Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

US accuses China of hacking into defense contract firms

Chinese hackers believed to be linked to Beijing conducted dozens of cyberattacks on US defense contractors between 2012 and 2013, potentially compromising military operations, a congressional probe...

View Article


Cyber attack may affect area physicians’ patients

Patients who received services from Marion Physician Services LLC, affiliated with Community Health Systems Professional Services Corporation, have been notified of an external cyber attack. Christi...

View Article


Retailers’ Customers Cautioned As Cyber Attacks Continue

Home Depot says some 56 million card holders were possibly compromised in a cyber attack. It says there’s no evidence that debit PIN numbers were comprised or that the breach effected online shoppers.

View Article

Cybercriminals Abuse New TLDs in Phishing, Malware Attacks

The recent expansion of generic Top-Level Domains (gTLDs) has attracted the attention of cybercriminals who have started abusing them for their malicious operations, researchers warned this week.

View Article

Kremlin Wants to ‘Protect Russian Cyberspace from Unpredictable West’

MOSCOW – Russia is considering measures to protect its cyberspace from the “unpredictable” West, President Vladimir Putin’s spokesman said on Friday after a newspaper said Moscow was contemplating...

View Article


Huawei, still trying to crack the US market, aims at ‘less sensitive industries’

Security concerns raised by US are not an issue for enterprise customers, says Chinese company as it aims at the corporate tech market.

View Article

There’s a Security Bug on 60% of Android Phones—And Google Won’t Fix It

A security researcher has discovered a serious bug in the WebView component of Android 4.3 and below that could open up phones to malicious hackers. But Google is doing nothing about it. Read more…...

View Article

Five Reasons Attribution Matters

#attribution is the hottest word in #digital security. The term refers to identifying responsibility for an incident. What does it matter, though? Here are five reasons, derived from the five levels of...

View Article


T-Mobile And Mozilla Are Not Launching A New ‘Privacy Phone’ [Updated]

 Update: A Mozilla spokesperson has been in touch to say that the WSJ has misunderstood what Mozilla and DT are doing and they are not launching a phone,just working together. “It appears that there...

View Article


AT&T Charging Customers to Not Spy on Them

#at&t is charging a premium for gigabit Internet service without surveillance: The #tracking and ad targeting associated with the gigabit service cannot be avoided using browser #privacy settings:...

View Article

BrandPost: Real-World Security is the Ability to Protect the Ultimate Asset:...

We recently released the Cisco 2015 Annual Security Report and have now used it as a platform to introduce the inaugural #cisco security manifesto. Our motivation for creating this set of security...

View Article

Gemalto Confirms Hack, Downplays Damage

SIM-maker #gemalto says yes, it was hacked by GCHQ and NSA. But not that badly… Last week, leaks from NSA whistleblower Edward Snowden revealed what appeared to be a major hacking operation against the...

View Article

Everyone Wants You To Have Security, But Not from Them

In December, #google‘s Executive Chairman #eric schmidt was interviewed at the CATO Institute Surveillance Conference. One of the things he said, after talking about some of the #security measures his...

View Article


A Word of Caution on Fraudulent Routing

If you’ve read TaoSecurity Blog for a while, you remember me being a fan of companies like Renesys (now part of Dyn Research) and BGPmon. These organizations monitor #internet-wide routing by...

View Article

Boards Not Briefed on Strategy?

I’d like to make a quick note on #strategy, after reading After high-profile hacks, many companies still nonchalant about cybersecurity in the Christian Science Monitor today. The article says: In a...

View Article


Why Firmware Is So Vulnerable to Hacking, and What Can Be Done About It

Open Whisper Systems If you own an iPhone or Android handset and care about your #privacy, there’s no longer much of an excuse not to encrypt every conversation you have. Now a free,...

View Article

Feds Admit Stingrays Can Disrupt Cell Service of Bystanders

For years the #government has kept mum about its use of a powerful #phone surveillance technology known as a stingray. The #justice department and local law enforcement agencies insist that the only...

View Article


One Free iPhone App Now Enables Encrypted Voice Calls and Texts

If you own an iPhone or Android handset and care about your #privacy, there’s no longer much of an excuse not to encrypt every conversation you have. Now a free, zero-learning-curve #app exists for...

View Article

Computer-stored encryption keys are not safe from side-channel attacks

Using #side-channel technology, researchers at Tel Aviv University can extract #decryption #keys from RSA and ElGamal implementations without altering or having control of a #computer. Read More

View Article

Google researchers hack computers using DRAM electrical leaks

#google #researchers have written the first-ever attack code that takes advantage of #electrical interference between densely packed memory cells, a unique style of attack that could require changes in...

View Article
Browsing all 2490 articles
Browse latest View live