg was the star attraction.
    - 2 days ago Monday, October 20, 2014 -
  • newIBM pays $1.5bn to offload chip unit
    IBM is paying $1.5bn to offload its loss-making chip manufacturing division to Abu Dhabi owned GlobalFoundries as it announces a 17% profits fall.
    - 2 days ago Monday, October 20, 2014 -
  • newGoogle changes 'to fight piracy'
    Google announces changes to its search engine in an attempt to curb online piracy.
    - 2 days ago Monday, October 20, 2014 -
  • newAnonymising router project shut down
    A plan to raise cash to make a router that hides what people do online has been suspended after questions were raised about the project.
    - 3 days ago Monday, October 20, 2014 -
  • newVIDEO: Big league for gamers in Seoul
    Tens of thousands of fans turn out to watch competitors play each other at the League of Legends World Championship in Seoul, South Korea.
    - 3 days ago Monday, October 20, 2014 -
  • VIDEO: Take a look at the Dr Who video game
    The BBC has produced a computer game called 'The Doctor and the Dalek', as part of the Make it Digital initiative to get more young people into computer coding.
    - 3 days ago Sunday, October 19, 2014 -
  • VIDEO: Will thumbprint tech mean end of PIN?
    Credit and debit cards with thumb print sensors built in could one day do away with the need to use codes, PINs and passwords.
    - 5 days ago Friday, October 17, 2014 -
  • Minecraft city built in two years
    A student from Delaware has spent two years constructing Titan City from 4.5 million Minecraft building blocks.
    - 5 days ago Friday, October 17, 2014 -
  • VIDEO: Tech review: This week's headlines
    A French bank allows its customers to pay people via tweets, plus other technology news
    - 6 days ago Friday, October 17, 2014 -
  • VIDEO: Playing music with your brain
    Could technology turn you into a musical virtuoso? LJ Rich looks at new ways to make music.
    - 27 days ago Friday, September 26, 2014 -
  • VIDEO: App helps you wake up with a stranger
    The app that turns a global network of strangers into your alarm clock, with a dating twist.
    - 31 days ago Monday, September 22, 2014 -
  • newPaul Kleinschnitz: The Cybersecurity Prescription For Small And Growing Businesses
    Just as diet and exercise, regular doctor visits and health insurance are critical elements of a holistic plan to keep your body healthy, there are important steps that small business owners can take to vaccinate their business against infection, str…
    - 1 day ago Tuesday, October 21, 2014 -
  • newEdward Guiliano, Ph.D.: Hey, Corporate Director!
    The campaign to stop cyber-crime begins with educating the next wave of professionals, but ongoing education and idea exchange are the ultimate keys to confronting cybercrime on the ground and in the boardroom. Read more: Cybersecurity,…
    - 3 days ago Monday, October 20, 2014 -
  • Jeff Fox: The Big Password Mistake That Hackers Are Hoping You'll Make
    Can you tell how strong a password is? Read more: Passwords, Hackers, Hacking, Hacker, Data Breaches, Icloud, Cybersecurity, Security, Technology News
    - 7 days ago Thursday, October 16, 2014 -
  • FBI Issues Alert Of Sophisticated Hacking Plot By China
    The FBI on Wednesday issued a private warning to industry that a group of highly skilled Chinese government hackers were in the midst of a long-runnin... Read more: Cyber Security, China Hackers, Hackers, Cybersecurity, Politics News…
    - 7 days ago Wednesday, October 15, 2014 -
  • Chuck Gomez: The Hacker Wars Hits NYC
    Are hackers always the bad guys? Not according to a fascinating new documentary, The Hacker Wars by Vivien Lesnik Weisman, a critically-acclaimed filmmaker. Read more: Hackers, Hactivists, Weev, Andrew Weev Auernheimer, Jeremy Hammond An…
    - 8 days ago Wednesday, October 15, 2014 -
  • Rebecca Abrahams: Hacking Back and the Cyber Balance of Power
    The Washington Post front page article on October 10 "Hacked Firms Quietly Talk about Fighting Fire with Fire" about growing corporate anger over successive cyber attacks has a new message: go on the offensive. Hack back! They are not alone.…
    - 8 days ago Tuesday, October 14, 2014 -
  • Andre Bourque: Does Apple's iCloud Have a Worm in It?
    The celebrity photo fiasco is only the most high-profile in a series of reasons that companies should consider more comprehensive and secure file storage and sharing options than iCloud. Read more: Iphone, Cybersecurity, Icloud, Apple Ip…
    - 8 days ago Tuesday, October 14, 2014 -
  • Change Your Dropbox Password Right Now
    Dropbox users, it may be time to update your passwords and enable two-factor authentication. A hacker claims to have stolen some 7 million usernames a... Read more: Dropbox, Dropbox Hack, Dropbox Password, Dropbox Passwords Compromised,…
    - 9 days ago Monday, October 13, 2014 -
  • Robert Siciliano: The King Of Credit Card Fraud
    Gonzalez became a paid informant for the agency's office in Miami. Gonzalez's work was so impressive that he spoke at seminars and conferences, delighting in shaking hands with the head of the Secret Service. But this sly devil of deception had trick…
    - 9 days ago Monday, October 13, 2014 -
  • JPMorgan CEO Asks For Help With Data Breaches
    JPMorgan Chase CEO Jamie Dimon offered a grave warning on Friday about future cyberattacks.Making his first public statement about the enormous da... Read more: JPMorgan Chase, Jamie Dimon JPMorgan Chase, Jamie Dimon, Jpmorgan Data Brea…
    - 11 days ago Saturday, October 11, 2014 -
  • Chase Bank Refuses To Admit How Many People Were Actually Hacked
    JPMorgan Chase is refusing to say how many individuals had their personal information stolen by hackers in the recent massive security breach. But tha... Read more: JP Morgan, JP Morgan Chase, JP Morgan Breach, Hackers, Phishing, JPMorga…
    - 16 days ago Monday, October 6, 2014 -
  • James Comey Compares Chinese Hackers To A 'Drunk Burglar'
    WASHINGTON (AP) — FBI Director James Comey compared Chinese hackers to a "drunk burglar" who steals with reckless abandon, even as they cost the U.S... Read more: Ap, James Comey Chinese Hackers, James Comey, Chinese Hackers, Hackers,…
    - 17 days ago Sunday, October 5, 2014 -
  • Larry Magid: Why Cybersecurity Is Patriotic and Humanistic
    I'd like to add National Cyber Security Awareness Month to the 4th of July, Memorial Day and Veterans Day as yet another patriotic holiday. That's because protecting your own devices and accounts is more than patriotic, it's downright humanistic.…
    - 17 days ago Sunday, October 5, 2014 -
  • Andrew Wang: 7 Things to Do Right Now Because Your Personal Data Is Under Attack
    It is the growth in our online shopping habits and preference to use plastic over cash that have increased our vulnerability to identity theft. Read more: Cybersecurity, Email, Identity Theft, Money, Money News, Passwords, Personal Finan…
    - 19 days ago Friday, October 3, 2014 -
  • If You Use Chase Bank, Watch Out For Email Scams Right Now
    After disclosing that an attack on its computer system compromised the accounts of more than half of all U.S. households, the nation's biggest bank is... Read more: JPMorgan Breach, Jpmorgan Hack, Hackers, Phishing Attacks, Business New…
    - 19 days ago Friday, October 3, 2014 -
  • Joe Ross: Payments 101: Consumer Tips for Safe Shopping
    Last year's Target breach has cost the company more than $148 million dollars. Just last month, Home Depot announced another major breach. There are a few simple things that consumers can do to get started and protect their purchases from these type…
    - 20 days ago Friday, October 3, 2014 -
  • JPMorgan Says Data Breach Hit 76 Million Households
    A cyber attack at America's biggest bank this summer affected more than half of all U.S. households -- far, far more than previously estimated, and th... Read more: Jpmorgan, JPMorgan Chase, Jpmorgan Hack, Jpmorgan Data Breach, Hackers,…
    - 20 days ago Thursday, October 2, 2014 -
  • CreditSesame.com: Infection Point: What Shellshock Tells Us About the State of Consumer Insecurity
    Nothing's secure. Believe in that mantra and you have at least a decent chance of avoiding becoming the next victim of a data breach, PoS attack, drive-by download or any one of the other many cyber threats that stalk us all daily. Read…
    - 20 days ago Thursday, October 2, 2014 -
  • The Most Dangerous Celebrity On The Web Is...
