Bookmark

Add to MyYahoo RSS

Computer Security News

News on Computer Security continually updated from thousands of sources around the net.

50 min ago | Wired

Hacker Musician Turns E-Waste Into an Awesome Instrument

We tend to think of musical instruments in fixed terms: that's a guitar, this is a saxophone, that's a synthesizer.

Comment?

Related Topix: Science / Technology, Urbana, IL

5 hrs ago | DNA India

Over 30 financial institutions defrauded by phone apps used to intercept passwords

More than 30 financial institutions in six countries have been defrauded by sophisticated criminal software that convinces bank customers to install rogue smartphone programs, a major security company reported on Tuesday.

Comment?

Related Topix: Science / Technology, Trend Micro, Software

6 hrs ago | Switched

Phishing Alert: 8 Tips to Protect Yourself from Attacks

It's as easy for hackers to phish out your personal data as it is to sit in a canoe on a still pond, cast the bait and wait for the fish to bite.

Comment?

Related Topix: Science / Technology

9 hrs ago | Computing.co.uk

Snowden: hackers must make privacy tools for everybody

Edward Snowden has upped the ante in his war against government surveillance, addressing attendees of a hacking conference to join together in fighting snooping by building tools to help protect the public.

Comment?

Related Topix: Science / Technology

12 hrs ago | NewsFactor

Big DDoS Attacks Hit Record in 2014

NTP attacks provide hackers with the ability to generate high-volume DDoS traffic to target Web sites or public-facing devices in order to disrupt services.

Comment?

Related Topix: Science / Technology, Computers, Arbor Networks, Software

Mon Jul 21, 2014

The Age

'Anonymous' strikes Kenya defence ministry's Twitter account

Johannesburg: Hackers hijacked the Twitter accounts of Kenya's Ministry of Defence and its spokesman, sending out tweets Sunday and Monday about corruption and starving children.

Comment?

Related Topix: World News, Kenya, Africa, Science / Technology, Twitter

Fast Company

How Hackers Are Hijacking News Sites Using Bitly

Hackers are using the custom shortened links of real media outlets, including MSNBC and Fox News, to send readers to fake news sites instead.

Comment?

Related Topix: Science / Technology, Email Spam, Business News

Government Executive

Hackers Exploit MH17 Sorrow; Redirect Online Tributes to Malware

A man holds a sign which reads " MH17 Victims Rest In Peace" during a candlelight vigil for the victims who were on board the Malaysia Airlines jetliner.

Comment?

Related Topix: Science / Technology, Air Accidents

CIO

Stealthy ransomware 'Critroni' uses Tor, could replace Cryptolocker

Cybercriminals are spreading a new file-encrypting ransomware program that's more powerful and resilient than Cryptolocker, a threat recently shut down by the U.S. Department of Justice.

Comment?

Related Topix: US News, Economics News, Bitcoin, Science, Computer Science, Cryptography, Science / Technology

CNet News

'Zombie Zero' Cyber-Attacks Hit Logistics, Robotic Firms for Months

The supply-chain cyber-attack infiltrated logistics firms and robotics manufacturers for more than a year, according to new details provided by TrapX Security.

Comment?

The Washington Post

Kenya military Twitter account hacked

A military spokesman says the Twitter account run by Kenya's military has been taken over by hackers claiming to be from the activist collective Anonymous.

Comment?

Related Topix: Science / Technology, World News

Information Technology

SPYRUS Announces New Ruggedized Water Resistant Versions of Certified Windows To Go Live Drives

The drive can function in temperatures as low as 0C degrees or as high as 70C degrees, and function if accidentally submerged in water.

Comment?

Related Topix: Microsoft, Startups, Science, Computer Science, Weather, Cryptography, Science / Technology

Express India

Trend Micro builds safer mobile gaming experience in India

Trend Micro Inc has come together with mobile game developers from India and around Asia to set up the Safe Gaming Alliance.

Comment?

Related Topix: Trend Micro, Science / Technology, Software, Social Software

Bloomberg

Hackers Extorting With Stolen Photos Increasingly Common

The e-mail terrified the young mother. "What if I told you I had pics of you?" the unknown writer asked.

Comment?

Related Topix: Science / Technology, Criminal Defense Law, Law, Dover, NH, US News

Sun Jul 20, 2014

Linux

Domestic and Foreign Spying Threaten Cloud Data Security

If your organization's got a lot riding on the continued security of its confidential or proprietary data, then you need to stay informed on the threats and how to address them.

Comment?

Related Topix: Science / Technology, Cloud Computing, Science, Computer Science

BetaNews

Wilson's Weekend Whine: Snowden's call for online encryption is sad but necessary

It was quite a coup for HOPE . At the 2014 hacker event, Hope X, in New York City this weekend, Edward Snowden delivered a speech to those in attendance, advocating the use of encryption online.

Comment?

Related Topix: Science / Technology

CIO

Government-Grade Code Found in Criminal Malware

Cybercriminals have inserted government-grade malware into run-of-the-mill ransomware and online banking Trojans to bolster their ability to avoid detection and block tampering.

Comment?

Related Topix: Science / Technology

Russia Taday

Hacked WSJ page 'downs' US president's plane in Russia

Hackers broke into the Wall Street Journal's Facebook page to claim that Air Force One possibly crashed over the Russian airspace rattling users' nerves.

Comment?

Related Topix: Science / Technology, Air Accidents

The Times of Israel

Anti-Israel hackers seeking social status, jobs

The huge increase in hacking attacks against Israeli websites during the Gaza conflict is not the work of professional hackers or sophisticated pro-Palestinian activist groups, experts say.

Comment?

Related Topix: Israel, World News, Science / Technology, Middle East

EETimes

Backwards is a dead end

Nostalgia makes for a nice escape, but it doesn't get things done. I understand the wish to go back to simpler times, but they have their own complications.

Comment?

Related Topix: Science / Technology

•••
•••
•••
•••

Computer Security Jobs

•••
•••
•••
•••