Add to MyYahoo RSS

Computer Security News

News on Computer Security continually updated from thousands of sources around the net.

1 hr ago | SFGate

Texas man gets probation in revenge porn case

A Texas man has pleaded guilty to seeking revenge on his ex-girlfriend by emailing out videos of them having sex.


Related Topix: Science / Technology, Tarrant County, TX

Thu Jul 31, 2014


Hospitals open to hackers, 94% of hospitals targeted

Electronic medical records let doctors have all of your patient information at their fingertips, but they may also allow hackers the same privilege.


Related Topix: Science / Technology, Medicine

WUSA-TV Washington

Police: Cyber attack compromised credit card info in MD

Police: Cyber attack compromised credit card info in MD A recent cyber attack targeted credit-card processing companies, including one with contracts in Maryland.


Related Topix: Science / Technology, Ocean City, MD

Target taps former PepsiCo exec as CEO

Cornell, 55, also will become chairman, the Minneapolis- based company said today in a statement.


Related Topix: Beverages, PepsiCo, Retail, Target, Science / Technology

The Globe and Mail

Canada's claims of NRC hacking 'irresponsible,' Beijing says

China's foreign ministry accused Canada on Thursday of making irresponsible accusations lacking any credible evidence after Canada singled out Chinese hackers for attacking a key computer network and lodged a protest with Beijing.


Related Topix: North America, Canada, World News, Travel, Asia Travel, Beijing, China Travel, China Travel, Science / Technology, Computers

The Toronto Star

Ottawa warned about its vulnerability to hackers, lack of strategy

A software vulnerability forced the shutdown of Canada Revenue Agency's electronic tax filing system in April.


Related Topix: Science / Technology, Science, Computer Science, CIO News, Canada,


Hackers can tap USB devices in new attacks, researcher warns

USB devices such as mice, keyboards and thumb-drives can be used to hack into personal computers in a potential new class of attacks that evade all known security protections, a top computer researcher revealed on Thursday.


Related Topix: Computers, Science / Technology, Keyboards, Mice, Cellphones

Wed Jul 30, 2014

Dallas Morning News

Hackers exploit remote access to enter systems

The same tools that help millions of Americans work from home are being exploited by cybercriminals to break into the computer networks of retailers like Dallas-based Neiman Marcus and Target.


Related Topix: Science / Technology, Dallas, TX, Microsoft


Hackers have compromised the once anonymous Tor network

The Tor anonymous encryption service offers internet users a way to surf the web with anonymity and prides itself on the level of security it offers.


Related Topix: Science / Technology

Network World

Tor hints at possible U.S. government involvement in recent attack

Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.


Related Topix: Science / Technology

The Inquirer

Video games industry is fighting an advanced cyber attack campaign

THE VIDEO GAMES INDUSTRY is at the mercy of a large scale advanced cyber attack campaign designed to steal source code, Dell's security arm Secureworks has revealed .


Related Topix: Science / Technology, SecureWorks, Software

Brandon Sun

National Research Council only the most recent victim of computer hacking

The recent cyber attack against Canada's National Research Council was not first time that foreign and domestic entities have been accused of illegally infiltrating Canadian corporate or government computers.


Related Topix: Science / Technology


Internet of Things devices open up new avenues for hackers

We're constantly being told that the internet of things is set to revolutionize the world we live in.


Related Topix: Science / Technology

The Washington Post

Hackers disrupt Kenyaa s march to e-goverment

In its latest attack, Anonymous cell Anon_0x03 on July 27 cracked, took control and used Kenya Deputy President William Ruto's Twitter account to tweet a list of government websites it had hacked.


Related Topix: World News, Kenya, Africa, Science / Technology, Twitter, Travel

Tue Jul 29, 2014


iPhone gets first free app for encrypting voice calls

An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.


Related Topix: iPhone, Science / Technology


.com | Israel's Iron Dome makers hit by China hackers

Aviation has suffered one of its worst weeks in memory, but industry analysts and safety experts say they can find no common themes.


Related Topix: Science / Technology, Columbia, MD

China Digital Times

Hackers Hit HK Media, Democracy Movement

As advocacy groups note Beijing's increasing influence over the media in Hong Kong , and after recent violent attacks against Hong Kong journalists , the Hong Kong Journalists Association declared the past year the " darkest for press freedom" in several decades .


Related Topix: Science / Technology, PC

Microwave hacked into weapon, used to blow up a stereo

There are some things in this world you're better off not trying, and dismantling a microwave to make a stick-mounted weapon is probably one of them.


Related Topix: Science / Technology

MSN Money

Is this the death of passwords?

Is it possible that your next password might be as simple and subtle as the way you type or hold your smartphone? If you hate trying to fill out those CAPTCHA forms with Secrets are used to keep our stuff safe on computers; for nearly three decades now, that secret has chiefly been a password, or in security lingo, "something you know."


Related Topix: Science / Technology, Marketing

Wall Street and Tech

Shore Up Cyber Security Now

Knowing that a data breach can and will happen at some point, asset management firms can manage new operational and regulatory risk with a layered approach to cyber security.


Related Topix: Science / Technology


Computer Security Jobs