    LOS ANGELES (AP) — If you're about to Google Jimmy Kimmel, beware.Computer security company McAfee says the talk show host is the most dangerous c... Read more: Dangerous Celebrity, Dangerous Celebrities, Jimmy Kimmel, Mcafee, Ciara,…
    - 22 days ago Tuesday, September 30, 2014 -
  • Robert Siciliano: USB Drives Have Serious Security Flaws
    That little thing that you stick in your computer to store or transfer data can also mean very bad news. Read more: Recycling, Identity Theft, Technology, Hacking, Privacy, Identity Protection, Hackers, Technology News
    - 22 days ago Tuesday, September 30, 2014 -
  • Elizabeth Ann Thompson: 10 Things I Learned From Visiting the Facebook Campus
    I visited the Facebook campus, 1 Hacker Way, Menlo Park, California. and here are 10 things I learned:1. There is such a thing as a free lunch (bre... Read more: Facebook, Campus, Hacker Square, Hackers, Meno Park, Palo Alto, Technolo…
    - 22 days ago Tuesday, September 30, 2014 -
  • Guy Cimbalo: Sexism in Tech, and What One NYU Student Is Doing About It
    The Tumblr blog Hackers of NY launched in February this year and very quickly became a phenomenon, spawning spin off sites everywhere from Miami to Bangalore -- there's now a "Hackers of..." in nine countries and 13 cities. Read more: Te…
    - 22 days ago Tuesday, September 30, 2014 -
  • Eric Holder: New Encryption Systems 'Thwarting' Child Porn, Kidnapping Investigations
    WASHINGTON -- Attorney General Eric Holder plans to slam technology companies Tuesday for launching new encryption systems that will lock out law enfo... Read more: Eric Holder, Fbi, Doj, Justice Department, Department of Justice, James…
    - 22 days ago Tuesday, September 30, 2014 -
  • Brian E. Finch: Watch Your (Supply) Tail
    In a report, the Senate detailed how various contractors for the U.S. military's Transportation Command (TRANSCOM) had been the subject of repeated and serious cyber intrusions in a period spanning 2012 through 2013. Read more: Cybersecu…
    - 23 days ago Tuesday, September 30, 2014 -
  • How To Protect Yourself From Domain Thieves
    Most of us are aware that hackers can steal our financial information. But few people realize that hackers can also go after other valuable property o... Read more: Godaddy, Domain Name Protection, Two Step Authentication, Website Protec…
    - 23 days ago Tuesday, September 30, 2014 -
  • Luring The Elusive Cyber Security Pro
    Struggling to find scarce IT security talent? Make sure your hiring managers understand the certifications and match candidates for skills fit -- not just credentials.
    - Monday, April 14, 2014 -
  • Amazon Plans 3D Phone: Report
    Amazon phone capable of displaying images in three dimensions could ship this fall.
    - Saturday, April 12, 2014 -
  • Google Glass Goes Public
    Google Glass Explorer Program will be open to US-based adults on tax day.
    - Saturday, April 12, 2014 -
  • Facebook Changes: What To Expect
    Facebook cracks down on spammy posts, tweaks privacy options, and revamps messaging. Here's what it means to you.
    - Saturday, April 12, 2014 -
  • Hacker Weev Free After Appeal
    Andrew "Weev" Auernheimer, who embarrassed AT&T by exposing a security flaw, had his conviction overturned by federal appeals court.
    - Friday, April 11, 2014 -
  • Rogue IT Driven By Need For Speed
    We've lost control to business users before. But this time, the thing that initiated our pain (the cloud) may also be the cure.
    - Friday, April 11, 2014 -
  • 5 Ways Android Won Me Over
    From security to "Lego" programming, Android has more going for it than you might think.
    - Friday, April 11, 2014 -
  • 5 Job Interview Tips Via Alice In Wonderland
    Curiouser and curiouser! Use these techniques during your next interview to win that IT or security job offer.
    - Thursday, April 10, 2014 -
  • Google Glass For Parkinson's: 10 Findings
    Google Glass offers more health benefits than awkwardness, Parkinson's patients in UK study find.
    - Thursday, April 10, 2014 -
  • Hackathons Should Be More Than A Circus
    Tapping into developer talent at a hackathon should be fun, but don't lose sight of the potential business benefits.
    - Thursday, April 10, 2014 -
  • 5 reasons why hackers own your organization
    Last week I noted that most companies are either already hacked or could easily be hacked -- and, when they have anything worth stealing, are probably already owned by multiple APT (advanced persistent threat) groups.
    - 37 days ago Tuesday, September 16, 2014 -
  • How network virtualization is used as a security tool
    When people think of network virtualization, the advantages that come to mind typically include faster provisioning of networks, easier management of networks and more efficient use of resources. But network virtualization can have another major bene…
    - 37 days ago Monday, September 15, 2014 -
  • Sprint, Windstream traffic routing errors hijacked other ISPs
    Internet traffic routing errors made by U.S. operators Sprint and Windstream on the same day last week underscore a long-known Internet weakness, posing both security and reliability issues. Both of the errors involved Border Gateway Protocol (BGP),…
    - 38 days ago Monday, September 15, 2014 -
  • Data protection authorities find privacy lapses in majority of mobile apps
    Many mobile apps request too many permissions and don't explain how they collect users' personal information, a study of 1,211 popular apps by the Global Privacy Enforcement Network has found. The majority of the apps reviewed did not adequately expl…
    - 40 days ago Friday, September 12, 2014 -
  • Yahoo says it faced $250,000 daily fines for defying U.S. surveillance requests
    The U.S. government once threatened to fine Yahoo $250,000 a day if it failed to assist with its surveillance efforts, Yahoo said Thursday. Yahoo said it was threatened with the fines after it challenged surveillance powers granted to the U.S. govern…
    - 41 days ago Friday, September 12, 2014 -
  • How Google's tiff with certificate authorities can impact you
    Miffed certificate authorities are calling on Google to give websites more time to upgrade the security used in browser-to-server communications before displaying warnings in Chrome. The CAs are upset over Google's roughly six-month timetable for rat…
    - 41 days ago Thursday, September 11, 2014 -
  • Enemies no more, McAfee and Symantec agree to share threat data
    The recently launched Cyber Threat Alliance has been given a big boost with the news that Intel's McAfee division and former arch-enemy Symantec are to join the industry group whose mission is to create the first significant cross-vendor movement of…
    - 42 days ago Thursday, September 11, 2014 -
  • 3 security practices IoT will disrupt
    I made it back from DEFCON with both my phone and tablet intact, but I'm happy I didn't bring a light bulb. You see, if had brought a light bulb, and that light bulb was a smart LED bulb running Linux, it might be running someone else's software by n…
    - 42 days ago Thursday, September 11, 2014 -
  • Five million Gmail addresses and passwords dumped online
    An archive containing nearly 5 million Gmail addresses and plain text passwords was posted Tuesday on an online forum, but the data is old and likely sourced from multiple data breaches according to one security firm. A user with the online alias "tv…
    - 42 days ago Wednesday, September 10, 2014 -
  • Internet Explorer steals the Patch Tuesday spotlight again
    It's hard to imagine that we are already three-fourths of the way through 2014 -- at least as measured by Microsoft Patch Tuesdays. Today, Microsoft released four new security bulletins, but only one of them is Critical. Guess which one?
