Hacking

Adobe on Thursday announced what has become depressingly familiar news to consumers and security experts: It has been hacked, and on a large scale. "Very recently, Adobe's security team discovered sophisticated attacks on our network, involving the illegal access of customer information as well as s...

SPOTLIGHT ON SECURITY

Reengineering Human Behavior Can Foil Phishing

Almost all cyberattacks these days require an element of social engineering. Spammers are always looking for that hot button to induce a click on a link or an attachment. Drive-by artists continually experiment with poisoned banner ads designed to steer the curious into an online dark alley. Spearph...

The Chaos Computing Club, a group of German hackers, claimed to have cracked Apple's new iPhone fingerprint scanner. The scanner is one of the distinguishing features of Apple's new iPhone 5S. It was not immediately clear whether CCC's claims were true, but two prominent iPhone security experts repo...

Microsoft revealed Tuesday it was investigating a previously unknown security flaw affecting all versions of its Internet Explorer Web browser. Hackers have attempted to exploit the vulnerability in targeted attacks on users of versions 8 and 9 of the browser, the company reported in a security advi...

Symantec on Tuesday disclosed the existence of a group of 50 to 100 top-rate hackers. Named "Hidden Lynx," the group is an advanced persistent threat that has skills well ahead of similar organizations in the region, such as APT1, Symantec said. "The Hidden Lynx group is methodical in its approach a...

SPOTLIGHT ON SECURITY

Web App Firewalls Blunt Attacks

Web applications have become attractive targets for hackers because they allow bad actors to maximize the reach of their mischief with a minimum of effort. That's what originally attracted the Internet underworld to programs like Windows and Adobe Acrobat, and it's what continues to attract them to ...

The combination of the polymorphic nature of malware, failure of signature-based security tools, and massive amounts of data and traffic flowing in and out of enterprise networks is making threat management using traditional approaches virtually impossible. Until now, security has been based largely...

TECH TREK

Huawei Blasts US for Illegal NSA Spying

Chinese telecommunications firm Huawei is taking a PR victory lap following reports suggesting that the National Security Agency spied on the company. Earlier this week, Brazilian TV network Globo revealed a raft of documents that purportedly came from Edward Snowden. The files implicate the NSA, al...

News that the U.S. National Security Agency has worked steadily for at least the past decade to systematically undermine security has sparked an uproar on the Internet. The agency -- whose motto is "Defending Our Nation. Securing the Future" -- reportedly has circumvented or cracked much of the en...

Ministry of Sound, a London night club and dance music brand, is suing music streaming service Spotify for copyright infringement. Ministry of Sound claims that Spotify has refused to delete users' playlists that copy Ministry of Sound compilation albums, some of which contain "Ministry of Sound" in...

SPOTLIGHT ON SECURITY

No End to the Headaches Endpoints Give System Defenders

If there's one attack surface that's attracting growing attention from digital marauders, it's a system's endpoints. With the proliferation of BYOD, securing connections can be a defender's nightmare. Endpoints have an allure for attackers because they offer multiple attack vectors, such as social e...

The Syrian Electronic Army -- widely suspected of being comprised of pro-Syrian government hacktivists -- on Tuesday hijacked The New York Times' website and briefly took over Twitter's domain name system servers. The SEA's main motive is to gain visibility for its cause, said Jaeson Schultz, a Cisc...

TECH TREK

BBM May Leave the Nest

BlackBerry is looking to spin off its BlackBerry Messenger service into a separate business so as to compete with other instant messaging apps. The company announced back in May that it would make BBM, once available only on BlackBerry devices, available to devices running on iOS and Android as well...

Nokia sent a letter to India's commerce ministry threatening to leave the country because of Indian taxes. The letter said that the "political risk" in India was increasing due to tax claims from the government. India's passage in March of a retroactive income tax violates a bilateral treaty between...

Chinese websites with the ".cn" domain name extension fell on Sunday to a distributed denial of service, or DDoS, attack, the state-run China Internet Network Information Center reported. Two attacks reportedly were launched -- the first at midnight on Sunday and the second at 4 p.m. China's Ministr...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

Technewsworld Channels