Computer Security News
News on Computer Security continually updated from thousands of sources around the net.
1 hr ago | Sky News
Security researchers have uncovered a group of hackers that broke into 300 banks, corporations and governments for 12 years without being caught. The hacker collective from Germany exploited a loophole in the UK which enabled them to obtain security certificates to allow them to target organisations in Germany, Switzerland and Austria and access sensitive, confidential data.
2 hrs ago | The Washington Post
Senate investigators are blaming China for nearly two dozen successful hacker break-ins of computer networks belonging to Pentagon contractors. A yearlong investigation announced Wednesday by the Senate Armed Services Committee identified at least 50 intrusions since 2012 against unspecified contractors working for the U.S. Transportation Command, or Transcom.
3 hrs ago | Hollywood Reporter
Only half of the model-actress and pitcher Justin Verlander's private photos are removed from indexes as the search engine grapples with legal theories over "selfies," copyright and fair use When hackers grabbed naked photos of Jennifer Lawrence , Kate Upton and other celebrities this summer, Apple faced harsh criticism for allowing its iCloud security protocol to be breached. Thus far, Google has escaped the microscope.
Customers cringe every time they hear about a bank, retail or healthcare hack that puts personal or financial data at risk. Today's hackers are after much more that credit card numbers, though -- and most firms are powerless to stop them.
Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's software vendor. In its first public statement since being identified by Goodwill as its technology partner, C&K Systems of Murrells Inlet, South Carolina, said two other customers were also affected by the unauthorized access, though it didn't name them.
Apple is making good on CEO Tim Cook's promise to beef up iCloud security in the wake of the recent celebrity photo hack . Now, if you log into iCloud on a web browser, you will be prompted for a code if you have enabled two-factor authentication on your Apple account.
Amazon is being forced to investigate a "security hole" that could let hackers gain access to customers' accounts via Kindle e-books. The security flaw affects Kindle users who downloaded hacked e-books containing a certain script in the title, the Digital Reader reports .
Retailers like Home Depot, which recently suffered a major data breach, have known for years about vulnerabilities in payment systems, but have chosen to ignore them, experts say. Home Depot decided only in January to buy technology that fully encrypts payment card data the moment a card is swiped, The Wall Street Journal reported Monday.
The Target and Home Depot breaches should've been wake-up calls. Instead, the bad guys remain free to wreak havoc everywhere Last week I noted that most companies are either already hacked or could easily be hacked -- and, when they have anything worth stealing, are probably already owned by multiple APT groups.
Google was hacked? I didn't say, "I told you so." However, I frequently don't have good reviews of Google or any cloud services.
More details have emerged about the attack on banking giant JP Morgan, which saw sensitive banking systems hacked and details about clients and deals apparently transmitted to systems in Russia. According to the latest disclosures, the hackers were able to access information about one million customer accounts and also obtained a list of the software applications installed on the bank's computers.
The Internet of Things will create additional security risks for businesses and consumers, according to network security experts at the APNIC 38 conference in Brisbane. Eric Vyncke, an engineer with Cisco, said the extent of damage caused by hacking an IoT device can range from minor to devastating.
The National Security Agency is hacking into corporate servers and attacking global ISPs as part of its effort to map off the entire Internet according to a report Sunday in Der Spiegel, a German daily, citing new documents leaked by NSA whistleblower Edward Snowden. The spy agency is also placing under surveillance the CEOs and other employees at telecom companies it considers vital to the infrastructure of the Internet, the documents reportedly reveal.
Doom on a printer's menu screen! Personally, we can't wait until someone makes Descent playable on a toaster. On Friday, a hacker presenting at the 44CON Information Security Conference in London picked at the vulnerability of Web-accessible devices and demonstrated how to run unsigned code on a Canon printer via its default Web interface.
Top Obama administration officials knew just how vulnerable HealthCare.gov was to malicious security breaches when it launched, leaving data at risk to hackers that have already breached the website at least once. According to documents obtained by government oversight nonprofit Judicial Watch, Centers for Medicare and Medicaid Services officials knew about the depth of HealthCare.gov's security problems but didn't stop to fix them before the launch, as many reports have previously indicated.
Belden Inc. , a global leader in signal transmission solutions for mission-critical applications, today releases new research that shows the recently revealed Dragonfly malware is likely targeting the pharmaceutical sector, not the energy sector as previously believed. Until now, advanced cyberattacks against industry have focused on the critical energy and chemical sectors.
At a recent "Hacker Lab" event, "white hat" hackers revealed how cybercriminals work - and what businesses can do to protect themselves. The multimedia presentation used a simulated small business system to demonstrate how hackers choose their targets, how they enter the system and what they do post-infiltration.
Updated: Wed Sep 17, 2014 09:00 am
Copyright © 2014 Topix LLC