Bookmark

Add to MyYahoo RSS

Computer Security News

News on Computer Security continually updated from thousands of sources around the net.

1 hr ago | Sky News

Hackers 'Swooped' On Biological Warfare Study

Security researchers have uncovered a group of hackers that broke into 300 banks, corporations and governments for 12 years without being caught. The hacker collective from Germany exploited a loophole in the UK which enabled them to obtain security certificates to allow them to target organisations in Germany, Switzerland and Austria and access sensitive, confidential data.

Comment?

Related Topix: Science / Technology, Physics, Science

2 hrs ago | The Washington Post

Senate: China hacked military contractor networks

Senate investigators are blaming China for nearly two dozen successful hacker break-ins of computer networks belonging to Pentagon contractors. A yearlong investigation announced Wednesday by the Senate Armed Services Committee identified at least 50 intrusions since 2012 against unspecified contractors working for the U.S. Transportation Command, or Transcom.

Comment?

Related Topix: Science / Technology, World News

3 hrs ago | Hollywood Reporter

What Kate Upton's Nude Photo Hack Reveals About Google

Only half of the model-actress and pitcher Justin Verlander's private photos are removed from indexes as the search engine grapples with legal theories over "selfies," copyright and fair use When hackers grabbed naked photos of Jennifer Lawrence , Kate Upton and other celebrities this summer, Apple faced harsh criticism for allowing its iCloud security protocol to be breached. Thus far, Google has escaped the microscope.

Comment?

Related Topix: Emerging Technology, Search Engines, Kate Upton, Internet, Science / Technology, iCloud

8 hrs ago | CIO

New NSA-Funded Programming Language Could Close Long-Standing Security Holes

According to Steve McConnell, author of "Code Complete", software development projects that reach 512,000 lines of code or more can see four to 100 coding errors per thousand lines of code. Coding errors create the software vulnerabilities that criminal hackers attack in order to enter and pillage the enterprise.

Comment?

Related Topix: Science / Technology, Programming Languages, Carnegie Mellon University, Science, Computer Science

Tue Sep 16, 2014

CIO

Today's Security Hacks Are After More Than Bank Info

Customers cringe every time they hear about a bank, retail or healthcare hack that puts personal or financial data at risk. Today's hackers are after much more that credit card numbers, though -- and most firms are powerless to stop them.

Comment?

Related Topix: Science / Technology, Banking, JP Morgan Chase

Network World

Hackers accessed Goodwill hosting provider for 18 months before card breach

Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's software vendor. In its first public statement since being identified by Goodwill as its technology partner, C&K Systems of Murrells Inlet, South Carolina, said two other customers were also affected by the unauthorized access, though it didn't name them.

Comment?

Related Topix: Science / Technology, Murrells Inlet, SC

Mashable

Apple Strengthens iCloud Security in Wake of Celeb Nude Photo Hack

Apple is making good on CEO Tim Cook's promise to beef up iCloud security in the wake of the recent celebrity photo hack . Now, if you log into iCloud on a web browser, you will be prompted for a code if you have enabled two-factor authentication on your Apple account.

Comment?

Related Topix: Science / Technology, iCloud

Los Angeles Times

Security flaws affect Amazon's Kindle e-books and Audible audiobooks

Amazon is being forced to investigate a "security hole" that could let hackers gain access to customers' accounts via Kindle e-books. The security flaw affects Kindle users who downloaded hacked e-books containing a certain script in the title, the Digital Reader reports .

Comment?

Related Topix: Science / Technology

InfoWorld

Why retailers like Home Depot get hacked

Retailers like Home Depot, which recently suffered a major data breach, have known for years about vulnerabilities in payment systems, but have chosen to ignore them, experts say. Home Depot decided only in January to buy technology that fully encrypts payment card data the moment a card is swiped, The Wall Street Journal reported Monday.

Comment?

Related Topix: Science / Technology

InfoWorld

5 reasons why hackers own your organization

The Target and Home Depot breaches should've been wake-up calls. Instead, the bad guys remain free to wreak havoc everywhere Last week I noted that most companies are either already hacked or could easily be hacked -- and, when they have anything worth stealing, are probably already owned by multiple APT groups.

Comment?

Related Topix: Science / Technology

Lowell Sun

Get your head out of that cloud

Google was hacked? I didn't say, "I told you so." However, I frequently don't have good reviews of Google or any cloud services.