    - 42 days ago Wednesday, September 10, 2014 -
  • Cloud security: We're asking the wrong questions
    In the wake of the celebrity photo breach, the media is humming with stories disparaging the safety of the cloud.
    - 43 days ago Wednesday, September 10, 2014 -
  • Adobe fixes critical flaws in Flash Player, delays Reader and Acrobat updates
    Adobe Systems released a critical security update for Flash Player that fixes 12 security vulnerabilities, but pushed back its planned patches for Reader and Acrobat by a week. The Flash Player updates, available for Windows, Mac, and Linux, address…
    - 43 days ago Tuesday, September 9, 2014 -
  • Comcast's open Wi-Fi hotspots inject ads into your browser
    Comcast is giving users a very good reason to demand an HTTPS connection on every site they visit. The Internet service provider has started injecting ads for its services on websites where you wouldn't normally see them when you're using an Xfinity…
    - 43 days ago Tuesday, September 9, 2014 -
  • Salesforce.com warns customers of malware attack
    Salesforce.com users are being targeted by a new version of a computer Trojan that has typically attacked online banking customers until now. The malware threat is called Dyre or Dyreza and came to light in June. Like most online banking Trojans, it…
    - 43 days ago Tuesday, September 9, 2014 -
  • What you need to know about the Home Depot data breach
    On Monday, Home Depot issued a public confirmation to reports that they had experienced a data breach impacting debit and credit cards. They're the world's largest home improvement retailer, operating 2,266 stores in the U.S., as well as 10 Canadian…
    - 43 days ago Tuesday, September 9, 2014 -
  • Tech industry groups ask U.S. Senate to 'swiftly pass' NSA curbs
    Tech industry organizations have written a letter to leaders in the U.S. Senate, to ask them to swiftly pass the USA Freedom Act, legislation that is expected to end the collection of bulk domestic phone data by the National Security Agency.
    - 44 days ago Tuesday, September 9, 2014 -
  • Home Depot confirms breach of its payment systems
    Home Depot said Monday that its payment systems had been breached, potentially affecting any customers who shopped at its stores in the United States and Canada since April. There's no evidence yet that debit card PIN numbers had been compromised, th…
    - 44 days ago Monday, September 8, 2014 -
  • IBM secures SoftLayer with Intel trusted modules
    Fortifying its SoftLayer cloud services for enterprise use, IBM has started using Intel's chip-based Trusted Execution Technology to help organizations in highly regulated industries meet their auditing and security compliance requirements. On Monday…
    - 45 days ago Monday, September 8, 2014 -
  • Adobe slates critical Reader security update for Tuesday
    Adobe yesterday said it would issue security updates next week for its PDF viewer Reader as well as for Acrobat, its PDF creator, to fix critical flaws in the software on Windows and Apple's OS X. But it won't be updating Flash Player, its ultra-popu…
    - 47 days ago Friday, September 5, 2014 -
  • Apple CEO says iCloud security will be strengthened
    Apple, still reeling from the nude celebrity photo incident, plans to soon strengthen security around its iCloud storage service, according to CEO Tim Cook in a news report Thursday.
    - 48 days ago Friday, September 5, 2014 -
  • newUSB is now UEC (use with extreme caution)
    USB is an acronym for Universal Serial Bus; at least that is what it has stood for since 1999 when it was patented. But now it may take on a new meaning and instead stand for Ultimate Security Breakdown. Most computer users have learned to protect…
    - 1 day ago Tuesday, October 21, 2014 -
  • newStaples confirms data breach investigation
    Monday evening, investigative journalist Brian Krebs reported that multiple banking sources were seeing a pattern of credit and debit card fraud. The common thread between each case were purchases made at Staples Inc. stores in the Northeastern U.S.T…
    - 2 days ago Monday, October 20, 2014 -
  • newObama signs Executive Order to bolster federal credit card security
    On Friday, at the headquarters of the Consumer Financial Protection Bureau, President Obama signed an Executive Order that will add chip-and-PIN protections (EMV) to federal credit cards starting in January. The President encouraged the financial an…
    - 3 days ago Monday, October 20, 2014 -
  • Dreaded SSLv3 bug no monster, only a POODLE
    On Tuesday, Google's Bodo Möller, along with fellow researchers Thai Duong and Krzysztof Kotowicz, disclosed the existence of a vulnerability in SSLv3, which allows the plaintext of secure connections to be calculated by an attacker on the network.W…
    - 8 days ago Tuesday, October 14, 2014 -
  • What you should consider when choosing a password manager
    Many security experts feel that passwords are no longer sufficient to keep online accounts safe from hackers, but we're still a long way from widespread adoption of biometrics and alternative methods of authentication.Most of us are stuck with using…
    - 9 days ago Monday, October 13, 2014 -
  • Hong Kong democracy activist websites compromised
    Four websites promoting democracy in Hong Kong have been rigged to deliver malicious software, according to a Washington, D.C.-based security company.The findings show that "dissenting groups, especially those seeking increased levels of freedom, f…
    - 9 days ago Monday, October 13, 2014 -
  • Kmart discloses malware related data breach
    On the same day that Dairy Queen announced their own malware-based data breach, Kmart (owned by Sears Holdings Corp.) reported the discovery that credit and debit cards were compromised after criminals installed malware on their payment systems.Acc…
    - 12 days ago Friday, October 10, 2014 -
  • Analysts react to Symantec split announcement
    On Thursday, Symantec said that it would separate into two business units; one that focuses entirely on security, while the other sticks to information management.Symantec's announcement follows similar ones from Hewlett-Packard, which said they woul…
    - 13 days ago Friday, October 10, 2014 -
  • Dairy Queen confirms Backoff malware led to data breach
    On Thursday, the Minneapolis-based Dairy Queen confirmed a data breach that impacts 395 stores. The fast food chain says that the source of the breach itself is the same family of POS malware that gained attention earlier this summer after an adviso…
    - 13 days ago Friday, October 10, 2014 -
  • Russian faces more charges in point-of-sale hacking case
    A Russian man accused of hacking point-of-sale systems in the U.S. is facing additional charges following a revised indictment returned by a grand jury on Thursday, the U.S. Department of Justice said.Roman Valeryevich Seleznev was arrested at an air…
    - 13 days ago Thursday, October 9, 2014 -
  • What to do in the aftermath of the JPMorgan breach
    The compromise of 10s of millions of JPMorgan Chase accounts poses the greatest risk of phishing attacks on consumers and small businesses, experts say.JPMorgan, the nation's largest bank, disclosed Thursday in a Securities and Exchange Commission fi…
    - 19 days ago Friday, October 3, 2014 -
  • JPMorgan says breach impacted 76M households and 7M small businesses
    On Thursday, JPMorgan Chase (JPMC) updated investors about their recently disclosed data breach in an 8-K filing with the Securities and Exchange Commission. The update comes hours after the financial giant disputed reports from the New York Times t…
    - 20 days ago Thursday, October 2, 2014 -
