Computer Security Newswire (Page 2)

Comprehensive Real-Time News Feed for Computer Security. (Page 2)

Results 21 - 40 of 34,610 in Computer Security

  1. Clinton ran own computer system for her official emailsRead the original story w/Photo

    3 hrs ago | KPLC-TV Lake Charles

    The computer server that transmitted and received Hillary Rodham Clinton's emails - on a private account she used exclusively for official business when she was secretary of state - traced back to an Internet service registered to her family's home in Chappaqua, New York, according to Internet records reviewed by The Associated Press. The highly unusual practice of a Cabinet-level official physically running her own email would have given Clinton, the presumptive Democratic presidential candidate, impressive control over limiting access to her message archives.

    Comment?

  2. Apple and Google users being spied on for a decade because of 'Freak' security flawRead the original story w/Photo

    3 hrs ago | The Independent

    Note: We do not store your email address but your IP address will be logged to prevent abuse of this feature. Please read our Legal Terms & Policies A huge security flaw in Apple and Google devices leaves phone and computer users vulnerable to hacking when they go to supposedly secure websites, according to researchers.

    Comment?

  3. Waze Integrates Amber Alerts Into AppRead the original story w/Photo

    3 hrs ago | PC Magazine

    ... to joining the team, she worked as a reporter for SC Magazine, covering everything related to hackers and computer security. Angela has also written for The Northern Valley Suburbanite in New Jersey, The Dominion Post in West Virginia, and the ...

    Comment?

  4. Own an Apple or Android device? Here's what you need to know about the FREAK flawRead the original story w/Photo

    3 hrs ago | Business Journal

    Security experts have discovered a serious flaw, which allows hackers to decrypt HTTPS-protected traffic passing between Apple and Android devices and thousands of websites. Dubbed the FREAK attack , it has left users vulnerable for over a decade.

    Comment?

  5. A 'Building Code' For Internet of Things Security, PrivacyRead the original story w/Photo

    3 hrs ago | Dark Reading

    In the fast-emerging IoT, medical device safety is reaching a critical juncture. Here are three challenges InfoSec professionals should begin to think about now.

    Comment?

  6. New platform helps fend off high volume cyber attacksRead the original story w/Photo

    3 hrs ago | BetaNews

    Cyber attacks are getting bigger and more complex and are targeting many different types of organization and industry. This means defending against them is more than ever a major concern for businesses.

    Comment?

  7. Apple and Google Plan Fixes for 'FREAK Attack'...Read the original story w/Photo

    3 hrs ago | Billboard

    ... are also taking corrective action after being notified privately in recent weeks, said Matthew Green , a computer security researcher at Johns Hopkins University. But some experts said the problem shows the danger of government policies that require ...

    Comment?

  8. a Hip way of securing a wide range of endpointsRead the original story w/Photo

    3 hrs ago | Computer Weekly

    While this is a major concern for all companies and individuals, in the world of industry and cyber security, the stakes are almost limitless. Imagine the impact of a successful cyber attack on a nuclear power station, a hydro-electric dam, a gas or oil plant, or even a major retailer.

    Comment?

  9. Cyber staffers warned Clinton about personal emailRead the original story w/Photo

    3 hrs ago | The Hill

    State Department cybersecurity staffers warned Hillary Clinton's office that the secretary's private email service was more vulnerable to hackers than the agency's email service, Al Jazeera reported . "We tried," an unnamed current employee told Al Jazeera.

    Comment?

  10. Millions of Apple and Google customers are vulnerable to a decades-old 'FREAK' hackRead the original story w/Photo

    4 hrs ago | Albany Times Union

    Millions of Apple and Google customers are at risk of having their confidential details stolen by hackers thanks to a newly-discovered "FREAK" vulnerability, the Washington Post reports . It stands for Factoring attacks on RSA-EXPORT Keys.

    Comment?

