Computer Security Newswire (Page 10)

Computer Security Newswire (Page 10)

Comprehensive Real-Time News Feed for Computer Security. (Page 10)

Results 181 - 200 of 165,656 in Computer Security

  1. Hackers didn't even need passwords for Yahoo breach 0:0Read the original story w/Photo

    Thursday Feb 16 | New York Post

    Stop me if you've heard this before, but Yahoo was hacked. Yes, again. Or better said, your Yahoo account may have been breached by hackers.

    Comment?

  2. Verint Named to 2017 CRM WatchlistRead the original story

    Thursday Feb 16 | PressReleasePoint

    VerintA Systems Inc. today announced that it has been named a "Winner with Distinction" on the 2017 CRM Watchlist, an annual evaluation conducted by Paul Greenberg, managing principal of The 56 Group, LLC and author of CRM at the Speed of Light. The CRM Watchlist recognizes the impact companies have on their markets through strength, mindshare and market share, how well they execute through the year and how well prepared they are for future success.

    Comment?

  3. AT&T Waltzes Towards Massive MIMORead the original story w/Photo

    Thursday Feb 16 | Light Reading

    AT&T says that it has been testing "massive MIMO" with Shentel and startup Blue Danube. The tests used Blue Danube's 96-element BeamCraft500 active antenna, and delivered up to five times the throughput of standard LTE networks, the startup said.

    Comment?

  4. How paranoid is too paranoid when it comes to privacy and security?Read the original story w/Photo

    Thursday Feb 16 | The Age

    End-to-end encryption is the new security mantra, but how far will you go to foil the thought police? It's difficult to maintain a healthy level of paranoia when some days it feels like we're living in a gritty reboot of 1984 . Revelations of western security agencies systematically spying on their own citizens have driven many people to embrace personal encryption tools, yet at the same time social media has bred a generation of oversharers who seem happy to trade their privacy for magic beans.

    Comment?

  5. A new technique for creation of entangled photon states developedRead the original story w/Photo

    Thursday Feb 16 | Space News From SpaceDaily.Com

    Members of the Faculty of Physics, the Lomonosov Moscow State University have elaborated a new technique for creation of entangled photon states, exhibiting photon pairs, which get correlated with each other. Scientists have described their research in an article, published in the journal Physical Review Letters.

    Comment?

  6. Experts debate national cybersecurity policy suggestions at RSAC 2017Read the original story w/Photo

    Thursday Feb 16 | TechTarget

    Members of the Cyber Policy Task Force at the Center for Strategic and International Studies began work on cybersecurity recommendations for the next administration in 2014 and at RSA Conference 2017, members of the task force discussed areas where the government needs to improve, including encryption, the role of the DHS, incident reporting and an increased focus on user data privacy. Sameer Bhalotra, co-chair and head of the West Coast team for the CSIS Cyber Policy Task Force, said the government might need a national cybersecurity policy concerning major cyber incident reporting and data collection.

    Comment?

  7. Gov, OMES Refute Report Agency Paid Ransom After HackRead the original story w/Photo

    Thursday Feb 16 | News9 Oklahoma City

    Calling it a "catch-22", Oklahoma state officials declined to release which state agency was discovered to have been attacked by hackers, claiming on Wednesday that releasing the name could compromise the agency further. The refusal to talk came just one week after the state director of Oklahoma Cybercommand told a House of Representative committee an agency had been attacked and forced to pay a ransom for its data.

    Comment?

  8. Yahoo and Verizon 'near to agreeing revised sale terms'Read the original story w/Photo

    Thursday Feb 16 | Ghanamma.com

    Internet group Yahoo has reportedly agreed a price cut on its initial $4.8bn sale to Verizon. Verizon's purchase of Yahoo's core internet arm was put in doubt last year after disclosure of two cyber attacks.

    Comment?

  9. A.I. faces hype, skepticism at RSA cybersecurity showRead the original story w/Photo

    Thursday Feb 16 | ComputerWorld

    Vendors at this week's RSA cybersecurity show in San Francisco are pushing artificial intelligence and machine learning as the new way to detect the latest threats, but RSA CTO Zulfikar Ramzan is giving visitors a reality check. "I think it moves the needle," he said on Wednesday.

    Comment?

