Stunning model Joy Corrigan’s anger at nude pics being hacked before Jennifer...
Before Jennifer Lawrence’s nude pics were hacked, model Joy says her private photographs were stolen despite her raising concerns with Apple Glamour model Joy Corrigan has hit out at Apple after she...
View ArticleTreasury risk manager leaps from Microsoft Access to Azure cloud
New Zealand Treasury’s Debt Management Office is a risk-management agency, but for years it relied on a risky IT environment.
View Article6 Ways to Protect your Internet of Things from Hackers – community blog from...
Everything seems like it is connected to the Internet, just about, including TVs, home thermostats, sprinkler controls, door locks, egg trays , tooth brushes , and more. A study by HP shows that 70...
View ArticleMicrosoft and Yahoo spar with U.S. government [Government IT News]
The big online and tech companies suffer from an interesting conflict: the government is both customer and the one carrying the biggest stick in the privacy battle. Unless there’s a major policy...
View ArticleFive Eyes Treasure Map surveys German telco networks: report
Documents released by former NSA contractor Edward Snowden have revealed that a global internet mapping program dubbed Treasure Map has been spying on German telcos’ networks, despite US government...
View ArticleWikiLeaks names NSW Police as FinFisher malware customer
The NSW Police and Singapore’s PCS Security Pte Ltd have been named as buyers of FinFischer malware, along with the intelligence arms of the Hungarian, Italian, and Bosnian governments.
View ArticleHere’s What Hackers Can Do With Your CRM Data
It is obvious, if not pathetic, why hackers break into the cloud to find and publish private nude photos of celebrities. CRM data may not seem to be the low hanging fruit of, say, a nationwide sweep of...
View ArticleLiberty Reserve CTO Pleads Guilty to Money Laundering Charges
The former chief technology officer of one of the world’s most popular digital currency services has pleaded guilty to money laundering charges in federal court.
View ArticleWill Technology Replace Security Analysts?
Recently, at a round table discussion, I heard someone make the statement, “In five years, there will be no more security analysts. They will be replaced by technology.” This is not the first time I...
View ArticleWikiLeaks Names Customers of Controversial Surveillance Software
WikiLeaks today released new information on FinFisher, and a list of countries that have acquired licenses for the controversial suite of IT surveillance software.
View ArticleFocus of Endpoint Breaches Will Shift to Mobile Devices by 2017: Gartner
At the Gartner Security and Risk Management Summit taking place in the United Arab Emirates, the IT research and advisory firm’s analysts are discussing the latest mobile security trends and threats.
View ArticleGoogle: Global government data demands up 150 percent in five years
Demands for user data requests have more than doubled in five years, with the U.S. government leading pack in the global intelligence gathering race.
View ArticleDocs: Obama Admin Knew HealthCare.gov Was Vulnerable To Malicioius Attacks...
Top Obama administration officials knew just how vulnerable HealthCare.gov was to malicious security breaches when it launched, leaving data at risk to hackers that have already breached the website at...
View ArticleHacker exploits printer Web interface to install, run Doom
Doom on a printer’s menu screen! Personally, we can’t wait until someone makes Descent playable on a toaster. On Friday, a hacker presenting at the 44CON Information Security Conference in London...
View ArticleGoogle Transparency Report Shows Jump in Data Requests
Demands for Google users’ data have shot up 150 percent worldwide since 2009, according to the latest edition of Google’s Transparency report. According to Google, there has been a 250 percent increase...
View ArticleNSA Plans To Map Entire Internet
The National Security Agency is hacking into corporate servers and attacking global ISPs as part of its effort to map off the entire Internet according to a report Sunday in Der Spiegel, a German...
View ArticleInternet-enabled objects add to security risks
The Internet of Things will create additional security risks for businesses and consumers, according to network security experts at the APNIC 38 conference in Brisbane. Eric Vyncke, an engineer with...
View ArticleApple updates OS X Mavericks, Safari and other products
In addition to Mavericks 10.9.5, the company released updates for earlier OS X versions, multiple new versions of Safari, and patches for Xcode, OS X Server and Apple TV.
View ArticleOWASP Releases New Testing Guide
The Open Web Application Security Project (OWASP) announced on Wednesday the availability of version 4 of the OWASP Testing Guide.
View ArticleHacker claims to have infiltrated
Last week, a hacker with the Twitter tag @anonymousglobo posted links to what is allegedly the user names and passwords to the database of the town of Chester government website, as well as websites...
View Article