CIA hacked into Congress computer network: Senator
Feinstein said she had already asked CIA Director John Brennan about the matter but hasn’t received any answers.
View ArticleAccuvant to be Acquired by Investment Management Firm Blackstone
Security firm Accuvant has reached an agreement to become part of investment management firm Blackstone. As part of the deal, Blackstone will acquire a majority stake in Accuvant, and Accuvant...
View ArticleNSA Nominee: US Cyber Infrastructure “Not Optimized for Defense in Its...
NSA Nominee Defends Bulk Data Collection WASHINGTON – The nominee to head the US National Security Agency on Tuesday defended the use of bulk data collection but said he also wants more transparency...
View Article(New)Hackers target Seattle archdiocese in tax fraud scheme
Hackers have targeted the Catholic Archdiocese of Seattle, putting some employees and volunteers at risk of being victimized in a national tax refund fraud.
View ArticleAdobe issues non-critical Flash update
A new version of Flash fixes two vulnerabilities in the Windows, Mac and Linux versions. They’re not super-high priority.
View ArticleMicrosoft patches 23 Windows, IE and Silverlight vulnerabilities
Windows XP’s next-to-last Patch Tuesday saw four updates to it. Office 2003 is also going off support, but no updates were released today for it.
View ArticleHacktivists Leak Data from Russian IT Security Company SearchInform
Hacktivists of the group called Russian Cyber Command (Rucyborg) have targeted the systems of SearchInform, a Russian company that specializes in providing solutions for employee monitoring and data...
View ArticleAdobe Updates Flash Player 12 to Address Two Vulnerabilities
Adobe has released updates for Flash Player 12.0.0.70 for Windows and Mac, and Flash Player 11.2.202.341 for Linux to address a couple of security holes. The company advises all users of Adobe Flash...
View ArticleChrome Updated to 33.0.1750.149, 7 Security Issues Fixed
Chrome 33.0.1750.149 is available for download. Google has updated the stable channel of its web browser to address a total of 7 security holes. Of the 7 vulnerabilities, there are three that stand...
View ArticleCVE-2013-4195
NVD is the U.S. government repository of standards based vulnerability management data.
View ArticleHarvard Law National Security Journal Hacked, Abused to Promote Rogue Pharmacies
The website of the Harvard Law School National Security Journal (harvardnsj.org) has been compromised. The attackers are abusing the site to promote various rogue pharmacies. Privacy researcher and...
View ArticleHackers Can Steal Private WhatsApp Chats with Other Android Apps
A security consultant has uncovered a new security hole in WhatsApp, the instant messaging platform recently acquired by Facebook. The flaw can be leveraged to gain access to the private chats of...
View ArticleTwitter Account of Adviser to Turkish Prime Minister Hijacked by Hacktivists
The official Twitter account of Mustafa Varank, one of the top advisers of Turkish Prime Minister Recep Tayyip Erdoğan, has been hijacked by hacktivists. The attack, launched by a group called DLMK...
View ArticleCyber Insurance: 6 Facts You Should Know
Protecting your data is one thing, but what about insuring it? If you are considering cyber insurance, here are some facts you need to know.
View ArticleMore secure communications thanks to quantum physics
One of the recent revelations by Edward Snowden is that the U.S. National Security Agency is currently developing a quantum computer.
View ArticleThe NSA Uses Automated Tools to Plant Malware on Millions of Computers
The Intercepts Glenn Greenwald and Ryan Gallagher have published another report based on information stolen by Edward Snowden from the US National Security Agency. The latest report highlights the...
View ArticleTarget breach was ‘far from advanced,’ shows retail security blind spot: McAfee
Employees arrange shopping carts in lines for customers at a Target Corp. store in Chicago last year.
View ArticleNSA: Our zero days put you at risk, but we do what we like with them
NSA chief nominee US Navy Vice Admiral Michael S Rogers details some of the procedures it follows for disclosing or withholding its trove of zero day flaws.
View ArticleTaking Aim at the Energy Sector: Three Steps to Defend Against a Rising...
When Thomas Edison said, “We will make electricity so cheap that only the rich will burn candles,” you wonder if he envisioned how essential it would become to daily life. Energy is so important that...
View ArticleFake “Statement Account” Emails Apparently from Sky.com Carry Malware
In case you stumble upon what appears to be an account statement in your inbox, act with caution. It could be an email sent out by cybercriminals to distribute a piece of malware. Both ThreatTrack...
View Article