Israeli Hacking School Trains Cyber Warriors
HADERA – Three hooded hackers hunch over their computer screens in the control room at Israel’s new state-of-the-art “Cyber Gym”, where IT and infrastructure company employees train to defend against...
View ArticleGoogle Removes SMS App After Researcher Presents Details of Flash SMS...
Last week, at the DefCamp security conference, researcher Bogdan Alecu presented a way to reboot Google Nexus devices by sending class 0, or Flash SMS, messages. Shortly after, Google removed an app...
View ArticleMobile Website of Witchery Exposes Customer Information
Australian clothing brand Witchery, owned by Country Road, has been forced to take down its mobile websites after customers noticed that they could access other peoples information via the sites track...
View ArticleDo You Get Sleep-at-Night Security from Public Cloud?
The possibility of achieving security that is comparable between public cloud and private datacenters has been around for an IT lifetime (I use metric months; imperial years are for analysts). Amazon...
View ArticleENISA Publishes Guide for Mitigating Cyberattacks Against ICS
Over the past period, more and more experts have warned of the risks of cyberattacks aimed at Industrial Control Systems (ICS). Thats why the European Network and Information Security Agency (ENISA)...
View ArticleThree Men Behind GBL Bitcoin Scam Arrested by Chinese Authorities
Authorities in China have arrested three individuals suspected of being behind the online Bitcoin trading platform GBL. The operators of the service vanished in late October with their customers...
View ArticleWebsite of UK Council for Graduate Education Hacked, User Credentials Leaked
The website of the UK Council for Graduate Education (ukcge.ac.uk) has been hacked by a hacker that goes by the name of smitt3nz. The attacker not only defaced the website, but also leaked information...
View ArticleResearchers prove PC viruses can spread via microphones
Researchers have proven that it’s possible to transmit computer viruses via sound, confirming a controversial suspicion reported earlier this year that malware was mutating into strange, unexpected new...
View ArticleMalware Distributed via Fake Amazon Order Confirmation Emails
In late September, a new Amazon-themed spam campaign was launched by cybercriminals. The goal of the campaign is to distribute a piece of malware onto the computers of unsuspecting users. Now, experts...
View ArticleOver 30 Anonymous Twitter Accounts Suspended by Twitter
Twitter has suspended at least 30 accounts related to the Anonymous movement. The move appears to be in response to a campaign of misogynist abuse against feminist campaigners. One of the suspended...
View ArticleENISA Releases Guide for Defending Attacks on Industrial Control Systems
The European Network and Information Security Agency (ENISA), Europe’s cyber security agency, has released a new guide designed to help organizations better mitigate attacks against Industrial Control...
View ArticleMIT Surveillance Video That Led to Aaron Swartz Being Investigated Made Public
Former hacker Kevin Poulsen has filed a Freedom of Information Act lawsuit against the government in an effort to obtain the documents that the US Secret Service has on Aaron Swartz, the activist who...
View ArticleRBS Admits Decades of Underinvestment After Latest IT Glitch
LONDON – The head of Royal Bank of Scotland admitted on Tuesday that it had failed to invest in its IT systems “for decades”, after a glitch left customers of the state-rescued lender unable to access...
View ArticleGerman police arrest 2 in computer fraud probe, seize ill-gotten bitcoins...
German police say they have arrested two people and seized illegally generated bitcoins worth more than 700,000 euros in an investigation of computer fraud.
View ArticleExpert Launches “Have I Been Pwned?” Service
In case you’re concerned that your password might have been compromised in a cyberattack, you might want to give Have I Been Pwned? a try. The service, launched this week by security expert Troy Hunt,...
View ArticleInternational Payment Card Fraud Ring Based in Latvia Shut Down
Law enforcement agencies from various European countries, coordinated by Europols European Cybercrime Center (EC3), have dismantled a major international payment card fraud organization based in...
View ArticleGerman Police Arrest 2 People Suspected of Using Botnet to Generate Bitcoins
Germanys Federal Criminal Police Office (BKA) has announced the arrests of two individuals in Bavaria and Lower Saxony. Theyre suspected of operating a botnet that has helped them generate over 700,000...
View ArticleWhy Security Can’t Live Without Compliance
A risk-based Approach to Security Can Help Organizations Reduce Risk, Lower Costs, Improve Response Readiness, and Increase Risk-posture Visibility…
View ArticleAnonymous Threatens Moroccan Government Just Before Sentencing of Kissing Teens
On December 6, a Moroccan court will sentence the 14-year-old girl and the 15-year-old boy who took a picture of themselves kissing and posted it on Facebook. The two, along with the youth who took the...
View ArticleSweden Spied on Russian Leadership for US: Leaked NSA Files
STOCKHOLM – Sweden has provided the US with “unique” intelligence on Russia’s leadership, according to new documents leaked by US fugitive Edward Snowden and revealed Thursday by Swedish public...
View Article