Bookmark

Add to MyYahoo RSS

Computer Security News

News on Computer Security continually updated from thousands of sources around the net.

13 min ago | InfoWorld

Why retailers like Home Depot get hacked

Retailers like Home Depot, which recently suffered a major data breach, have known for years about vulnerabilities in payment systems, but have chosen to ignore them, experts say. Home Depot decided only in January to buy technology that fully encrypts payment card data the moment a card is swiped, The Wall Street Journal reported Monday.

Comment?

Related Topix: Science / Technology

13 min ago | InfoWorld

5 reasons why hackers own your organization

The Target and Home Depot breaches should've been wake-up calls. Instead, the bad guys remain free to wreak havoc everywhere Last week I noted that most companies are either already hacked or could easily be hacked -- and, when they have anything worth stealing, are probably already owned by multiple APT groups.

Comment?

Related Topix: Science / Technology

3 hrs ago | Lowell Sun

Get your head out of that cloud

Google was hacked? I didn't say, "I told you so." However, I frequently don't have good reviews of Google or any cloud services.

Comment?

Related Topix: Google, Startups, Science / Technology

7 hrs ago | Computing.co.uk

JP Morgan denies that system blueprints were stolen in June cyber attack

More details have emerged about the attack on banking giant JP Morgan, which saw sensitive banking systems hacked and details about clients and deals apparently transmitted to systems in Russia. According to the latest disclosures, the hackers were able to access information about one million customer accounts and also obtained a list of the software applications installed on the bank's computers.

Comment?

Related Topix: Science / Technology

9 hrs ago | WWLP

Computer security hole puts kids at risk

Two computer experts have discovered a way for strangers to get your personal information using a security hole that could leave you and your children vulnerable. Bryan Seely and Ben Caudill say they've discovered one of the biggest potential security holes of the modern era, one that can leave your data and those of your kids exposed to any hacker willing to find it.

Comment?

Related Topix: Science / Technology, Kids, Family

Mon Sep 15, 2014

ComputerWorld

Internet-enabled objects add to security risks

The Internet of Things will create additional security risks for businesses and consumers, according to network security experts at the APNIC 38 conference in Brisbane. Eric Vyncke, an engineer with Cisco, said the extent of damage caused by hacking an IoT device can range from minor to devastating.

Comment?

Related Topix: Science / Technology

NewsFactor

NSA Plans To Map Entire Internet

The National Security Agency is hacking into corporate servers and attacking global ISPs as part of its effort to map off the entire Internet according to a report Sunday in Der Spiegel, a German daily, citing new documents leaked by NSA whistleblower Edward Snowden. The spy agency is also placing under surveillance the CEOs and other employees at telecom companies it considers vital to the infrastructure of the Internet, the documents reportedly reveal.

Comment?

Related Topix: Science / Technology, Europe, World News, Germany, Computers

Ars Technica

Hacker exploits printer Web interface to install, run Doom

Doom on a printer's menu screen! Personally, we can't wait until someone makes Descent playable on a toaster. On Friday, a hacker presenting at the 44CON Information Security Conference in London picked at the vulnerability of Web-accessible devices and demonstrated how to run unsigned code on a Canon printer via its default Web interface.

Comment?

Related Topix: id Software, Bethesda Softworks, Doom, Video Games

The Daily Caller

Docs: Obama Admin Knew HealthCare.gov Was Vulnerable To Malicioius Attacks And Launched Anyway

Top Obama administration officials knew just how vulnerable HealthCare.gov was to malicious security breaches when it launched, leaving data at risk to hackers that have already breached the website at least once. According to documents obtained by government oversight nonprofit Judicial Watch, Centers for Medicare and Medicaid Services officials knew about the depth of HealthCare.gov's security problems but didn't stop to fix them before the launch, as many reports have previously indicated.

Comment?

Related Topix: Science / Technology, Health, Medicaid, US News, Conservative Political News

Information Technology

Belden Research Reveals Dragonfly Malware Likely Targets Pharmaceutical Companies

Belden Inc. , a global leader in signal transmission solutions for mission-critical applications, today releases new research that shows the recently revealed Dragonfly malware is likely targeting the pharmaceutical sector, not the energy sector as previously believed. Until now, advanced cyberattacks against industry have focused on the critical energy and chemical sectors.

Comment?

