Syrian Electronic Army Targets CENTCOM, Shows It Has Access to US Army Data
The Syrian Electronic Army claims to have breached the systems of the United States Central Command (CENTCOM). The attack appears to be in response to the USs intention to use cyber warfare against...
View ArticleCongress nudged by NSA nominee to revive CISPA as intelligence reforms take...
The NSA chief-in-waiting’s testimony to Congress may be enough to inspire lawmakers to revive old cybersecurity legislation, which would indemnify Silicon Valley technology giants from sharing their...
View ArticleCrash, bang, boom: Down go all the major browsers at Pwn2Own
Well, that was ugly as sin. None of the major Web browsers–Internet Explorer, Chrome, Firefox or Safari–could withstand hacker attacks at Zero Day Initiative’s Pwn2Own hacking competition.
View Article100,000 Morrisons Employees Impacted by Data Breach
The data breach suffered by UK supermarket chain Morrisons earlier this week impacts 100,000 employees. Theres no evidence that customer information has been compromised. The Daily Mail reports that...
View ArticleCode Execution Flaws Found by Vupen and Anonymous Researcher in Chrome 33 Fixed
Google has updated the stable channel of Chrome to 33.0.1750.152 for Mac and Linux and 33.0.1750.154 for Windows to address the vulnerabilities presented by contestants at Pwn2Own 2014. Just before the...
View ArticleHow to protect your gadgets against cyber attacks
NEW YORK: We all know that laptops, desktop, tablets and mobile phones are all at risk of being hacked.
View ArticleChinese hacker cracks Safari, wins $40K, praises Apple’s security
Everybody’s Web software got ” pwned ” at the Pwn2Own hackers conference this week: Apple’s Safari, Google’s Chrome, Microsoft’s Internet Explorer, Mozilla’s Firefox and Adobe’s Reader and Flash.
View ArticlePrivate Investigators UK – Skilled in Computer security, Spyware…
The software developer has had the rare Twitter name @N since 2007. In a blog post, Naoki revealed that he had been offered $50,000 to sell the name, and also that there have been past attempts made to...
View ArticleVIDEO: Who can protect UK in a cyber attack?
The skills of amateur ”cyber defenders” are being put to the test in London this weekend, as they try to protect the UK against a simulated cyber attack.
View ArticleNATO websites hit in cyber attack over Crimea stance
BRUSSELS/LONDON, March 15 – Unidentified hackers brought down several public NATO websites with cyber attacks on Saturday, the alliance said, in what appeared the latest escalation in cyberspace over...
View ArticleSay goodbye to Windows XP, hello to ATM hackers
In less than a month, Microsoft will stop supporting Windows XP, and that’s going to affect more than just home computers — it will also cause trouble at the ATM.
View ArticleNATO Websites Targeted in Attack Claimed by Ukrainian Hackers
PARIS – NATO said several of its websites were targeted in a “significant” cyber attack on Saturday that was claimed by Ukrainian hackers in what appeared to be the latest bout of virtual warfare...
View ArticleMissing airliner: pilot hijack or cyber attack?
Did the pilot of the Malaysia Airlines airliner hijack the flight as a political protest? This is one of a clutch of new theories over the fate of the missing plane.
View ArticleCrimean govt: Referendum website downed by cyber-attack from US
The official website of the Crimean referendum is down due to a cyber-attack that originated from the US, Crimean authorities say.
View ArticleIBM denies assisting NSA in customer spying
IBM has categorically denied any involvement with the U.S. National Security Agency’s spying spree, and insists it has never handed over client data in the name of surveillance.
View ArticleMan Arrested in Connection with Morrisons Data Breach
An employee of UK supermarket chain Morrisons has been arrested in connection with the investigation into the data breach suffered by the company last week. The suspect has not been named and his...
View ArticleIBM: No Backdoors, No Source Code, No Client Data Provided to NSA
After details began to emerge on the scope of US government spying when classified documents were leaked by Edward Snowden, many US technology companies have been put in a tough position with their...
View ArticleGoogle Addresses Chrome OS Vulnerabilities Presented at Pwnium 2014
Google has addressed a total of seven vulnerabilities with the release of Chrome OS 33.0.1750.152, the browser-based operating system thats installed on Chromebook devices. The security holes were...
View ArticleHacktivists Leak Data from Personal PC of Russian Industrial Investment Fund...
Hacktivists of the Russian Cyber Command (Rucyborg) group have announced another data leak. This time, theyve targeted the Russian Industrial Investment Fund, a semi-governmental investment company...
View ArticleWas Malaysia Airlines Flight MH370 Hijacked by Hackers?
The disappearance of the Malaysia Airlines flight MH370 has made a lot of headlines lately and because authorities are not able to find the airplane, all sorts of theories have surfaced. Someone on...
View Article