  11. The Cyber Action TeamRead the original story w/Photo

    4 hrs ago | Federal Bureau of Investigation

    It can be a company's worst nightmare - the discovery that hackers have infiltrated their computer networks and made off with trade secrets, customers' personal information, and other critical data. When such intrusions happen - and unfortunately, they occur frequently - the FBI can respond with a range of investigative assets, including the little-known Cyber Action Team .

    Comment?

  12. Attackers clone malware-laden copies of popular appsRead the original story w/Photo

    4 hrs ago | Network World

    Criminal hackers have hacked/cloned most of the top 100 paid apps and top 20 free apps for Android and iOS, according to data from Arxan's State of Mobile App Security report, 2014. These attackers use the infected apps to gain entry to the enterprise in order to compromise its most treasured information.

    Comment?

  13. Flappy apps give users the angry birdRead the original story w/Photo

    4 hrs ago | Network World

    Beware buying apps as they may not be what they seem. Criminals often crowd stores with malware-laden fake versions.

    Comment?

  14. Sad Scary State of Bank SecurityRead the original story w/Photo

    4 hrs ago | Examiner.com

    Who needs guns, threatening notes to rob a bank when you can do it with just your fingertips inside your home? A hacking ring in the eastern portion of Europe may be the most successful team of bank robbers to date, having purportedly robbed $1 billion from multiple banks. This can only be done by infecting computers with malicious software and sucking out all the money.

    Comment?

  15. US Govt Put Apple Users At Risk Of HackingRead the original story w/Photo

    4 hrs ago | Ananova

    Millions of Apple and Android users have been vulnerable to hackers for years because of a security flaw caused by the US government, researchers say. The vulnerability - known as 'FREAK attack' - has been blamed on a government policy abandoned more than a decade ago which forced US software makers to use weaker security encryption in software sold overseas.

    Comment?

  16. Sad Scary State of Bank Security - community blog from Robert SicilianoRead the original story w/Photo

    4 hrs ago | Finextra Research news

    Who needs guns, threatening notes to rob a bank when you can do it with just your fingertips inside your home? A hacking ring in the eastern portion of Europe may be the most successful team of bank robbers to date, having purportedly robbed $1 billion from multiple banks. This can only be done by infecting computers with malicious software and sucking out all the money.

    Comment?

  17. Bad, old U.S. policy causes 'FREAK' computer bugRead the original story w/Photo

    4 hrs ago | WMDH-AM New Castle

    Once upon a time, U.S. law demanded a weak version of website encryption so that it could break in wherever it wanted. Researchers have discovered a flaw -- which they call the FREAK bug -- that can let a hacker spy on your Internet session and steal your login credentials.

    Comment?

  18. 10-Year Old 'FREAK' Security Flaw DiscoveredRead the original story w/Photo

    4 hrs ago | Ubergizmo

    In this day and age, security in the digital realm is of utmost importance, especially when you take into consideration the number of hacking incidents that have happened in the past. Whatever security holes discovered ought to be patched up as soon as possible, to say the least.

    Comment?

  19. 'Freak' Security Flaw Could Impact Apple and Google UsersRead the original story

    4 hrs ago | Anders Jacobsen's blog

    How is it that these flaws are only now being discovered in such a way. Perhaps there have been few, or no man-in-the-middle attacks! The Apple patch sounds as if it's on its way, but the delivery of the Google patch is a little concerning.

    Comment?

  20. Consorteum Holdings, Inc. (CSRH): Universal Mobile Interface...Read the original story

    5 hrs ago | InvestorIdeas.com

    March 4, 2015 A recent report by Allied Market Research on the growing global mobile security market highlights the rise of BYOD workplace architectures, ranging from SMEs to large organizations with international workforces, as one of the core drivers behind the surging demand for more secure mobile environments. The market for mobile security is projected as climbing to over $34.8 billion within the next five years alone on a roaring CAGR of 40.8%, as more and more companies reach for the immense benefits of improved-employee satisfaction and increased productivity from the BYOD workplace experience, even as consumers also flock to mobile-enabled ecommerce and banking options.

    Comment?