  • Shellshock attackers targeting NAS devices
    Researchers have discovered hackers trying to exploit the Shellshock Bash vulnerability to compromise network attached storage devices in universities in the U.S., Japan and Korea.The attackers were taking advantage of a publicly disclosed security w…
    - 21 days ago Wednesday, October 1, 2014 -
  • Threat Intelligence firm mistakes research for nation-state attack
    [Updates to this story appear on page two.]On Tuesday, Bloomberg published a story based on honeypot scans, which was a follow-up to a previously published piece that explored the nature of attacks against industrial-control systems.Bloomberg's stori…
    - 21 days ago Wednesday, October 1, 2014 -
  • 5 horror movies that scare security pros
    Image by DreamworksHere are five iconic movies whose plot lines might be adapted to strike fear into the heart of today's tech professionals. The horror movie genre has given us some great classics through the years, but for IT managers the real nig…
    - 22 days ago Wednesday, October 1, 2014 -
  • Malware program targets Hong Kong protesters using Apple devices
    A malware program that targets Hong Kong activists using Apple devices has trademarks of being developed by a nation-state, possibly China, according to a security company.Lacoon Mobile Security of San Francisco wrote on its blog on Tuesday that th…
    - 22 days ago Wednesday, October 1, 2014 -
  • Apple publishes patch for Shellshock vulnerability
    On Monday, Apple released three patches to address vulnerabilities in GNU Bash, commonly known as Shellshock, that if exploited could allow an attacker to execute commands on the targeted host.When Shellshock was disclosed, the primary concern was th…
    - 23 days ago Monday, September 29, 2014 -
  • Six key defenses against Shellshock attacks
    The number of attempts by hackers to compromise computers through the Shellshock vulnerability is rising, but companies have options for defending against attackers.Shellshock is the name given to a set of at least six vulnerabilities in GNU Bash, th…
    - 23 days ago Monday, September 29, 2014 -
  • IDG Contributor Network: Number 2 on my top 10 list for security executives: Reform
    Toon Pool I recently kicked off a new series of blogs based on the top 10 threats, trends and business priorities for security executives. On September 15, I published my first blog on the subject: History's Lessons.  This second blog will look i…
    - 23 days ago Monday, September 29, 2014 -
  • Two scenarios that would make OS X vulnerable to the Shellshock bug
    Apple's OS X is vulnerable to the Shellshock bug, but it's not that easy for attackers to take advantage of it, according to Intego, which specializes in security software for the operating system.Shellshock is the nickname for a flaw in the Bourne…
    - 24 days ago Sunday, September 28, 2014 -
  • newEdward who? GCHQ boss dodges Snowden topic during last speech
    UK spies would rather 'walk' than do 'mass surveillance' Sir Iain Lobban's final speech as GCHQ director omitted any mention of that man Edward Snowden, and unlike recent speeches by FBI and law enforcement officials on both side of the Atlantic, the…
    - 1 day ago Tuesday, October 21, 2014 -
  • newHacked and ashamed? C'mon, Brits – report that cybercrime
    Gov.uk campaign: Consumer security led to '£670m losses' Internet-enabled frauds reached £670m across the UK in the 12 months running up to the end of August, according to new figures from the National Fraud Intelligence Bureau.…
    - 2 days ago Tuesday, October 21, 2014 -
  • newCarders punch holes through Staples
    Investigation launched into East Coast stores US office giant Staples is investigating a possible credit and debit card breach of its Northeastern stores.…
    - 2 days ago Tuesday, October 21, 2014 -
  • newPalo Alto Networks boxes spray firewall creds across the net
    Crummy configurations to blame, Moore hardening offered as remedy Misconfigured user identities for Palo Alto Networks firewalls are leaking onto the public web potentially exposing customer services including VPN and webmail, says security luminary…
    - 2 days ago Tuesday, October 21, 2014 -
  • newQuantum key security steps outside the box
    'Device independent' proof a step closer ... if you obey the laws of physics US researchers have come a step closer to turning quantum key distribution (QKD) into a “black box” that can be made provably secure regardless of whose boxes sit at eac…
    - 2 days ago Tuesday, October 21, 2014 -
  • newCisco battles POODLE with a listicle and some twaddle
    Borg lists products on which SSL 3.0 vuln has lifted leg, promises fixes Cisco has joined the growing list of vendors scrambling a response to the POODLE vulnerability, with a number of systems confirmed vulnerable and more under investigation.…
    - 2 days ago Monday, October 20, 2014 -
  • newChina is ALREADY spying on Apple iCloud users, claims watchdog
    Attack harvests users' info at iPhone 6 launch Last week Apple CEO Tim Cook was very happy that the iPhone 6 is at last going on sale in China. But it seems the Chinese government has its own plans for owners of the new device.…
    - 2 days ago Monday, October 20, 2014 -
  • newFYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
    It's on by default – didn't you read the small print? There has been growing disquiet over Apple's desktop search app Spotlight, which sends queries for things back to the company's servers to process.…
    - 2 days ago Monday, October 20, 2014 -
  • newSophos to offshore American support operations
    Blame Canada? Exclusive  Sophos plans to offshore support operations from the US to Canada and the Philippines as part of a wide-ranging restructuring of its support operations.…
    - 3 days ago Monday, October 20, 2014 -
  • newTwitter 'news' spreads faster than Ebola #FakeCures #Malware
    Security watchers warn to brace for scams Social media has become a conduit for the spread of fake cures and treatments for Ebola. As if that weren't bad enough, confusion about the epidemic is also being harnessed to push malware and other cybercrim…
    - 3 days ago Monday, October 20, 2014 -
  • newVisual voicemail hack makes your messages a snack
    Rate limiter patch is a fun MEELLION-user DoS banhammer Ruxcon  Sydney penetration tester Shubham 'Shubs' Shah has urged US and European researchers to probe their telco's voicemail security after he found accounts held by local telcos Vodafone and…
    - 3 days ago Monday, October 20, 2014 -
  • newMicrosoft pulls <i>another</i> dodgy patch
    Redmond makes a hash of hashing add-on Another Patch Update Tuesday, another red face for Microsoft, which has again been forced to pull a patch to prevent nasty side-effects.…
    - 3 days ago Monday, October 20, 2014 -
  • new'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
    15 months home detention leaves egg on feds' faces as they grab for more power The man that Australia's Federal Police once described as "a self-proclaimed leader of the group ‘Lulz Security’ (Lulzsec)" has been sentenced to 15 months of home det…
    - 3 days ago Monday, October 20, 2014 -
  • newOz privacy comish says breaches could double this year
    Åustralian outfits have already 'fessed up to sixty breaches since March 2014 The office of Australia's Federal Privacy Commissioner has received 60 voluntary data breach notifications in the six months since 12 March compared to 71 received in the…
    - 3 days ago Monday, October 20, 2014 -
  • newFIRST standards to clean up messy CERTs

    - 3 days ago Sunday, October 19, 2014 -
  • Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
