New Phishing Campaign Targets Google Account Passwords
The well-crafted attack uses a data Uniform Resource Identifier scheme, according to Bitdefender.
View ArticleStolen Server Exposes Accounting Clients’ Personal Data
The unencrypted server held clients’ names, addresses and Social Security numbers.
View ArticleYokogawa Fixes Buffer Overflow Vulnerabilities in ICS Products
Japan-based electrical engineering and software company Yokogawa Electric has addressed four buffer overflow vulnerabilities affecting various industrial control system (ICS) products. The security...
View ArticleRetailers Partner on Cybersecurity Initiative
Retail Cyber Intelligence Sharing Center initiative will make it easy for retailers to share cybersecurity intelligence with each other and with government agencies.
View ArticleDo Cyber Attacks Have A Tipping Point Where Catastrophic Effects Are Imminent?
The term “Tipping Point” is controversial because it has been so widely misused and loosely applied; two abuses that I often see in the cyber security marketplace. However, there are examples where a...
View ArticleFormer student accused of hacking into UT computer network
Someone tired to hack into the University of Texas’ computer network on Thursday, but when the UT Security Control Office traced down the alleged hacker, he ended up being a former UT student.
View ArticleCasino Operator Affinity Gaming Says Hackers Accessed Payment Card Data
Affinity Gaming Hacked: Casino Operator Says Hackers Accessed Customer Payment Card Data Hackers have infiltrated the payment processing system at casinos and resort properties of Affinity Gaming and...
View ArticlePrankster hacks electronic sign, warns of Godzilla attack
Motorists in San Francisco got a laugh during traffic on Wednesday night when they saw an electronic road sign that warned them of a Godzilla attack.
View ArticleGlobal Raids Underway Against “Blackshades” Hackers
After months of investigation, law enforcement officials in the U.S., Europe and Asia are cracking down on a hacking network employing a computer program known as “Blackshades,” which can be used as...
View ArticleCVE-2013-7379
NVD is the U.S. government repository of standards based vulnerability management data.
View ArticleNew Algorithm Shakes Up Cryptography
Researchers have solved one aspect of the discrete logarithm problem. This is considered to be one of the ‘holy grails’ of algorithmic number theory, on which the security of many cryptographic systems...
View Article“Godzilla Attack!” Reads Hacked San Francisco Road Sign
Hackers in San Francisco provided the new Godzilla movie with unsolicited viral marketing earlier this week by hacking an electronic road sign to read “GODZILLA ATTACK!” This isn’t novel of course-you...
View ArticleWatchGuard CEO Departure Won’t Signal A Strategy Shift, Partners Believe
WatchGuard Technologies partners say they are not concerned about the company’s health or overall direction following the resignation of its CEO this week.
View ArticleTeen exposes major Optus security flaw
This was how easy it was to hack the voicemail of Optus phone customers, an issue which Optus says it has now resolved.
View ArticleCyber contest wins spy agency’s backing
GCHQ is backing a contest to find the best amateur security analysts in the UK. The Cyber Security Challenge will see applicants attempt to prevent a mock cyber attack on the UK and present their...
View ArticleSenate Talks Dangers of ‘Badware’
A senate subcommittee says hackers are infecting computers using software or programming commands hidden inside online advertisements.
View ArticleThe great Chinese social media hypocrisy
DESPITE banning Facebook and Twitter to its billion-plus citizens, the Chinese government are increasingly embracing the social media networks to promote the country to Westerners.
View ArticleNSA Row Sparks Rush for Encrypted Email
WASHINGTON – A new push to encrypt email, keeping messages free from government snooping, is gaining momentum. One new email service promising “end-to-end” encryption launched on Friday, and others are...
View ArticleLifeLock Kills Mobile Wallet App, Deletes User Data from Servers
After discovering that its mobile app was not fully compliant with PCI security standards, identity protection firm LifeLock said on Friday that it has pulled its mobile wallet application from popular...
View ArticleAnti-hacker casing by Vysk promises absolute security for your Galaxy S5 and...
Think your smartphone is safe? Think again. The Vysk QS1 is one of the more unique smartphone cases out there, as it features a pair of mechanical camera shutters so you can cover up your cameras so...
View Article