  10. Bruce Schneier: Public-service technologists are needed to tame the IoTRead the original story w/Photo

    Thursday Feb 16 | ComputerWorld

    ... used for buildings and planes. The challenge is how to get vendors to make their products more secure. "Computer security was left to the market. We've been OK with imperfect solutions because the effects of failure just aren't that great." And ...

    Comment?

  11. The Era Of Data-Jacking Is Here. Are You Ready?Read the original story w/Photo

    Thursday Feb 16 | Dark Reading

    As data in the cloud becomes more valuable, the cost of weak security will soon be higher than many organizations can bear. Here's why.

    Comment?

  12. Turning Back DDoS AttacksRead the original story

    Thursday Feb 16 | Newswise

    In late October 2016, malicious actors took over internet-connected devices to launch a series of cyberattacks known as distributed denial of service attacks. Hackers launch DDoS attacks by sending an overload of web traffic at a target to the point that it is unable to function.

    Comment?

  13. Sophos CEO sounds the alarm on enterprise ransomware attacksRead the original story w/Photo

    Thursday Feb 16 | ComputerWorld

    Ransomware is increasingly becoming a problem for companies, and the CEO of a leading computer security company says he fears 2017 could see entire companies shut down until they pay up, or risk losing all their data. Ransomware works by infiltrating a computer with malware and then encrypting all the files on the disk.

    Comment?

  14. Ukraine Blames Russia For New Virus Targeting InfrastructureRead the original story w/Photo

    Thursday Feb 16 | Dark Reading

    Ukraine has accused the Russian security service of attacking the country's infrastructure using a new virus designed to render industrial equipment non-functional, Reuters reports. At a recent press conference, Ukraine's security service chief of staff Oleksandr Tkachuk stated the attacks appear to come from the creators of malware BlackEnergy; the same people were allegedly responsible for cyberattacks on the country's energy industry since December 2015.

    Comment?

  15. MEDJACK.3 Poses Advanced Threat To Hospital DevicesRead the original story w/Photo

    Thursday Feb 16 | Dark Reading

    A newly discovered version of the "medical device hijack" attack targets older operating systems to bypass security measures and steal patient data. Researchers have discovered a new version of medical device hijack , which is leaving medical devices like x-ray machines and MRI scanners vulnerable to cybercriminals.

    Comment?

  16. RSA: Elite cryptographers scoff at idea that law enforcement can 'overcome' encryptionRead the original story w/Photo

    Thursday Feb 16 | ComputerWorld

    U.S. Attorney General Jeff Sessions' call for a way to "overcome" cryptography met with scorn from a panel of elite cryptographers speaking at this week's RSA Conference 2017 in San Francisco. "Any one of my students will be capable of writing good crypto code," says Adi Shamir, the 'S' in RSA and a professor at the Weizmann Institute in Israel.

    Comment?

  17. You Can't Depend on Antivirus Software AnymoreRead the original story w/Photo

    Thursday Feb 16 | Slate Magazine

    In 2005, Panda Software reported that a new strain of malware was discovered every 12 minutes . In 2016, the cybersecurity company McAfee says it found four every second .

    Comment?

  18. 'Spy Week' at Lunenburg LibraryRead the original story w/Photo

    Thursday Feb 16 | Sentinel & Enterprise

    The first event will be held from Tuesday, Feb. 21, from 1 to 2:30 p.m. You will need to first create your secret identity card -- an alias, fingerprints, photo with disguise. You will also need a spy kit with magnifying glass, fingerprint kit, protective gloves, etc.

    Comment?

  19. Researchers trick 'CEO' email scammer into giving up identityRead the original story w/Photo

    Thursday Feb 16 | ComputerWorld

    Researchers at Dell SecureWorks have documented how they identified a suspected email scammer from Nigeria, by essentially playing along with the scheme to fool the attacker into revealing his true whereabouts. Anyone can use these tips, said Joe Stewart, director of malware research at SecureWorks.

    Comment?

  20. Manfred: Red Sox were considered when punishing Cardinals for hacking AstrosRead the original story w/Photo

    Thursday Feb 16 | Boston Herald

    When Rob Manfred slapped the St. Louis Cardinals with a $2 million fine and a pair of draft picks for hacking into the Houston Astros' email and baseball database, the commissioner was conscious of the punishment he gave the Red Sox last summer for violating international amateur signing rules. The punishment: no international signees in the 2016-17 period that ends in June, and five players signed 2015 - players involved in the transgression - were made free agents.

    Comment?