Hacking

The Jamaican bobsled team, which qualified for the Olympics for the first time since 2002, is heading to the Sochi Olympics, thanks in large part to a group of supporters who raised more than $25,000 worth of "Dogecoins," an Internet currency. The team needed about $40,000 total, and after the Inter...

Snapchat on Thursday finally apologized for last month's data breach. A website dubbed "SnapchatDB.info," which went live on New Year's Eve, published the user names and phone numbers of 4.6 million Snapchat accounts. The breach was discovered by Gibson Security, which explained in an online post ho...

SPOTLIGHT ON SECURITY

New Year’s Resolutions: Be More Secure in 2014

If you're inclined to make resolutions this time of year and you're concerned about your online and offline security, here are some suggestions that can keep you safer in the days ahead. At the top of the list: You should vow to change the passwords to your important accounts on a frequent basis. "T...

After its discovery of a security hole in Snapchat was ignored for months, Gibson Security earlier this week released the API for the Snapchat application along with two exploits. One exploit lets hackers match phone numbers with Snapchat users' names en masse; the other enables hackers to create hu...

For the third time in three years, computers at The Washington Post came under attack by hackers, but this time it seems the paper was ready for them. The intrusion targeting the usernames and passwords of Post employees was relatively short in duration -- a few days, at most. No subscriber informat...

SPOTLIGHT ON SECURITY

Jailbroken Phones Targeted by Hacker Jammers

Smartphones hacked to run unauthorized programs or unlock features are being targeted by hackers and can pose a threat to enterprise networks, warned Marble Security. Modifying a smartphone to enable unauthorized behavior -- called "rooting" in the Android world and "jailbreaking" in the iOS realm...

EXPERT ADVICE

A Cybersecurity Strategy for Citizens

The era of Big Data has scary implications for both personal privacy and national security and puts our society at significant risk. The impact of a cyberattack on a large financial institution or a security breach at a government's secure data house, for example, would have dire consequences. As a ...

The United States National Security Agency reportedly is using at least one type of Google cookie -- PREF, which stores a user's preferences -- to home in on the PCs of targets it wants to hack. NSA's Special Source Operations division, which works with private companies to slurp data from the Inter...

Scientists in China will use the country's Tianhe-1A supercomputer to forecast and analyze smog in major cities. The Tianhe-1A will be used to create a simulation that will collate data from across more than 100 Chinese cities. Theoretically, this will enable scientists to predict the density of smo...

SPOTLIGHT ON SECURITY

Malware Drop, Ransomware Rise Forecast for 2014

A malware decline and ransomware rise are in the security crystal ball for 2014. There will be less malware spreading through networks next year as hackers focus on obtaining credentials that allow them to access systems under the guise of authentic users. "Malware will still be important in estab...

How to Encrypt Your Email

Some years ago, an antinuclear activist named Phil Zimmermann created a data encryption program for computers. He designed a key-generation and encryption-and-decryption system called "PGP," or Pretty Good Privacy, for the bulletin board systems that were the precursors to forums, email and the Web....

Following news that Amazon plans to use unmanned drones for rapid delivery of goods to customers, security researcher Samy Kamkar has developed a way to skyjack drones. The hack may resonate with many Americans, who are concerned about the increasing use of drones by law enforcement to conduct sur...

TECH TREK

China Flies Jade Rabbit Rover to the Moon

China has launched a rover that is en route to the surface of the moon, marking the first time the Middle Kingdom has embarked on a moon-bound rover mission. The rover, called "Jade Rabbit," is affixed to a rocket that launched at 1:30 a.m. Monday morning local time. If all goes to plan, it is expec...

SPOTLIGHT ON SECURITY

Potential for Abuse Stalls Cellphone Kill Switch Debate

Law enforcement officials and mobile phone makers last week knocked heads with wireless carriers over planting "kill switches" in smartphones. Led by San Francisco's DA and New York's AG, law enforcement wants smartphones to contain firmware that allows a consumer to "brick" a mobile that's lost or ...

TECH TREK

Global Cyberheist Reels In $45M

Six people have been arrested for their involvement in a worldwide ATM heist that resulted in the theft of $45 million from two Middle East banks. Five men and one woman, all from the suburbs of New York City, were charged with being members of a cybercrime outfit that lifted debit card information ...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

Technewsworld Channels