    Zuck's ad empire DOESN'T see details in plain text. Phew! Facebook's security bods routinely trawl public "paste" sites for email addresses and passwords stolen from its users, as part of an effort to outfox wrongdoers trying to hack into personal da…
    - 4 days ago Saturday, October 18, 2014 -
  • Apple releases MEGA security patch round for OS X, Server and iTunes
    Brings POODLE to heel While the world+dog was distracted by all the shiny new iThings Tim Cook was showing off on Thursday, Apple quietly puMPED out patches for 150 CVE-issued bugs in its server and desktop operating systems and the iTunes media play…
    - 5 days ago Friday, October 17, 2014 -
  • US government fines Intel's Wind River over crypto exports
    New emphasis on encryption as a weapon? The US Government has imposed a $750,000 fine on an Intel subsidiary for exporting encryption to China, Russia, Israel and other countries…
    - 5 days ago Friday, October 17, 2014 -
  • UK's a very popular target for EMEA cyberspies – report
    Germany and Saudi Arabia fill out FireEye cyberpwn podium Malware attacks, especially in Europe, nearly doubled in the first half of 2014, according to a new report.…
    - 6 days ago Friday, October 17, 2014 -
  • Facebook doubles ad-hacking bounty
    Small security snafus snuffed, try the tiny and technical Facebook has doubled the cash it will pay out to folks who report holes in its advertising code.…
    - 6 days ago Friday, October 17, 2014 -
  • Australian spookhaus busted for warrantless tap of own phones
    Stop laughing: it also messed up civilian telecoms intercepts and is about to get more powers Australia's Inspector-General of Intelligence and Security (AIGIS) has found that the nation's Australian Security and Intelligence Agency (ASIO) spied on i…
    - 6 days ago Thursday, October 16, 2014 -
  • Careless Whisper? Anonymous messaging app accused of stalking users, blabbing to Feds
    Startup denies outing peeps posting witty gags The makers of Whisper have denied claims that the anonymous messaging app is secretly tracking the whereabouts of its privacy-conscious users.…
    - 6 days ago Thursday, October 16, 2014 -
  • FBI boss: We don't want a backdoor, we want the front door to phones
    Claims it's what the Founding Fathers would have wanted – catching killers and pedos FBI director James Comey is continuing his charm offensive against phone encryption – by urging tech giants to do more to help the agency monitor people.…
    - 6 days ago Thursday, October 16, 2014 -
  • Bad news, fandroids: He who controls the IPC tool, controls the DROID
    Researchers discover Binder blinder A security flaw in a core message-passing mechanism leaves every Android device potentially vulnerable to attack, security researchers warned on Thursday.…
    - 6 days ago Thursday, October 16, 2014 -
  • Hacker-hunters finger 'Keyser Soze' of Russian underground card sales
    Report claims user named 'Rescator' is mastermind A hacker based in Odessa, Ukraine has become the main provider of data stolen from compromised credit cards, a new study claims.…
    - 6 days ago Thursday, October 16, 2014 -
  • Drupal SQL injection nasty leaves sites 'wide open' to attack
    Usual drill - install the patch tout de suite A newly patched SQL injection flaw in Drupal leaves sites that rely on the widely used web development platform wide open to attack.…
    - 7 days ago Thursday, October 16, 2014 -
  • Securobods RAGE over $600k Kickstarter Tor box components
    Devs insist: It's NOT just an off-the-shelf circuit board Updated  The developer behind Tor privacy router Anonabox has defended the product — which has so far attracted $600,000 in crowd funding — following allegations it was little more than a…
    - 7 days ago Thursday, October 16, 2014 -
  • FinFisher spyware used to snoop on Bahraini activists, police told
    Gamma International on the end of UK criminal complaint Allegations that three Bahraini activists resident in Britain were spied on by Bahraini authorities using British spyware have led to a criminal complaint.…
    - 7 days ago Thursday, October 16, 2014 -
  • Man bites dog: HTTPS-menacing POODLE is 'hard to exploit' – unless you're on public Wi-Fi
    Avoid sketchy pub wireless, warn infosec bods Analysis  Mozilla will ditch support for the insecure SSL 3.0 from Firefox next month, following the discovery of a design flaw in the protocol that allows hackers to hijack victims' online accounts.…
    - 7 days ago Thursday, October 16, 2014 -
  • Adobe CSO offers Oracle security lesson: Go click-to-play
    Pots and kettles in heated argument at Oz security confab Oracle could have saved mountains of cash and bad press if Click-to-Play was enabled before Java was hosed by an armada of zero day vulnerabilities, Adobe security boss Brad Arkin says.…
    - 7 days ago Thursday, October 16, 2014 -
  • Vulnerable utilities, telcos, top of new Aussie natsec centre's to-do list
    Headcount to tip 150 tomorrow, double by year's end The Australian Cyber Security Centre (ACSC) will increase its headcount from 90 to 150 as soon as possible, then grow to full capacity of 300 seats by year's end.…
    - 7 days ago Wednesday, October 15, 2014 -
  • Admins! Never mind POODLE, there're NEW OpenSSL bugs to splat
    Four new patches for open-source crypto libraries Poodle  If you're using the popular OpenSSL open source cryptography library, you have more to worry about than the recently disclosed POODLE (Padding Oracle On Downgraded Legacy Encryption) vulnerab…
    - 7 days ago Wednesday, October 15, 2014 -
  • Twitter, Cloudflare kill SSL 3.0 ... and here's how YOU CAN TOO
    Flawed HTTPS protocol axed amid attack fears Poodle  Websites and web browser makers are moving quickly to ditch the outdated SSL 3.0 encryption protocol for HTTPS following the discovering of a worrying design flaw.…
    - 7 days ago Wednesday, October 15, 2014 -
  • FireEye, Microsoft, Cisco team up to take down RAT-flinging crew
    Tired of living in the, er, Shadow of Moudoor Security vendors have teamed up to fight a prolific cyber-espionage group thought to be based in China.…
    - 7 days ago Wednesday, October 15, 2014 -
  • Roll your own Bitcoin client? Prepare to be raided
    Attackers exploit borked random numbers The engineer behind the Heartbleed checker has created a tool to hunt down wallets from poorly secured transactions that leak private keys.…
    - 7 days ago Wednesday, October 15, 2014 -
  • Forget passwords, let's use SELFIES, says Obama's cyber tsar
    Michael Daniel wants to kill passwords dead US cyber security tsar Michael Daniel wants passwords to die in a fire and be replaced by other mechanisms, including selfies.…
    - 8 days ago Wednesday, October 15, 2014 -
  • Done with Microsoft and Adobe patches? Good, here's Oracle's load
    Java, Database, Fusion Middleware among recipients in latest update deluge Oracle is piling on this month's Patch Tuesday with a collection of security fixes for 16 of its enterprise software platforms.…
    - 8 days ago Tuesday, October 14, 2014 -
  • Kill off SSL 3.0 NOW: HTTPS savaged by vicious POODLE
    Pull it out ASAP, it is SWISS CHEESE Poodle  As warned by The Register, researchers have discovered a security vulnerability in SSL 3.0 that allows attackers to decrypt encrypted website connections.…
    - 8 days ago Tuesday, October 14, 2014 -
  • It's 2014 and you can still own a Windows box using a Word file or font
    And Adobe's software is still riddled with holes. Get the updates – now Patch Tuesday  Microsoft has today patched two dozen CVE-classified security vulnerabilities in its software. People are urged to install them as soon as possible.…
