Universities Train White-Hats to Combat Security Flaws
The Carnegie Mellon University in Pittsburgh has included an IT security course in its curriculum that trains students to think like hackers in order to fight security threats against systems belonging...
View ArticleHackers Change Physical Education Records, Get Prosecuted
Two students at a university in Shanghai were charged with damaging a computer network for breaching the computer systems of the educational institution in order to modifyinformation regarding...
View ArticleMax The Magnificent
Oh yes, my 9mm Glock also helps to relax me @goafrit: Hope it can decipher when there is threat and the voice changes.
View ArticleResearchers Disarm Microsoft’s EMET
Researchers from Offensive Security have found a way to disable the protection systems provided by the latest version of Microsoft’s Enhanced Mitigation Experience Toolkit (EMET).
View ArticleEx-Intelligence Chief McConnell Fears Major Cyber Attack
Former National Intelligence Director Adm. Mike McConnell notes in this interview at Techonomy’s recent Data Security Lab that our democracy has traditionally made decisions and developed legislation...
View ArticleNew Cridex Malware Uses Self-Spreading Infection Mechanism
New Version of Cridex Malware Combines Data Stealer and Email Worm A new version of the data-stealing malware Cridex (Feodo/Bugat) has been found to rely on a worm in order to spread from one computer...
View ArticleHijackRAT Aimed At Korean Android Users
A malware sample for Android that integrates a rare suite of malicious functions, such as uploading SMS messages, stealing banking credentials, and sending text, has been discovered to target Korean...
View ArticleMailPoet WordPress Plugin Security Vulnerability
The MailPoet plugin for the WordPress blogging platform has been found to be vulnerable to an exploit that allows a potential attacker to upload any file to the affected website, without having to...
View ArticleU.S. to Push China on Hacking at High-Level Talks
WASHINGTON – Washington will push Beijing to crack down on cyber-spying and halt the theft of corporate data when the two powers meet next week for high-level talks, a US diplomat told AFP Wednesday.
View ArticleCybercriminals May Have Stolen Billions in Brazilian ‘Boletos’
RSA Research has identified a malware-based fraud ring targeting Brazil’s popular Boleto payment method that may have pilfered billions of dollars from unsuspecting victims.
View ArticleHackers Attack Vermont’s Obamacare Website For a Month, No One Notices | Guy...
This story comes to us from deep blue, Ben Jerry’s Vermont — where the electorate is so liberal that they’ve green lit a single-payer system .
View ArticleCosmicDuke Combines Cosmu and MiniDuke Components
Security researchers identified a new persistent threat borne from a combination of components particular to Cosmu and MiniDuke malware families.Because the analyzed samples integrated a loader related...
View ArticleU.S. asks firms to check networks after ‘Energetic Bear’ attacks
The U.S. government has asked critical infrastructure operators to review computer networks to see if they are infected with malicious software from the “Energetic Bear” hacking group, which private...
View ArticleNext war: Protecting nation from cyber attacks
Flash Flood Watch issued July 3 at 3:33AM EDT expiring July 4 at 12:00PM EDT in effect for: Caroline, Kent, Queen Annes, Talbot Flash Flood Watch issued July 3 at 3:33AM EDT expiring July 4 at 12:00PM...
View ArticleNext war: Protecting nation from cyber attacks
In the age of cyber warfare, security takes on new meaning. You may worry about your email or credit cards getting hacked.
View ArticleJava support over for Windows XP
The regularly-scheduled quarterly security updates for Java on July 15 will not include updates for Windows XP, which is now formally unsupported by Oracle.
View ArticleMicrosoft Plans Critical Internet Explorer, Windows Updates for Patch Tuesday
Microsoft announced plans today to release six security bulletins as part of this month’s Patch Tuesday. Of the six, two are rated ‘critical’, while three are rated ‘important’ and one is considered...
View ArticleRoboForm for Android Fooled to Reveal Details Without Master Password
A simple way to access the database with the sensitive information stored by RoboForm for Android has been presented in a two-minute video on YouTube. IT consultant Paul Moore managed to fool the...
View ArticleBitcoin Phishing Ads Present in Bing Search Engine
Bing search engine continues to be abused by cybercriminals, as they pollute the list of results with malicious links; this time, they are after bitcoins and rely on Bing ads to trap unsuspecting...
View Article‘Smart’ Homes May Be Vulnerable To Hackers
A LG representative shows a smartphone with Home Chat in front of a LG smart refrigerator during the 2014 International CES, January 10 in Las Vegas, Nevada.
View Article