Hacking

The gang behind Operation Aurora, a coordinated attack that hit Google and tens of other large United States corporations, is alive, well and hacking away, Symantec said. Over the last three years, the gang has used lots of zero-day attacks against not just defense corporations, but also the manufac...

The hacktivist group Anonymous has published 1 million universally unique identifiers belonging to Apple devices. These were among more than 12 million UDIDs stolen from the laptop of FBI Special Agent Christopher K. Stangl, the group said. Anonymous deleted personal data, including the names, mobil...

SPOTLIGHT ON SECURITY

The Honan Affair and the Cloud’s Dark Lining

The attack last week on journalist Mat Honan's iCloud account has the potential to strip the silver lining from the cybernimbus. Honan had his digital life destroyed when hackers, in a convoluted effort to hijack his Twitter account, ended up trashing everything connected to his Apple iCloud account...

Hackers have hit Blizzard's Battle.net online gaming network, stealing users' email addresses, the answers to their personal security questions, and information relating to mobile and dial-in authenticators. The intruders hit the company's North American servers, which support players in North Ameri...

The fallout from the Flame malware that was identified in May continues. Ongoing research into the malware has led antivirus vendor Kaspersky Lab to discover a new malware platform, which it has named "Gauss." This platform has several similarities to Flame, Kaspersky said. "There's no doubt Gauss c...

As digital horror stories go, Mat Honan's is a doozy. The Wired reporter had his iCloud account hacked and had his digital life wiped from cyberspace. Honan's attackers used a combination of tech savvy and social engineering. They used his public LinkedIn page to obtain his Gmail address. Then they ...

In the movies, hackers often type away at a keyboard and somehow -- movie magic, perhaps -- manage to crack a network's security and access encrypted files and protected data. In real life, bypassing security measures can be as simple as sweet-talking tech support. That is how tech journalist Mat Ho...

SPOTLIGHT ON SECURITY

Can the Cloud Shield Google Wallet From Pickpockets?

Some folks' answer to wallet security is chaining it to their belts. Google's is to chain it to the cloud. The Search Giant added some security features to its Google Wallet product last week intended to make it safer for consumers to use. For example, credit card information no longer resides in th...

Dropbox says reused passwords are to blame for a wave of spam that's hitting subscribers to the service. The company found that usernames and passwords recently stolen from other websites were used to sign in to some Dropbox accounts. One of these accounts belonged to a Dropbox employee, and it cont...

It has been a heck of a year for password/password hash disclosures. In the same week in June, millions of password hashes were disclosed from LinkedIn, eHarmony and Last.fm. And in the same week in July, more than 450,000 usernames and unencrypted passwords were reportedly stolen from Yahoo Voice, ...

The deluge of spam dropped on members of LinkedIn last week perhaps could have been expected after a data breach at the site exposed 6.5 million of their passwords. Those messages, though, are more likely to harm members unaffected by the breach than those victimized by it. That's because members wh...

Google has begun informing certain individual users whom it believes may be the target of state-sponsored cyberattacks. Those users will see a pink ribbon at the top of their Google pages bearing a warning notice. However, the warning only means Google believes the account holder may be a target for...

SPOTLIGHT ON SECURITY

Information Highwaymen Will Follow the Cybermoney

An FBI report about Bitcoin leaked to a number of online media outlets earlier this month caused anxiety in some corners of the Internet. Bitcoin "provides a venue for individuals to generate, transfer, launder, and steal illicit funds with some anonymity," says the 20-page report. "Bitcoin will lik...

SPOTLIGHT ON SECURITY

What Evil Lurks in the Hearts of Hactivists?

Nearly two-thirds (64 percent) of IT pros believe their organizations will be the target of a cyberattack in the next six months, and three out of five (61 percent) say the attack will come from hactivists. That was one of the findings in cybersecurity firm Bit9's annual security survey released las...

SPOTLIGHT ON SECURITY

Did Google’s Wardriving Ways Give It a Competitive Edge?

Last week, the U.S. Federal Communications Commission let Google off with a tap on the wrist for hindering the commission's efforts to investigate allegations that Google was slurping information from WiFi networks with its fleet of mapping vehicles.The search giant's punishment -- a $25,000 fine le...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

Technewsworld Channels