Bookmark

Add to MyYahoo RSS

Computer Security News

News on Computer Security continually updated from thousands of sources around the net.

3 hrs ago | ComputerWorld

iPhone gets first free app for encrypting voice calls

An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.

Comment?

Related Topix: iPhone, Science / Technology

4 hrs ago | News24

.com | Israel's Iron Dome makers hit by China hackers

Aviation has suffered one of its worst weeks in memory, but industry analysts and safety experts say they can find no common themes.

Comment?

Related Topix: Science / Technology, Columbia, MD

7 hrs ago | China Digital Times

Hackers Hit HK Media, Democracy Movement

As advocacy groups note Beijing's increasing influence over the media in Hong Kong , and after recent violent attacks against Hong Kong journalists , the Hong Kong Journalists Association declared the past year the " darkest for press freedom" in several decades .

Comment?

Related Topix: Science / Technology, PC

8 hrs ago | SlashGear.com

Microwave hacked into weapon, used to blow up a stereo

There are some things in this world you're better off not trying, and dismantling a microwave to make a stick-mounted weapon is probably one of them.

Comment?

Related Topix: Science / Technology

9 hrs ago | MSN Money

Is this the death of passwords?

Is it possible that your next password might be as simple and subtle as the way you type or hold your smartphone? If you hate trying to fill out those CAPTCHA forms with Secrets are used to keep our stuff safe on computers; for nearly three decades now, that secret has chiefly been a password, or in security lingo, "something you know."

Comment?

Related Topix: Science / Technology, Marketing

11 hrs ago | Wall Street and Tech

Shore Up Cyber Security Now

Knowing that a data breach can and will happen at some point, asset management firms can manage new operational and regulatory risk with a layered approach to cyber security.

Comment?

Related Topix: Science / Technology

15 hrs ago | Boing Boing

Former NSA chief to profit from patented hacker detection tech, charging clients $1M a month

Keith Alexander, the former director of the National Security Administration, is filing for tech security patents related to his work running the NSA.

Comment?

Related Topix: Science / Technology

16 hrs ago | Reuters

Canada says China tried to hack into key computer system

High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.

Comment?

Related Topix: Computers, Science / Technology, Canada

16 hrs ago | This Is Lancashire

Warning over Android security risk

A new flaw in the Android mobile operating system leaves the personal and financial details of users since 2010 at risk to hacking, a mobile analytics firm has claimed.

Comment?

Related Topix: Google, Startups, Science / Technology

17 hrs ago | Forbes.com

Hackers And E-Criminals Want Your E-Data: WePay Expert Sounds Off

As more and more transactions take place online and on mobile devices, companies are spending buckets of time trying to make sure their clients money-matters are secure.

Comment?

Related Topix: Science / Technology, Internet

19 hrs ago | Brandon Sun

Canadian spy agency says Chinese hacked into NRC computers, network shut down

Chinese hackers have infiltrated the computer systems at the National Research Council, forcing it to shut down its IT network for an extended period, the federal government revealed Tuesday.

Comment?

Related Topix: Science / Technology, Canada

19 hrs ago | Canada.com

Chinese hackers break into National Research Council computers, Canadian spy agency says

But the Treasury Board says the NRC's computers have been isolated from the rest of the government's systems as a precaution.

Comment?

Related Topix: Science / Technology

21 hrs ago | CIO

Using Instagram on public Wi-Fi poses risk of an account hijack, researcher

A configuration problem in Facebook's popular Instagram application for Apple devices could allow a hacker to hijack a person's account if they're both on the same public Wi-Fi network.

Comment?

Related Topix: Wireless, Science / Technology, Wi-Fi, Emerging Technology, Startups, Facebook, Social Software, Twitter

Mon Jul 28, 2014

The Medina Gazette

Brunswick Council OKs money for return of tornado sirens

City Council agreed Monday to spend $24,554 to get Brunswick tornado sirens up and running.

Comment?

Related Topix: Science / Technology, Medina County, OH, Strongsville, OH

China Digital Times

"Chinese" Hackers Hit Firms Behind Israel's Iron Dome

According to Columbia, Md.-based threat intelligence firm Cyber Engineering Services Inc. , between Oct. 10, 2011 and August 13, 2012, attackers thought to be operating out of China hacked into the corporate networks of three top Israeli defense technology companies, including Elisra Group, Israel Aerospace Industries, and Rafael Advanced Defense ... (more)

Comment?

Related Topix: Science / Technology, Columbia, MD

WAND-TV Decatur

Home Security Systems Can be Hacked

Dale Baker has an ADT home security system. He'd be at home when it would start chirping.

Comment?

Related Topix: Science / Technology

Forbes.com

How Safe Is Your Bitcoin Wallet From A Cyber-Attack?

Bitcoin is a type of digital currency established in 2009 as an inexpensive payment method than can be used to buy merchandise and make transactions online.

Comment?

Related Topix: Economics News, Bitcoin, Science / Technology, Dennis Christopher, Business News

Government Executive

Hacker Breached NOAA Satellite Data from Contractor's PC

National Oceanic and Atmospheric Administration satellite data was stolen from a contractor's personal computer last year, but the agency could not investigate the incident because the employee refused to turn over the PC, according to a new inspector general report.

Comment?

Related Topix: PC

Forbes.com

The Top 5 Most Brutal Cyber Attacks Of 2014 So Far

In 2014, cyber attacks and data breaches don't look like they're going to slow down.

Comment?

Related Topix: Science / Technology

Iol.co.za

'iPhones allow extraction of personal data'

Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicised techniques by Apple employees, the company acknowledged last week.

Comment?

Related Topix: Computers, iPod touch App, iPad App, Google+, iPhone and iPad App, iPhone App, iPhone, Science / Technology

•••
•••
•••
•••

Computer Security Jobs

•••
•••
•••
•••