Hacking

Still reeling from a cyberintrusion that exposed massive amounts of personnel data from its entertainment division on the Internet, Sony was attacked again over the weekend. This time, hackers disrupted the company's PlayStation Network. However, unlike the foray against Sony Pictures Entertainment,...

Iran, which for decades has locked horns with the U.S., is emerging as a cyberwarfare power that's threatening the world, Cylance warned in its Operation Cleaver report, released Tuesday. Cylance has been tracking one team of roughly 20 hackers called "Tarh Andishan," which means "thinkers" or "inno...

Cyberspies will flourish and hackers will target Apple devices more often in 2015. Until now, Russia, China and the United States have dominated the cyberespionage scene, but their success will start to attract new players to the practice. "We can expect some of the developing economies -- countri...

Upwards of 1.2 million people reportedly have used pirate sites to download Brad Pitt's unreleased World War II drama Fury. That was one of five films hackers leaked onto the Web following an attack on Sony Pictures' network last week. Sony has called in the FBI and other law enforcement agencies. C...

SPOTLIGHT ON SECURITY

Wristband Heads Off Password Headaches

Has software glut got you down? Do you reuse passwords because creating unique ones for all your online accounts would cause a memory overload? If your answer to those questions is yes, you may be interested in a bit of jewelry called the "Everykey," by a startup with the same name. Everykey is a wr...

The Electronic Frontier Foundation has announced a nonprofit organization that will aim to secure the entire Web. Let's Encrypt, starting in summer 2015, will offer free server certificates to help websites transition from HTTP to the more secure HTTPS protocol. EFF is partnering with Akamai, Mozill...

Cybercriminals are using a new version of the dangerous Citadel Trojan, which has been employed to attack the financial and petrochemical industries, to compromise password and authentication solutions, IBM Trusteer has reported. The new version begins capturing keystrokes, or keylogging, when some ...

A Russian website has been posting live video streams from unprotected webcams in homes and businesses around the globe, Britain's Information Commissioner's Office warned on Thursday. The website has gained access to the webcams using the cameras' default login credentials, which are freely availab...

SPOTLIGHT ON SECURITY

China Suspected in Attacks on USPS, NOAA

The U.S. Postal Service and National Oceanic and Atmospheric Administration last week confirmed that their computer systems were targeted in months-long cyberattacks that appear to have originated in China. The attack on USPS compromised information of an estimated 800,000 employees. Data at risk in...

Researchers at FireEye on Monday made public the existence of the Masque Attack, which threatens iOS and Mac OS X operating systems. Masque Attack exploits a flaw in Apple's OSes that allows the replacement of one app by another so long as both apps use the same bundle identifier. All apps, except t...

Hackers siphoned off data from United States Postal Service servers for more than eight months before being detected, the USPS said. Personal data -- including names, dates of birth, Social Security numbers, addresses, beginning and end dates of employment, and emergency contact information -- was s...

SPOTLIGHT ON SECURITY

New Tool Alerts Etailers to Suspicious Characters

As thoughtful as mobile phone makers are when they design their products, there are always punters who want something that isn't there and are willing to hack a device to get it. In the Android world such a hack is called "rooting" a phone; in the iOS world, it's called "jailbreaking." Either can tu...

SPOTLIGHT ON SECURITY

Russian Cyberspies Caught With Mittens in Cyber Cookie Jar

Russian cyberspies have a reputation for stealth, so it's unusual when two digital espionage operations linked to the Kremlin come to light in a week. FireEye early last week released a report detailing how hackers working for the Russian government have been using sophisticated techniques over a se...

iSight Partners this week revealed that a cybergang it dubbed "Sandworm" has been exploiting a zero-day vulnerability that impacts all supported versions of Microsoft Windows, including Windows Server 2008 and 2012. The announcement was held off until Microsoft issued its patch earlier this week. If...

Researchers on Thursday discovered proof-of-concept code that could take advantage of unpatched computer systems, and found evidence of attacks exploiting the BASH Shellshock bug in the wild. Shellshock, revealed Wednesday, could become a major threat to Linux/Unix and Apple operating systems if pub...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

Technewsworld Channels