Related Topix: Belden, Science / Technology

Insurance Journal West

How Cybercriminals Attack Small Businesses - and 10 Ways to Stop Them

At a recent "Hacker Lab" event, "white hat" hackers revealed how cybercriminals work - and what businesses can do to protect themselves. The multimedia presentation used a simulated small business system to demonstrate how hackers choose their targets, how they enter the system and what they do post-infiltration.

Comment?

Related Topix: Small Business, Personal Finance

Finextra Research news

Nigerian bank falls victim to $40 million insider cyber-heist

Nigerian police are on the hunt for an IT staffer at Skye Bank who hacked into the bank's systems and transferred $40 million to a raft of bogus accounts before going on the run. Thirty-eight year old Isoko resident Godswill Oyegwa Uyoyou is alleged to have conspired with a criminal gang to access the bank's computer system and inflate the balances of various accounts.

Comment?

Related Topix: Science / Technology

ABC News

3 Ways Your Kids Can Get You Hacked

Last month a story in the Wall Street Journal article sent a shudder down our collective parental spine. Google is planning to open Gmail and YouTube to kids under the age of 13. While the company will restrict this king's ransom of new clicks to kid-friendly content, hackers could well have a field day.

Comment?

Related Topix: Family, Kids, Google, Startups, Science / Technology

Sun Sep 14, 2014

Forbes.com

Here's What Hackers Can Do With Your CRM Data

It is obvious, if not pathetic, why hackers break into the cloud to find and publish private nude photos of celebrities. CRM data may not seem to be the low hanging fruit of, say, a nationwide sweep of Home Depot customer accounts, but a closer look suggests it is - and possibly even more lucrative for hackers.

Comment?

Related Topix: Science / Technology, Salesforce, Business News

Finextra Research news

6 Ways to Protect your Internet of Things from Hackers - community blog from Robert Siciliano

Everything seems like it is connected to the Internet, just about, including TVs, home thermostats, sprinkler controls, door locks, egg trays , tooth brushes , and more. A study by HP shows that 70 percent of devices have vulnerabilities.

1 comment

Related Topix: Laptops/Notebooks, Emerging Technology, Wireless

Mirror.co.uk

Stunning model Joy Corrigan's anger at nude pics being hacked before Jennifer Lawrence scandal

Before Jennifer Lawrence's nude pics were hacked, model Joy says her private photographs were stolen despite her raising concerns with Apple Glamour model Joy Corrigan has hit out at Apple after she says she warned them about a threat to her private pictures. Joy, 20, who posts some pretty racy pictures on her own Instagram page, is not happy that her privacy has been violated by hackers.

Comment?

Related Topix: Instagram, iPod touch App, iPad App, iPhone and iPad App, iPhone App

The Columbus Dispatch

How to keep your private photos safe from hackers

The E-Edition includes all of the news, comics, classifieds and advertisements of the newspaper. And it's available to subscribers before 6 a.m. every day.

Comment?

Related Topix: Science / Technology, The Hunger Games, Jennifer Lawrence, iCloud

NewsFactor

Hackers Crack Healthcare.gov

Healthcare.gov has been hacked. The U.S. Department of Health and Human Services has confirmed that part of the site was breached in July by hackers who uploaded malware to a test server.

Comment?

Related Topix: Science / Technology, Medicaid, Health, Medicare, US Politics, US News, Republican, US House of Representatives, Darrell Issa

Sat Sep 13, 2014

9Down.Com

Exosyphen Studios Hacker Evolution v3.12-OUTLAWS

You play the role of a former intelligence agent, specializing in computer security. When a chain of events sets off worldwide, leaving critical service disabled, you assume the role a computer hacker to find out what happened and attempt to stop it.

Comment?

Related Topix: Hacker Evolution, exoSyphen Studios, Video Games, Science / Technology

Vallejo Times-Herald

Apple's new products ratchet up need for privacy protections

Apple's release of the Apple Watch and iPhone6 makes it clear that Silicon Valley's future will be directly tied to its ability to protect tech users' privacy. Securing Americans' personal information in an increasingly tech-dominated world has to be a higher priority for tech leaders and the valley's congressional and legislative delegations.

Comment?

Related Topix: iPhone, Opinion

•••
•••
•••
•••

Computer Security Jobs

•••
•••
•••
•••