- Welcome Guest
- Sign In
Nine months after shutting down operations -- and just weeks after several suspected members were arrested -- the LulzSec hacker community has apparently sprung back to life, hacking the website of military dating site MilitarySingles. However, there's some controversy over whether that site had ind...
Iran apparently has developed an antivirus program to neutralize the notorious Stuxnet virus that put a kink in the country's nuclear development program in June 2010. Iran has vowed to distribute the antivirus program for free in about a month, according to Trend, a publication that describes itsel...
The BBC was the target of hack attacks earlier this month, according to comments made by BBC Director-General Mark Thompson in a wide-ranging speech to the Royal Television Society on Wednesday. There was a simultaneous attempt to jam two different satellite feeds of BBC Persian into Iran, and to di...
Nearly 80 percent of organizations have experienced a data breach in the last two years due to employee negligence or maliciousness. That was one of the findings in a study released last week by the Ponemon Institute and sponsored by antivirus software maker TrendMicro. A surprising discovery by the...
Before your company finds itself embroiled in a lawsuit over a data breach that spills personal information about your customers all over the Internet, you might want to take a look at some recent research by Carnegie Mellon and Temple Universities. Data breach victims are six times less likely to f...
In the near future, cyberthreats will be the leading threat to the United States, FBI Director Robert Mueller warned in a speech on Thursday at the RSA Conference in San Francisco. Traditional crime, from mortgage and healthcare fraud to child exploitation, have moved online, while terrorists have b...
What would happen if you paid taxes or protection money but didn't get protected because your protectors themselves were getting clobbered? Worse still, what if they didn't tell you they had been compromised and that you might not be safe? That situation played out recently after yet another company...
WikiLeaks on Monday released the first 200 of what it says are 5 million emails stolen from global geopolitical analyst firm Stratfor. The emails, written between July 2004 and late December 2011, reveal Stratfor's web of informers, its payoff structure, payment laundering techniques and psychologic...
Internet privacy appeared on the big stage last week when the Obama administration unveiled its plans on the subject, which included a bill of rights for consumer privacy. The President's privacy framework evoked reactions from stakeholders ranging from enthusiastic to guardedly optimistic. "Consume...
The United States National Security Agency has cautioned that the Anonymous hacker community might be able to cause a limited power outage through a cyberattack, according to a recent report. NSA Director Gen. Keith Alexander has warned of the potential attack during meetings at the White House and ...
Public key cryptography, a system used to secure online traffic, carries a significant flaw, a group of European and American mathematicians and cryptographers has found. Public key cryptography requires the sender and the receiver of a message to each have a digital key to encrypt and decrypt it, r...
A bipartisan group of senators has proposed legislation that would give the United States Department of Homeland Security increased power over critical IT infrastructure owned by the private sector. The Cybersecurity Act of 2012 was introduced in the Senate Tuesday by Senator Joseph Lieberman, chair...
Malicious hackers attacked Microsoft's India online retail store on Sunday evening, publishing obscured screenshots that appeared to contain personal user information. A Chinese hacker group known as "Evil Shadow Team" took responsibility for the breach, posting a message on Microsoft's website stat...
Mobile shopping received a setback last week when security researchers discovered flaws in Google Wallet that could potentially expose its PIN to enterprising hackers. When Google introduced its wallet, it bragged that it was secure because transaction information was stored in a "secure element" in...
Politics, rather than good old-fashioned theft, is increasingly the motivation of malicious hackers who attack websites using DDoS techniques. Arbor Networks has found that ideological hacktivism was the motivation behind most distributed denial of service attacks in 2011. Attacks for profit or comp...