Quantcast
Channel: DataProtectionCenter.com - Tech and Security » Security
Browsing all 2490 articles
Browse latest View live

“Chinese” Hackers Hit Firms Behind Israel’s Iron Dome

According to Columbia, Md.-based threat intelligence firm Cyber Engineering Services Inc. , between Oct. 10, 2011 and August 13, 2012, attackers thought to be operating out of China hacked into the...

View Article


Video games industry is fighting an advanced cyber attack campaign

THE VIDEO GAMES INDUSTRY is at the mercy of a large scale advanced cyber attack campaign designed to steal source code, Dell’s security arm Secureworks has revealed .

View Article


Country-Specific Web Domains Can’t Be Seized: ICANN

Country Web Domains Can’t be Seized: Regulator WASHINGTON – The Internet’s regulatory authority said Wednesday that country-specific Web domains cannot be seized in court proceedings, as it sought to...

View Article

Tor warns users it was attacked, but details on deanonymizing efforts sketchy

Whil the company said users of Tor should “assume they were affected,” the developers of the anonymous browsing service doesn’t yet know what “affected” means.

View Article

Facebook for Android Receives Security Fixes

A number of three vulnerabilities have been eliminated from the Facebook app for Android devices; these would allow a potential attacker to conduct denial-of service (DoS) type of attacks on the...

View Article


Pushdo Botnet Continues to Stay Strong

Pushdo botnet continues to stay strong as security company’s systems record almost 200,000 unique IP addresses attempting to communicate with the domains of the command and control servers.Bitdefender...

View Article

Internet of Things Multiplies Attack Vectors, HP Finds

A report from HP Security Research, created as after of analyzing popular devices in the most common Internet of Things (IoT) areas, shows that the number of vulnerabilities for each of the items...

View Article

Tor hints at possible U.S. government involvement in recent attack

Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today...

View Article


Facebook Phishing Scam Asks for More Than Social Network Credentials

A phishing scam posing as a Facebook notification, has been spotted in the wild trying to steal log in credentials not just for the account of the social networking site, but also for the email account...

View Article


NOAA Cybersecurity Criticized in Audit by Inspector General

A cybersecurity audit of the National Oceanic and Atmospheric Administration uncovered an agency challenged by inconsistent security controls.

View Article

Hackers have compromised the once anonymous Tor network

The Tor anonymous encryption service offers internet users a way to surf the web with anonymity and prides itself on the level of security it offers.

View Article

USB Device Firmware Can Be Reprogrammed to Hide Sophisticated Malware

Researchers Develop “BadUSB” to Demonstrate Extreme Threats Posed by USB Devices Users have long been warned about the dangers of using USB drives, but new research shows significant threats that stem...

View Article

“Pitty Tiger” Threat Actors Possibly Active Since 2008: FireEye

Researchers at FireEye have analyzed the operations of the advanced persistent threat (APT) group dubbed “Pitty Tiger,” and determined that it might have been active since as far back as 2008.

View Article


When Will U.S. Cyber Alarms Match its Cyber Threats?

Former Secretary of State Madeline Albright recently stated that “the world is a mess.” And indeed it is. From Russia’s stoking of a war of insurrection in the Ukraine to the Israel-Hamas war to...

View Article

Fiesta Exploit Kit Delivers Double Payload

In an attempt to evade detection, threat actors have modified the way Fiesta Exploit Kit (EK) delivers the payload to the target computer by sending two malicious files.This sort of technique is not...

View Article


Symantec Publishes Advisory for Mitigating Zero-Day Risks

In the wake of the zero-day threats in Symantec Endpoint Protection (SEP) suite presented by the Offensive Security team this week, Symantec has released an advisory for avoiding the risks of...

View Article

Chinese Hackers Hit Canada’s National Research Council

The NRC says it’ll take a year to develop a new secure IT infrastructure.

View Article


NATO Unprepared for Russian Attack: UK Lawmakers

“Events in Ukraine this year, following on from the cyber attack on Estonia in 2007 and the invasion of Georgia by Russia in 2008, are a ‘wake-up call’ for NATO.”

View Article

Twitter Acquires Password Management Startup Mitro

The security startup behind the Mitro password manager has been acquired by Twitter, the team at Mitro announced on Thursday. The financial terms of the deal were not disclosed.

View Article

Today’s cars are hackable, posing a threat to you

A report shared exclusively with CNNMoney shows that the 2014 Jeep Cherokee, 2015 Cadillac Escalade and 2014 Toyota Prius were the most “hackable” of 20 car models reviewed by automotive security...

View Article
Browsing all 2490 articles
Browse latest View live