    - 8 days ago Tuesday, October 14, 2014 -
  • South Korea faces $1bn bill after hackers raid national ID database
    Father of Asian internet warns all is lost The South Korean government is considering a complete overhaul of its national identity number computer system – after hackers comprehensively ransacked it and now hold the ID codes for as much as 80 per c…
    - 8 days ago Tuesday, October 14, 2014 -
  • Parental Controls For YouTube
    Kids seem to be glued to YouTube these days. As a parent, it can be daunting to try and police the content that they watch. What's a parent to do?In our featured article: YouTube Parental Controls...Read Full Post
    - Saturday, May 31, 2014 -
  • Craigslist Safety and Security Tips
    Craigslist can be both a fun and scary place. You never know what you'll find for sale, and you often don't know who is on the other end of that sale until you complete the deal....Read Full Post
    - Saturday, May 31, 2014 -
  • 5 Tips to Help You Land an IT Security Job
    IT security jobs are still in high demand, especially given the fact that cyber crime seems to be a constant fixture in the news with data breaches becoming an almost daily occurrence....Read Full Post
    - Saturday, May 31, 2014 -
  • How to Avoid Becoming a Victim of the iPhone Lock Ransom Scam
    There is a new scam sweeping through Australia and other parts of the world this week. Victims are having their iPhones locked remotely by hackers who apparently compromised their iCloud account credentials. The victims are then being issued ransom d…
    - Saturday, May 31, 2014 -
  • Are Your Employees Leaking Sensitive Company Information on Facebook?
    Like it or not, Facebook is here to stay. Some companies allow employees to use Facebook at work and some strictly prohibit it. If your company allows it then you might want to continue reading....Read Full Post
    - Thursday, May 29, 2014 -
  • Rev up Your Security with a 10-minute PC Security Tune-up
    Securing your PC doesn't have to take hours and hours of your time. There are a lot of things you can do in just a few minutes to help improve your security posture....Read Full Post
    - Thursday, May 29, 2014 -
  • How to Prevent Your Web Browser From Being Hijacked
    Did you just try to Google something but instead of going to Google, your browser took you to some strange search engine you've never heard of?You might have just become a victim of browser hijacking. In this week's featured article: How to Prevent…
    - Wednesday, May 28, 2014 -
  • Are Your Clicks Getting Jacked?
    Have you ever been clickjacked? While it may sound like some kind of pro wrestling move, I assure you it is not.Clickjacking is a security threat that users all over the world are experiencing. How can you stay safe from clickjacking? Check out our…
    - Wednesday, April 30, 2014 -
  • Is Your Google+ Account Secure?
    Google+ seems to be slowly gaining some traction. It's probably not quite the big Facebook contender that Google had hoped it would be, but it is gaining steamJust like Facebook, Google+ has privacy and security settings that you should configure t…
    - Wednesday, April 30, 2014 -
  • If Your PC Was Just Hacked, Read This:
    You've just discovered that your PC has been hacked. You could run away and go hide in a corner, or you can take action and do something about it.If you opt for taking action, then you need to check out our article: I've Been Hacked! Now What? We'l…
    - Wednesday, April 30, 2014 -
  • newStaples Probing Possible Customer Data Hack
    WASHINGTON - US office supplies chain Staples said Tuesday it is investigating the possible theft of customer credit card files, a day after a security website reported the likely data breach. read more
    - 1 day ago Tuesday, October 21, 2014 -
  • newApple Fixes Security Flaws With Release of iOS 8.1
    Apple released on Monday a new version of its mobile operating system and, in addition to some interesting new features, the latest version includes fixes for several security issues.read more
    - 1 day ago Tuesday, October 21, 2014 -
  • newZscaler Adds New Capabilities to Cloud Security Platform
    Zscaler today announced the availability of a new version of the its cloud-based Internet security platform, which now provides protection against advanced persistent threats (APT).read more
    - 1 day ago Tuesday, October 21, 2014 -
  • newBAE to Acquire SilverSky to Boost Cybersecurity Business
    BAE Systems has entered into a definitive agreement to acquire Perimeter Internetworking Corp., which trades as SilverSky, for $232.5 million. read more
    - 1 day ago Tuesday, October 21, 2014 -
  • newCyber Maturity: An Evolution Toward Enterprise and System Architectures Emphasizing Embedded Security
    Imagine, for a moment, that an engineer in a government acquisitions program office is given the responsibility for designing the next generation of cruisers for the US Navy. Specifications for the hull, the machinery, the weapons, the navigation sy…
    - 1 day ago Tuesday, October 21, 2014 -
  • newChina Launches MitM Attack on iCloud, Hotmail Users
    The Chinese government has started launching cyberattacks against Apple customers just as the company announced the availability of the latest iPhone in the country, an anti-censorship organization reported on Monday.read more
    - 1 day ago Tuesday, October 21, 2014 -
  • newCisco Products Vulnerable to POODLE Attacks
    Cisco has been analyzing its products to determine which of them are affected by the recently disclosed Secure Sockets Layer (SSL) version 3 protocol flaw dubbed Padding Oracle On Downgraded Legacy Encryption (POODLE).read more
    - 2 days ago Tuesday, October 21, 2014 -
  • newFacebook Doubles Rewards For Vulnerabilities in Ads Code
    In an effort to ensure that its advertising system is not plagued by any security bugs, Facebook has decided to double the amount of money it awards to researchers who identify vulnerabilities in the social media network's ads code.read more…
    - 2 days ago Monday, October 20, 2014 -
  • newFinancial Industry Group Publishes Recommendations to Guide Development of Cybersecurity Regulations
     The Securities Industry and Financial Markets Association [SIFMA] is proposing the formation of a working group of government agenies to review cybersecurity guidance and regulations related to the financial industry. read more
    - 2 days ago Monday, October 20, 2014 -
  • newPHP 5 Updates Fix Several Security Vulnerabilities
    PHP released last week versions 5.6.2, 5.5.18 and 5.4.34 of the scripting language. In addition to some functionality bugs, the latest releases address a series of security-related flaws.According to the PHP development team, a total of four vulnera…
    - 2 days ago Monday, October 20, 2014 -
  • newApple Updates OS X to Protect Users Against POODLE Attacks
    Security updates released by Apple last week address a series of vulnerabilities, including the recently uncovered SSL 3.0 flaw (CVE-2014-3566) that can be leveraged to obtain potentially sensitive information from encrypted communications.read more…
    - 2 days ago Monday, October 20, 2014 -
  • newSandworm Team Targeted SCADA Systems: Trend Micro
    Researchers at Trend Micro say the Sandworm team may have their eyes set on compromising SCADA-based systems. read more
    - 2 days ago Monday, October 20, 2014 -
  • Researchers Hide Android Applications in Image Files
    AMSTERDAM - BLACK HAT EUROPE - Researchers have found a way to trick Android users into executing potentially malicious applications by hiding them inside innocent-looking image files.read more
    - 5 days ago Friday, October 17, 2014 -
