Why hedge funds are under attack by cyber-criminals
For about two years, US hedge funds have been under stealthy attacks from cyber-criminals intent on intercepting trading strategies in order to profit from front-running and other illicit maneuvers,...
View ArticleElectronic medical records have security advantages, but systems aren’t perfect
This stack of medical records was found in May at a public dumpster at the York County Solid Waste Facility.
View ArticleComing soon to your wallet and stores – chip cards
Stores in North Jersey and around the country are gearing up for the next generation of credit cards, and consumers can expect to see changes in checkout aisles and in their wallets in coming months.
View ArticleJustice Department Employees Improve Phishing Spotting Skills
After a security exercise in December 2013 showed that 37% of the employees of the Justice Department in Canada fell for common phishing scams, the organization continued to raise awareness of the...
View ArticlePhishing attack on dating sites was “massive”
Dating sites have become the latest target for phishing emails as a number of campaigns targeting would-be daters have been launched in recent weeks with a variety of frauds resulting.
View ArticleCode Spaces Destroyed by Cyber Attack
A hacker deleted most of the company’s data, backups, machine configurations and offsite backups.
View ArticlePeople invested $1.2 million in an app that had no security
Proving that no one learned from Snapchat’s security and privacy spectacle, people invested $1.2 million on an app that had no security. Despite the news it was hacked, Yo still isn’t coming clean.
View ArticleAndreessen Horowitz Places $90 Million Bet on Cybersecurity Firm Tanium
Systems and security management company Tanium announced on Sunday that it has secured a massive $90 million in funding from Silicon Valley VC firm Andreessen Horowitz.
View ArticleHedge Fund Loses Millions In Hacking Attack
A US hedge fund lost millions of dollars over a two-month period after hackers installed software to steal trade secrets, it has been revealed.
View ArticleTriumfant Unveils Mac Endpoint Security Monitoring Agent
Triumfant, a provider endpoint-focused security monitoring solutions, today announced its support for Mac OS X. Announced at the Gartner Security Risk Management Summit, the new endpoint security agent...
View Article64-Year-Old Helps Police Catch Phishing Ring
A pensioner in Austria alerted the authorities of illegal money transfers in his online banking account, which led to the arrest of three cybercriminals. The 64-year-old living in Walding in the...
View ArticleMobile Security Is a Top Concern
The security implications of policies regulating the use of personal devices to access company data are acknowledged in many firms, although the measures are often disregarded, a study reveals....
View ArticleConsumers Ready for Internet of Things, But Fear Data Privacy and Security...
Security vendor Fortinet released a survey that shows homeowners want to embrace the Internet of Things (IoT), but are worried about privacy and security. In a survey of 1,801 homeowners, Fortinet...
View ArticleNew York Taxi ID Numbers in Anonymized Logs Are Decrypted
Details of more than 173 million taxi trips have been fully de-anonymized by a software developer in less than an hour. Following a public records request, New York City officials provided Chris Whong...
View ArticleHavex RAT Aims at Industrial Control Systems
Security researchers found that cybercriminals adopted new methods for distributing Havex, a remote access Trojan (RAT), and that their attention shifted towards industrial control systems (ICS). Havex...
View ArticleFalse stoned virus detections in Bitcoin files are widespread
Some joker stuffed the virus signature into the return address for a Bitcoin transaction leading to Stoned virus detections when transactions are stored on-disk.
View ArticleJihadists Fight Iraq Battle Online and on Ground
BAGHDAD – Supporters of a powerful jihadist group are waging an online propaganda war in concert with its battles on the ground in Iraq, where Sunni militants have overrun swathes of the country.
View ArticleMobile Malware Preys on Legitimate Apps and Services
With mobile devices being so prevalent, cybercriminals have already tapped this market leveraging vulnerabilities in apps and services in order to make as many victims as possible.The June 2014 McAfee...
View ArticleIRS scandal: Ludicrous claims about missing government emails? Been there,...
The stories and claims about this batch of missing emails are virtually identical to those we heard when the Bush administration emails went missing. Incredible incompetence or cover-up?
View ArticleThe quantum cryptography arms race has begun
Quantum computing may be taking its time to arrive, but when it does, encryption won’t be the same again I’ve been fascinated by quantum computing and quantum cryptography for many years.
View Article