Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

United States : Community Health Systems – Cyber attack compromises…

The firm and its forensic expert, computer network was attacked in April and June, 2014.

View Article


SymantecVoice: Backoff Trojan Is Back: Protect Your Business From The Next...

At Symantec, we help keep the world’s information and systems protected and available so individuals, businesses, and nations can achieve their goals.

View Article


Rapper suspected of Foley beheading

A SNAKE came back from the dead to deliver a deadly bite to a chef, twenty minutes after he had chopped its head off.

View Article

Malware that hit Target puts more than 1,000 businesses at risk

Remember the massive data breach Target suffered late last year, where hackers compromised the credit card data of over 40 million Target customers and cost the retail giant millions of dollars? Well,...

View Article

Twin Cities Businesses Train to Stay Ahead of Next Data Breach

The security of home and work computers is important in this day and age when hackers could be lurking on the other side.

View Article


4.5 million patient names, birth dates, social security numbers stolen in...

In the latest breach of privacy and Internet security, a cyber attack originating in China hacked into the computers of Community Health Systems Inc., one of the largest U.S. hospital groups, resulting...

View Article

Exoskeletons, security breaches, and erasing your past [Government IT Week]

It might not be a big news week, but it’s an interesting one. Should you be able to erase your past and what happens if you erase someone else’s as well? A US security contractor wasn’t that secure...

View Article

Dotcom denies he’s behind the Whale Oil hacking

Internet Party founder Kim Dotcom says his comments yesterday about hacking the German Prime Minister’s credit rating had nothing to do with the hacking of the Whale Oil blog.

View Article


6 Strange Body Hacks That Are Actually Useful

The human body has the potential for amazing feats, but it also has built-in limitations – we can’t hear certain tones, we see a limited range of colors, and we can’t feel magnetic and electrical...

View Article


DDoS Attack Disrupts Sony Online Entertainment and PSN Services

A group of hackers deployed a distributed denial-of-service (DDoS) attack on Sunday on Sony services, partially disrupting access to its networks for plenty of gamers. John Smedley, President of Sony...

View Article

263.35 Gbps of Traffic Aimed at One Sony Server During DDoS Attack

A distributed denial-of-service (DDoS) attack hit Sony servers on Sunday, and the hacker claiming responsibility for it says that one server was crippled by 263.35 Gbps of junk traffic. News brokethat...

View Article

Japans Sony hit by cyber attack bomb threat

Japanese entertainment giant Sony said Monday its online music and gaming sites came under a cyber attack by a hacker group that also claimed there were explosives on a plane carrying a senior company...

View Article

United States Targeted by Cyber Attacks Originating from China, the US,...

Based on information collected from honeypots deployed in public cloud infrastructures across the globe, a company observed that most of the machines frequently targeting the US are located in China,...

View Article


Info on 25,000 DHS Employees Exposed in Breach of Contractor Systems [Reuters]

The cyber attack on the systems of the US Investigation Services (USIS), a company running background checks for employees of the US Department of Homeland Security (DHS), exposed details of 25,000 US...

View Article

Namecheap Says Accounts Accessed With Credentials Stolen by Russian Hackers

Domain registrar and Web hosting company Namecheap is warning customers that cybercriminals have been trying to access their accounts by using credentials obtained from third party websites.

View Article


Website of Industrial Software Firm Abused for Reconnaissance Mission

Cybercriminals have compromised the website of an industrial company to conduct a watering hole attack with the goal to collect information on the site’s visitors, according to a report.

View Article

Exploit a flaw or go to war? NATO’s cyber battle rules raise more questions...

The world’s largest military alliance is getting serious about digital attacks, but the reality is much more complicated than the policy suggests.

View Article


The Era of Personalized Risk Reduction

Blanket approaches to cyber security don’t work. So many vendors rely on throwing generic signature after signature, and alert after alert without any action. These legacy solutions are stuck in the...

View Article

Free Tool Fights Advanced Evasion Techniques

AETs are designed to evade next generation firewalls. A free tool can help security admins identify potential weaknesses in firewalls.

View Article

Most Enterprises Can’t Detect or Deter Insider Threats

In a recent survey, 61 percent of IT professionals said they can’t deter or respond to insider attacks.

View Article
Browsing all 2490 articles
Browse latest View live