  • Last Chance to Register for the 2014 ICS Cyber Security Conference
    read more
    - 5 days ago Friday, October 17, 2014 -
  • FBI Renews Call for Wider Wiretap Powers
    WASHINGTON - FBI chief James Comey renewed a call Thursday for broader authority to tap into emerging technologies, saying the Edward Snowden revelations have led to unwarranted mistrust of law enforcement. read more
    - 5 days ago Friday, October 17, 2014 -
  • DTM Component Vulnerabilities Expose Critical Control Systems to Cyberattacks
    AMSTERDAM - BLACK HAT EUROPE - Researchers have found that the components of a specification designed to ease the management of industrial control systems (ICS) contains serious vulnerabilities. read more
    - 6 days ago Friday, October 17, 2014 -
  • Black Hat Europe: Hijacking Clicks With Same Origin Method Execution
    AMSTERDAM - BLACK HAT EUROPE - A researcher has discovered a new attack method that could potentially impact many of the world's largest websites. One site confirmed by the researcher as being vulnerable was Google+, which was just patched just a cou…
    - 6 days ago Thursday, October 16, 2014 -
  • Attackers Abuse UPnP Devices in DDoS Attacks, Akamai Warns
    Researchers at Akamai Technologies have issued a warning about a spate of distributed denial-of-service attacks being launched via Universal Plug and Play (UPnP) devices. read more
    - 7 days ago Thursday, October 16, 2014 -
  • Cost of Cyber Attacks Jumps for US Firms: Study
    WASHINGTON - Cybercrime costs are escalating for US companies and attacks are becoming more complicated to resolve, a study showed Wednesday. A survey of 59 US firms by the Ponemon Institute with Hewlett-Packard found the average annual cost of res…
    - 7 days ago Wednesday, October 15, 2014 -
  • Drupal Patches 'Highly Critical' SQL Injection Vulnerability
    A critical SQL injection bug has been patched in Drupal, and users are being advised to upgrade as soon as possible. The vulnerability exists in all Drupal core 7.x versions up to the just-released 7.32 version, which fixes the issue.read more…
    - 7 days ago Wednesday, October 15, 2014 -
  • newSeattleland: - Kidnapped' Russian Hacker Facing New Charges
    Traveling with his partner and her daughter, the muscular, lightly bearded Russian computer whiz was winding up a vacation trip to the island nation that bills itself as "the sunny side of life," and was hoping to catch a noon jet to Moscow. Instead,…
    - 13 hours ago Wednesday, October 22, 2014 -
  • newU.S. government probes medical devices for possibl...
    The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment that officials fear could be exploited by hackers, a senior official at the agency told Reuters…
    - 17 hours ago Wednesday, October 22, 2014 -
  • newNew York financial regulator pushes banks to plug ...
    Following the massive cyber attack on the biggest U.S. bank JPMorgan Chase & Co disclosed in August, and other financial institutions, government authorities in United States are pushing financial institutions and brokerage houses to close glaring ga…
    - 17 hours ago Wednesday, October 22, 2014 -
  • newMore than 500M financial records stolen by hackers
    Office supply chain Staples disclosed Tuesday that its customers' personal data may be compromised. Staples is the latest in a growing list of hacked companies.
    - 20 hours ago Tuesday, October 21, 2014 -
  • newWhite Hat Hackers Fight For Legal Reform
    Security researchers petition to update digital intellectual property and copyright protection laws that limit their work in finding and revealing security bugs. Billy Rios has discovered major security holes in TSA passenger-screening equipment at U…
    - 1 day ago Tuesday, October 21, 2014 -
  • newApple's China ICloud Attacked by State Hackers, Greatfire Says
    Apple Inc.'s iCloud service in China was attacked by government-backed hackers, according to Greatfire.org, which monitors Internet censorship in the country. A man-in-the-middle attack, where hackers position themselves between users and computer se…
    - 1 day ago Tuesday, October 21, 2014 -
  • newCyber Attack Downs Mozambique's @Verdade News Site on Election Day
    See all those languages up there? We translate Global Voices stories to make the world's citizen media available to everyone. @Verdade , a Mozambican weekly newspaper and Global Voices partner, was the victim of a massive cyber attack on Oct. 15, 201…
    - 1 day ago Tuesday, October 21, 2014 -
  • newData protection damages have to be proven
    Data protection breaches do not entitle per se to claim damages that damages have to be proven by the plaintiff according to the Italian Supreme Court. The Italian Supreme Court, the Corte di Cassazione, held that an unlawful treatment of personal da…
    - 2 days ago Tuesday, October 21, 2014 -
  • newU.S. national security prosecutors shift focus from spies to cyber
    The U.S. Justice Department is restructuring its national security prosecution team to deal with cyber attacks and the threat of sensitive technology ending up in the wrong hands, as American business and government agencies face more intrusions. The…
    - 2 days ago Tuesday, October 21, 2014 -
  • newSuspected Chinese government hackers behind new iCloud account attack
    Suspected hackers working for the Chinese government are believed to be behind a new series of attacks aimed at the accounts of iCloud users in that country. The attacks on the iCloud service began on Monday, security experts quoted in The Guardian s…
    - 2 days ago Monday, October 20, 2014 -
  • newAn ATM is shown at a Wells Fargo bank in Atlanta. Hackers
    Bank robbers are increasingly likely to be computer hackers who don't have to enter a bank to invade it, a top FBI official warned financial services companies. Officials warn 500 million financial records hacked Bank robbers are increasingly likely…
    - 2 days ago Monday, October 20, 2014 -
  • newJennifer Lawrence blasts Perez Hilton for posting nude photos
    Actress Jennifer Lawrence has slammed celebrity blogger Perez Hilton for posting hacked nude photos of her online, insisting he only removed the pictures from his website after fans expressed their anger. "The Hunger Games" star was among dozens of f…
    - 2 days ago Monday, October 20, 2014 -
  • newMedical Information More Valuable to Hackers Than Credit Card Numbers
    In light of the recently reported large healthcare data breaches that have resulted in the potential theft of the personal information of millions of patients, the FBI warned healthcare providers yet again of the dangers of cyber attacks. Healthcare…
    - 2 days ago Monday, October 20, 2014 -
  • newEuropean online transactions under cyber attack
    European merchants need to pay more attention to securing electronic payments, warns the Payment Card Industry Security Standards Council . This was one of the key messages at the recent Annual European Community Meeting in Berlin, Germany of the PCI…
    - 2 days ago Monday, October 20, 2014 -
  • newModel blackmailed over private pictures helped police sting to capture celeb iCloud hacker
    Madison Louch was told that if she did not pay up, nude photos of her would be leaked for the world to see A model who had her Apple iCloud account hacked was told to pay up or have nude photos of her leaked on the internet. Earlier that day Miss Lou…
    - 2 days ago Monday, October 20, 2014 -
  • newKnown NFC spoofing techniques probably wouldn't work with Apple Pay
    Apple Pay is poised to turn how we pay for goods at a retail store on its head. The new Apple Pay system lets you make purchases with the cards in your iTunes Store account.
