Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

Syrian Electronic Army Targets CENTCOM, Shows It Has Access to US Army Data

The Syrian Electronic Army claims to have breached the systems of the United States Central Command (CENTCOM). The attack appears to be in response to the USs intention to use cyber warfare against...

View Article


Congress nudged by NSA nominee to revive CISPA as intelligence reforms take...

The NSA chief-in-waiting’s testimony to Congress may be enough to inspire lawmakers to revive old cybersecurity legislation, which would indemnify Silicon Valley technology giants from sharing their...

View Article


Crash, bang, boom: Down go all the major browsers at Pwn2Own

Well, that was ugly as sin. None of the major Web browsers–Internet Explorer, Chrome, Firefox or Safari–could withstand hacker attacks at Zero Day Initiative’s Pwn2Own hacking competition.

View Article

100,000 Morrisons Employees Impacted by Data Breach

The data breach suffered by UK supermarket chain Morrisons earlier this week impacts 100,000 employees. Theres no evidence that customer information has been compromised. The Daily Mail reports that...

View Article

Code Execution Flaws Found by Vupen and Anonymous Researcher in Chrome 33 Fixed

Google has updated the stable channel of Chrome to 33.0.1750.152 for Mac and Linux and 33.0.1750.154 for Windows to address the vulnerabilities presented by contestants at Pwn2Own 2014. Just before the...

View Article


How to protect your gadgets against cyber attacks

NEW YORK: We all know that laptops, desktop, tablets and mobile phones are all at risk of being hacked.

View Article

Chinese hacker cracks Safari, wins $40K, praises Apple’s security

Everybody’s Web software got ” pwned ” at the Pwn2Own hackers conference this week: Apple’s Safari, Google’s Chrome, Microsoft’s Internet Explorer, Mozilla’s Firefox and Adobe’s Reader and Flash.

View Article

Private Investigators UK – Skilled in Computer security, Spyware…

The software developer has had the rare Twitter name @N since 2007. In a blog post, Naoki revealed that he had been offered $50,000 to sell the name, and also that there have been past attempts made to...

View Article


VIDEO: Who can protect UK in a cyber attack?

The skills of amateur ”cyber defenders” are being put to the test in London this weekend, as they try to protect the UK against a simulated cyber attack.

View Article


NATO websites hit in cyber attack over Crimea stance

BRUSSELS/LONDON, March 15 – Unidentified hackers brought down several public NATO websites with cyber attacks on Saturday, the alliance said, in what appeared the latest escalation in cyberspace over...

View Article

Say goodbye to Windows XP, hello to ATM hackers

In less than a month, Microsoft will stop supporting Windows XP, and that’s going to affect more than just home computers — it will also cause trouble at the ATM.

View Article

NATO Websites Targeted in Attack Claimed by Ukrainian Hackers

PARIS – NATO said several of its websites were targeted in a “significant” cyber attack on Saturday that was claimed by Ukrainian hackers in what appeared to be the latest bout of virtual warfare...

View Article

Missing airliner: pilot hijack or cyber attack?

Did the pilot of the Malaysia Airlines airliner hijack the flight as a political protest? This is one of a clutch of new theories over the fate of the missing plane.

View Article


Crimean govt: Referendum website downed by cyber-attack from US

The official website of the Crimean referendum is down due to a cyber-attack that originated from the US, Crimean authorities say.

View Article

IBM denies assisting NSA in customer spying

IBM has categorically denied any involvement with the U.S. National Security Agency’s spying spree, and insists it has never handed over client data in the name of surveillance.

View Article


Man Arrested in Connection with Morrisons Data Breach

An employee of UK supermarket chain Morrisons has been arrested in connection with the investigation into the data breach suffered by the company last week. The suspect has not been named and his...

View Article

IBM: No Backdoors, No Source Code, No Client Data Provided to NSA

After details began to emerge on the scope of US government spying when classified documents were leaked by Edward Snowden, many US technology companies have been put in a tough position with their...

View Article


Google Addresses Chrome OS Vulnerabilities Presented at Pwnium 2014

Google has addressed a total of seven vulnerabilities with the release of Chrome OS 33.0.1750.152, the browser-based operating system thats installed on Chromebook devices. The security holes were...

View Article

Hacktivists Leak Data from Personal PC of Russian Industrial Investment Fund...

Hacktivists of the Russian Cyber Command (Rucyborg) group have announced another data leak. This time, theyve targeted the Russian Industrial Investment Fund, a semi-governmental investment company...

View Article

Was Malaysia Airlines Flight MH370 Hijacked by Hackers?

The disappearance of the Malaysia Airlines flight MH370 has made a lot of headlines lately and because authorities are not able to find the airplane, all sorts of theories have surfaced. Someone on...

View Article
Browsing all 2490 articles
Browse latest View live