Computer Security News
News on Computer Security continually updated from thousands of sources around the net.
31 min ago | Dallas Morning News
The same tools that help millions of Americans work from home are being exploited by cybercriminals to break into the computer networks of retailers like Dallas-based Neiman Marcus and Target.
4 hrs ago | TechSpot
The Tor anonymous encryption service offers internet users a way to surf the web with anonymity and prides itself on the level of security it offers.
8 hrs ago | Network World
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.
12 hrs ago | The Inquirer
THE VIDEO GAMES INDUSTRY is at the mercy of a large scale advanced cyber attack campaign designed to steal source code, Dell's security arm Secureworks has revealed .
14 hrs ago | Brandon Sun
The recent cyber attack against Canada's National Research Council was not first time that foreign and domestic entities have been accused of illegally infiltrating Canadian corporate or government computers.
18 hrs ago | BetaNews
We're constantly being told that the internet of things is set to revolutionize the world we live in.
An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.
Aviation has suffered one of its worst weeks in memory, but industry analysts and safety experts say they can find no common themes.
As advocacy groups note Beijing's increasing influence over the media in Hong Kong , and after recent violent attacks against Hong Kong journalists , the Hong Kong Journalists Association declared the past year the " darkest for press freedom" in several decades .
There are some things in this world you're better off not trying, and dismantling a microwave to make a stick-mounted weapon is probably one of them.
Is it possible that your next password might be as simple and subtle as the way you type or hold your smartphone? If you hate trying to fill out those CAPTCHA forms with Secrets are used to keep our stuff safe on computers; for nearly three decades now, that secret has chiefly been a password, or in security lingo, "something you know."
Knowing that a data breach can and will happen at some point, asset management firms can manage new operational and regulatory risk with a layered approach to cyber security.
Keith Alexander, the former director of the National Security Administration, is filing for tech security patents related to his work running the NSA.
High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.
A new flaw in the Android mobile operating system leaves the personal and financial details of users since 2010 at risk to hacking, a mobile analytics firm has claimed.
As more and more transactions take place online and on mobile devices, companies are spending buckets of time trying to make sure their clients money-matters are secure.
Chinese hackers have infiltrated the computer systems at the National Research Council, forcing it to shut down its IT network for an extended period, the federal government revealed Tuesday.
But the Treasury Board says the NRC's computers have been isolated from the rest of the government's systems as a precaution.
Updated: Wed Jul 30, 2014 10:22 pm
Copyright © 2014 Topix LLC