Hacking

Microsoft has fortified the latest version of Windows to make it more secure than previous editions, but the strongest protections will be available only to those willing to pay a steep price for them. Windows 10 Anniversary Update has introduced many mitigation techniques in core Windows components...

SPOTLIGHT ON SECURITY

Las Vegas Captures Ransomware Crown

Las Vegas is arguably the gambling capital of the world, but it's also the king city for ransomware, based on recent research. Among the world's nations, the United States ranked highest in ransomware incidents, according to a Malwarebytes report on the prevalence and distribution of extortion apps....

SPOTLIGHT ON SECURITY

2017: More Apple Security Flaws, Cyberattacks, Hacktivisim

More security vulnerabilities will appear in the software of Adobe and Apple than in Microsoft's, more attacks on the Internet's infrastructure will occur, and cybersecurity events will stoke international tensions. Those are a few of the predictions for 2017 that security experts have made. Users o...

Yahoo on Wednesday revealed that Net bandits stole data associated with 1 billion of its user accounts -- one of the largest data breaches in Internet history. The theft, which occurred in August 2013, is distinct from the theft disclosed earlier this fall, in which 500 million accounts were comprom...

The San Francisco Municipal Transportation Authority, or SF MTA, was hacked on Friday. "You Hacked, All Data Encrypted," was the message reportedly displayed on computer screens at the authority's stations throughout the city. "Contact for Key ([email protected])ID:681 , Enter." Fare payment mach...

Proving once again that you can do a lot of damage with a little investment and a lot of ingenuity, security researcher Samy Kamkar recently managed to take down a locked, password-protected computer armed with only a $5 Raspberry Pi. The low-tech cookie-siphoning intrusion is one of Kamkar's simple...

Recent high-profile distributed denial of service attacks on the Internet's infrastructure and an investigative journalist's website have spiked concerns over possible disruptions of traffic during the biggest online shopping weekend of the year. Online spending last year exceeded $5.8 billion on Bl...

Hackers have stolen information of more than 400 million users of Friend Finder Networks, which runs several adult dating and pornography websites, LeakedSource reported earlier this week. This is Friend Finders' second breach in two years. Last year, hackers accessed 4 million accounts, exposing in...

Russian digital forensics firm ElcomSoft on Thursday reported that Apple automatically uploads iPhone call logs to iCloud remote servers, and that users have no official way to disable this feature other than to completely switch off the iCloud drive. The data uploaded could include a list of all ca...

Sites that repeatedly violate Google's safe browsing policies will be classified as repeat offenders, the company said. A small number of websites take corrective actions after Google displays alerts on their landing pages warning visitors that they're harmful. However, they typically revert to viol...

In the past, heightened rhetoric and propaganda were the tools of choice for those looking to convince an electorate to vote them into office, and conspiracy theories were their bane. This election season has seen the rise of a new form of persuasion, one that's unique to the Information Age. For mo...

SPOTLIGHT ON SECURITY

Defeating Malware With Its Own DNA

It's widely known that human DNA evidence has had a major impact in the criminal justice system. Now another kind of DNA may have a similar impact in the fight to eradicate malicious software. Malware DNA, also known as "malware provenance," is the art and science of attributing elements of one obj...

Microsoft earlier this week said it had fallen victim to "Strontium," its code name for the Russian hacking group also known as "Fancy Bear," which has been linked to recent attacks on Democratic Party systems. The group launched a spear phishing attack that targeted vulnerabilities in both the Wind...

Watching TV shows often requires the suspension of disbelief -- that is, a willingness to press pause on one's critical faculties in order to believe the unbelievable. Realism often must be secondary to story, in other words. This very often is necessary when computers are used to advance plot lines...

Technewsworld Channels