US accuses China of hacking into defense contract firms
Chinese hackers believed to be linked to Beijing conducted dozens of cyberattacks on US defense contractors between 2012 and 2013, potentially compromising military operations, a congressional probe...
View ArticleCyber attack may affect area physicians’ patients
Patients who received services from Marion Physician Services LLC, affiliated with Community Health Systems Professional Services Corporation, have been notified of an external cyber attack. Christi...
View ArticleRetailers’ Customers Cautioned As Cyber Attacks Continue
Home Depot says some 56 million card holders were possibly compromised in a cyber attack. It says there’s no evidence that debit PIN numbers were comprised or that the breach effected online shoppers.
View ArticleCybercriminals Abuse New TLDs in Phishing, Malware Attacks
The recent expansion of generic Top-Level Domains (gTLDs) has attracted the attention of cybercriminals who have started abusing them for their malicious operations, researchers warned this week.
View ArticleKremlin Wants to ‘Protect Russian Cyberspace from Unpredictable West’
MOSCOW – Russia is considering measures to protect its cyberspace from the “unpredictable” West, President Vladimir Putin’s spokesman said on Friday after a newspaper said Moscow was contemplating...
View ArticleHuawei, still trying to crack the US market, aims at ‘less sensitive industries’
Security concerns raised by US are not an issue for enterprise customers, says Chinese company as it aims at the corporate tech market.
View ArticleThere’s a Security Bug on 60% of Android Phones—And Google Won’t Fix It
A security researcher has discovered a serious bug in the WebView component of Android 4.3 and below that could open up phones to malicious hackers. But Google is doing nothing about it. Read more…...
View ArticleFive Reasons Attribution Matters
#attribution is the hottest word in #digital security. The term refers to identifying responsibility for an incident. What does it matter, though? Here are five reasons, derived from the five levels of...
View ArticleT-Mobile And Mozilla Are Not Launching A New ‘Privacy Phone’ [Updated]
Update: A Mozilla spokesperson has been in touch to say that the WSJ has misunderstood what Mozilla and DT are doing and they are not launching a phone,just working together. “It appears that there...
View ArticleAT&T Charging Customers to Not Spy on Them
#at&t is charging a premium for gigabit Internet service without surveillance: The #tracking and ad targeting associated with the gigabit service cannot be avoided using browser #privacy settings:...
View ArticleBrandPost: Real-World Security is the Ability to Protect the Ultimate Asset:...
We recently released the Cisco 2015 Annual Security Report and have now used it as a platform to introduce the inaugural #cisco security manifesto. Our motivation for creating this set of security...
View ArticleGemalto Confirms Hack, Downplays Damage
SIM-maker #gemalto says yes, it was hacked by GCHQ and NSA. But not that badly… Last week, leaks from NSA whistleblower Edward Snowden revealed what appeared to be a major hacking operation against the...
View ArticleEveryone Wants You To Have Security, But Not from Them
In December, #google‘s Executive Chairman #eric schmidt was interviewed at the CATO Institute Surveillance Conference. One of the things he said, after talking about some of the #security measures his...
View ArticleA Word of Caution on Fraudulent Routing
If you’ve read TaoSecurity Blog for a while, you remember me being a fan of companies like Renesys (now part of Dyn Research) and BGPmon. These organizations monitor #internet-wide routing by...
View ArticleBoards Not Briefed on Strategy?
I’d like to make a quick note on #strategy, after reading After high-profile hacks, many companies still nonchalant about cybersecurity in the Christian Science Monitor today. The article says: In a...
View ArticleWhy Firmware Is So Vulnerable to Hacking, and What Can Be Done About It
Open Whisper Systems If you own an iPhone or Android handset and care about your #privacy, there’s no longer much of an excuse not to encrypt every conversation you have. Now a free,...
View ArticleFeds Admit Stingrays Can Disrupt Cell Service of Bystanders
For years the #government has kept mum about its use of a powerful #phone surveillance technology known as a stingray. The #justice department and local law enforcement agencies insist that the only...
View ArticleOne Free iPhone App Now Enables Encrypted Voice Calls and Texts
If you own an iPhone or Android handset and care about your #privacy, there’s no longer much of an excuse not to encrypt every conversation you have. Now a free, zero-learning-curve #app exists for...
View ArticleComputer-stored encryption keys are not safe from side-channel attacks
Using #side-channel technology, researchers at Tel Aviv University can extract #decryption #keys from RSA and ElGamal implementations without altering or having control of a #computer. Read More
View ArticleGoogle researchers hack computers using DRAM electrical leaks
#google #researchers have written the first-ever attack code that takes advantage of #electrical interference between densely packed memory cells, a unique style of attack that could require changes in...
View Article