    - 2 days ago Monday, October 20, 2014 -
  • newUVU plans new cyber security certification
    Professors at Utah Valley University say hackers and cyber scams are changing every day, and it's time to fight back. So, they're gearing up to offer a new certification in cyber security.
    - 3 days ago Monday, October 20, 2014 -
  • newMicrosoft Releases Advisory for Unpatched Windows Vulnerability
    Original release date: October 22, 2014Microsoft has released a security advisory to provide recommended mitigations for an unpatched vulnerability, (CVE-2014-6352) which affects all Microsoft Windows releases except Windows Server 2003. This vulnera…
    - 11 hours ago Wednesday, October 22, 2014 -
  • newApple Releases Security Updates for iOS and Apple TV
    Original release date: October 20, 2014Apple has released security updates for iOS devices and Apple TV to address multiple vulnerabilities, one of which could allow an attacker to decrypt data protected by SSL.Updates available include:iOS 8.1 for i…
    - 2 days ago Monday, October 20, 2014 -
  • OpenSSL 3.0 Protocol Vulnerability
    Original release date: October 17, 2014US-CERT is aware of a design vulnerability found in the way SSL 3.0 handles block cipher mode padding. Exploitation of this vulnerability may allow a remote attacker to decrypt and extract information from insid…
    - 5 days ago Friday, October 17, 2014 -
  • Apple Releases Security Update 2014-005
    Original release date: October 17, 2014Apple has released Security Update 2014-005 to address vulnerabilities in SSL 3.0.US-CERT recommends users and administrators review Apple Security Update HT6531 for additional details.This product is provi…
    - 5 days ago Friday, October 17, 2014 -
  • Drupal Releases Security Advisory
    Original release date: October 17, 2014Drupal has released a security advisory to address an application program interface (API) vulnerability (CVE-2014-3704) that could allow an attacker to execute arbitrary SQL commands on an affected system.This v…
    - 5 days ago Friday, October 17, 2014 -
  • Google Releases Security Updates for Chrome and Chrome OS
    Original release date: October 16, 2014Google has released security updates to address multiple vulnerabilities in Chrome and Chrome OS, one of which could potentially allow an attacker to take control of the affected system.Updates available include…
    - 6 days ago Thursday, October 16, 2014 -
  • Ebola Phishing Scams and Malware Campaigns
    Original release date: October 16, 2014US-CERT reminds users to protect against email scams and cyber campaigns using the Ebola virus disease (EVD) as a theme. Phishing emails may contain links that direct users to websites which collect personal inf…
    - 6 days ago Thursday, October 16, 2014 -
  • OpenSSL Patches Four Vulnerabilities
    Original release date: October 16, 2014OpenSSL has released updates patching four vulnerabilities, some of which may allow an attacker to cause a Denial of Service (DoS) condition or execute man-in-the-middle attacks. The following updates are availa…
    - 6 days ago Thursday, October 16, 2014 -
  • Mozilla Releases Security Updates for Firefox and Thunderbird
    Original release date: October 15, 2014The Mozilla Foundation has released security updates to address multiple vulnerabilities in Firefox and Thunderbird. Exploitation of these vulnerabilities may allow an attacker to obtain sensitive information, b…
    - 8 days ago Wednesday, October 15, 2014 -
  • Adobe Releases Security Updates for ColdFusion and Flash Player
    Original release date: October 14, 2014Adobe has released security updates to address multiple vulnerabilities in ColdFusion and Flash Player. Exploitation could allow attackers to take control of a vulnerable system.Users and administrators are enco…
    - 8 days ago Tuesday, October 14, 2014 -
  • Дураки на экранах

    - Saturday, December 13, 2008 -
  • Казаки-разбойники

    - Wednesday, December 10, 2008 -
  • 22
    Привет.Сегодня 22.Сегодня госстат установил инфляцию на уровне почти 22%.Через 22 дня Новый Год!Конечно настроение не праздничное: кризис, р…
    - Monday, December 8, 2008 -
  • Маразм крепчал
    Привет.Государственный комитет статистики сообщил, что в октябре доходы населения сократились на 1% по сравнению с сентябрем до 77 627 млн.…
    - Friday, December 5, 2008 -
  • Защити себя сам
    Привет.Сокращения на многих промышленных предприятиях и массовое обналичивание всех вкладов привело к росту краж и грабежей.Наша добле…
    - Thursday, December 4, 2008 -
  • Спасите отечественного автопроизводителя
    Привет.Продолжаем наблюдать за кризисом. Очень интересно сравнивать действия в разных государствах.В нашей стране хотят ввести дополни…
    - Thursday, December 4, 2008 -
  • Шоу маст гоу вон
    Привет.Шоу под названием "антикризис в Украине" продолжается.Комментарии.net пишут, что министр финансов предлагает навязать всем банкам…
    - Wednesday, December 3, 2008 -
  • Вот такой у нас футбол
    Привет.Не запланированная заметка.Случайно зашел на Корреспондент.net:Вот такой у нас футбол: УЕЫИ на это все уже было 53 комментария.Посто…
    - Wednesday, December 3, 2008 -
  • Доллар гудбай...
    Привет.Наша страна (Украина) - оплот свободы и демократии.Сейчас многие говорят о конце доллара США - переход стран Северной Америки на ед…
    - Wednesday, December 3, 2008 -
  • Итоги ноября
    Привет.Давно я не проводил анализа входящего трафика. Сегодня подводим итоги ноября 2008 года. Общее число посещений 1038, посещено страниц -…
    - Tuesday, December 2, 2008 -
  • Пришла зима - пропала "зелень"
    Привет.В нашем "замечательном" государстве в течение последних нескольких лет национальная валюта была "жестко" привязана к национально…
    - Monday, December 1, 2008 -
  • А кто считает расходы на эксплуатацию?

    - Friday, November 28, 2008 -
  • Мой дом - моя крепость
    Привет.В нашем регионе кризис продолжает бушевать. Количество безработных (реальных) растет. Людей могут и не сокращать, но отправляют в…
    - Friday, November 28, 2008 -
  • И эти люди запрещают мне в носу ковыряться

    - Tuesday, November 25, 2008 -
  • Кризис не хотят замечать
    Привет.Кризис бушует. Предприятия сокращают свой штат. Многих отправляют в "бесплатные" отпуска. Многим задерживают зарплаты. Многим офи…
    - Monday, November 24, 2008 -