- Welcome Guest
- Sign In
Japan invited hackers -- nice ones, that is -- to attack the nation's government departments Tuesday. The move is designed to expose weaknesses in cyberdefenses and bolster national security ahead of the 2020 Olympics. Britain employed a similar strategy ahead of the 2012 Olympics in London. Japan e...
The latest Snowden revelations about NSA surveillance activities indicate the agency could infect millons of computers with malware, and has spoofed Facebook servers to capture traffic from targets. Documents previously leaked by NSA whistleblower Edward Snowden include detailed descriptions of its ...
Turkey's prime minister and president are spewing conflicting talking points on the nation's stance toward social media. It turns out the one who is getting nailed on social media is the one who wants more restrictions. Prime Minister Recep Tayyip Erdogan last week vowed to restrict social media aft...
Officials partaking in China's National People's Congress, which began Wednesday, have been asked to please not mess around on their mobile devices during the session. A state-owned newspaper published a list of rules for attendees, including this one: "Do not use your phones to send text messages o...
Security pros weren't very kind to mobile applications last week. Several firms knocked apps produced for the smartphone market for all kinds of risky behaviors that could lead to trouble not only for mobile device owners, but also for their employers. Android has been a poster child for misbehavi...
The NSA's salivary glands no doubt started working overtime when it became apparent that technological advances were moving the world toward an Internet of Things -- a world where everything would be connected to everything else wirelessly or over the Web. Almost two years ago, David Petraeus, then ...
Defense contractors have begun to bolster their cybersecurity practices in the wake of the massive leaking of government data by former NSA contractor Edward Snowden. Seventy-five percent of defense contractors said the Snowden Affair had changed security procedures for their employees in a recent s...
It looks like Google and European regulators have, at long last, reached a settlement to allay European Commission antitrust concerns. Google has struck a deal with European competition regulators, and the agreement now awaits formal EC approval. Under the terms laid out, Google would have to swallo...
Google is taking the fight to hackers by increasing the rewards it hands out to researchers who flag vulnerabilities in the company's products. Its security reward program now covers additional services including Chrome browser apps and extensions that the company has developed and branded as "by Go...
The holiday data breach at Target was opened up with stolen credentials from a vendor in the company's supply chain, according to reports that surfaced last week. That kind of attack is getting more and more common these days. "About 80 percent of data breaches originate in the supply chain," said T...
Don't get angry, but... U.S. and British intelligence agencies have long been mining data from smartphone apps such as the wildly popular Angry Birds. The National Security Agency and its British brethren at the Government Communications Headquarters reportedly have targeted the swell of data moving...
With breaking news about data breaches a common occurrence, you'd think security threats to an organization's data would be something CEOs and their management teams were kept in the know about. Apparently not. Some 80 percent of IT pros in the United States and United Kingdom said they did not freq...
CNN on Thursday became the latest media outlet to fall victim to hacking by the Syrian Electronic Army. The SEA hacked into and defaced various CNN social media accounts and blogs, the network's Catherine Shoichet reported. "Tonight, the #SEA decided to retaliate against #CNN's viciously lying repor...
The Syrian Electronic Army, which is notorious for launching cyberattacks against the media, on Monday defaced the Microsoft Office blog site. The hack occurred after Microsoft redesigned the blog site following an SEA attack earlier this month. "A targeted cyberattack temporarily affected the Micro...
While most folks know the value of money, few know the latest value of a Bitcoin, a virtual currency prone to wide price swings. Those swings haven't deterred those on the digital leading edge from speculating in the currency -- or bad app writers from cooking up ways to steal it. "Bitcoins -- and i...