Comment?

Related Topix: Google, Startups, Science / Technology

Computing.co.uk

JP Morgan denies that system blueprints were stolen in June cyber attack

More details have emerged about the attack on banking giant JP Morgan, which saw sensitive banking systems hacked and details about clients and deals apparently transmitted to systems in Russia. According to the latest disclosures, the hackers were able to access information about one million customer accounts and also obtained a list of the software applications installed on the bank's computers.

Comment?

Related Topix: Science / Technology

WWLP

Computer security hole puts kids at risk

Two computer experts have discovered a way for strangers to get your personal information using a security hole that could leave you and your children vulnerable. Bryan Seely and Ben Caudill say they've discovered one of the biggest potential security holes of the modern era, one that can leave your data and those of your kids exposed to any hacker willing to find it.

Comment?

Related Topix: Science / Technology, Kids, Family

Mon Sep 15, 2014

ComputerWorld

Internet-enabled objects add to security risks

The Internet of Things will create additional security risks for businesses and consumers, according to network security experts at the APNIC 38 conference in Brisbane. Eric Vyncke, an engineer with Cisco, said the extent of damage caused by hacking an IoT device can range from minor to devastating.

Comment?

Related Topix: Science / Technology

NewsFactor

NSA Plans To Map Entire Internet

The National Security Agency is hacking into corporate servers and attacking global ISPs as part of its effort to map off the entire Internet according to a report Sunday in Der Spiegel, a German daily, citing new documents leaked by NSA whistleblower Edward Snowden. The spy agency is also placing under surveillance the CEOs and other employees at telecom companies it considers vital to the infrastructure of the Internet, the documents reportedly reveal.

Comment?

Related Topix: Science / Technology, Europe, World News, Germany, Computers

Ars Technica

Hacker exploits printer Web interface to install, run Doom

Doom on a printer's menu screen! Personally, we can't wait until someone makes Descent playable on a toaster. On Friday, a hacker presenting at the 44CON Information Security Conference in London picked at the vulnerability of Web-accessible devices and demonstrated how to run unsigned code on a Canon printer via its default Web interface.

Comment?

Related Topix: id Software, Bethesda Softworks, Doom, Video Games

The Daily Caller

Docs: Obama Admin Knew HealthCare.gov Was Vulnerable To Malicioius Attacks And Launched Anyway

Top Obama administration officials knew just how vulnerable HealthCare.gov was to malicious security breaches when it launched, leaving data at risk to hackers that have already breached the website at least once. According to documents obtained by government oversight nonprofit Judicial Watch, Centers for Medicare and Medicaid Services officials knew about the depth of HealthCare.gov's security problems but didn't stop to fix them before the launch, as many reports have previously indicated.

Comment?

Related Topix: Science / Technology, Health, Medicaid, US News, Conservative Political News

Information Technology

Belden Research Reveals Dragonfly Malware Likely Targets Pharmaceutical Companies

Belden Inc. , a global leader in signal transmission solutions for mission-critical applications, today releases new research that shows the recently revealed Dragonfly malware is likely targeting the pharmaceutical sector, not the energy sector as previously believed. Until now, advanced cyberattacks against industry have focused on the critical energy and chemical sectors.

Comment?

Related Topix: Belden, Science / Technology

Insurance Journal West

How Cybercriminals Attack Small Businesses - and 10 Ways to Stop Them

At a recent "Hacker Lab" event, "white hat" hackers revealed how cybercriminals work - and what businesses can do to protect themselves. The multimedia presentation used a simulated small business system to demonstrate how hackers choose their targets, how they enter the system and what they do post-infiltration.

Comment?

Related Topix: Small Business, Personal Finance

Finextra Research news

Nigerian bank falls victim to $40 million insider cyber-heist

Nigerian police are on the hunt for an IT staffer at Skye Bank who hacked into the bank's systems and transferred $40 million to a raft of bogus accounts before going on the run. Thirty-eight year old Isoko resident Godswill Oyegwa Uyoyou is alleged to have conspired with a criminal gang to access the bank's computer system and inflate the balances of various accounts.

Comment?

Related Topix: Science / Technology

•••
•••
•••

Computer Security Jobs

•••
•••
•••
•••