Computer Security Newswire (Page 7)

Computer Security Newswire (Page 7)

Comprehensive Real-Time News Feed for Computer Security. (Page 7)

Results 121 - 140 of 128,779 in Computer Security

  1. Instagram Revamps MessagingRead the original story w/Photo

    20 hrs ago | PC Magazine

    ... to joining the team, she worked as a reporter for SC Magazine, covering everything related to hackers and computer security. Angela has also written for The Northern Valley Suburbanite in New Jersey, The Dominion Post in West Virginia, and the ...

    Comment?

  2. Chinese Malware Hack Hits a Jailbrokena iPhonesRead the original story w/Photo

    20 hrs ago | CFO

    Hackers in China have compromised the Apple accounts of more than 225,000 iPhone users in what may be the largest such theft caused by malware. The cybersecurity company Palo Alto Networks reported in a blog post that the hackers stole login names and passwords, using a malicious software family dubbed "KeyRaider" that targets "jailbroken" iPhones.

    Comment?

  3. New Technologies Secure the IoT & IIoTRead the original story w/Photo

    20 hrs ago | EETimes

    Cybercriminals are constantly discovering new ways to exploit the growing Internet of Things and Industrial Internet of Things . Traditional cybersecurity solutions rely on techniques like signatures and repeated updates, which means they are difficult to integrate and they cannot secure IoT systems and devices effectively.

    Comment?

  4. Millions hit by personal data hack still have not been toldRead the original story w/Photo

    21 hrs ago | Reuters

    The U.S. government has not yet notified any of the 21.5 million federal employees and contractors whose security clearance data was hacked more than three months ago, officials acknowledged on Tuesday. The agency whose data was hacked, the Office of Personnel Management , said the Defense Department will begin "later this month" to notify employees and contractors across the government that their personal information was accessed by hackers.

    Comment?

  5. Millions hit by U.S. personal data hack still have not been toldRead the original story

    21 hrs ago | Reuters

    The U.S. government has not yet notified any of the 21.5 million federal employees and contractors whose security clearance data was hacked more than three months ago, officials acknowledged on Tuesday. The agency whose data was hacked, the Office of Personnel Management , said the Defense Department will begin "later this month" to notify employees and contractors across the government that their personal information was accessed by hackers.

    Comment?

  6. Hackers raid, steal Apple iPhone accountsRead the original story w/Photo

    21 hrs ago | Bangkok Post

    Hackers targeting jail-broken iPhones have raided more than 225,000 Apple accounts, using them for app-buying sprees or to hold phones for ransom, researchers said on Tuesday. KeyRaider targets Apple mobile devices that have been jail-broken, or modified to be able to run applications or other software not sanctioned by the California-based maker of iPhones, iPads, and iPods "We believe this to be the largest known Apple account theft caused by malware," computer security firm Palo Alto Networks said in an blog post.

    Comment?

  7. New study finds high-stakes tests validRead the original story

    21 hrs ago | Daytona Beach News-Journal Online

    Florida's new high-stakes test , which came under fire after a chaotic rollout this past spring, is valid according to a new outside study released Tuesday. Education Commissioner Pam Stewart called the results "welcome news" and said the study showed the test "accurately measures Florida student's mastery of the standards" in math and reading.

    Comment?

  8. The Largest Case Of Apple Account Hacks Have Hit AustraliaRead the original story w/Photo

    21 hrs ago | PMFM 92.9FM

    Researchers from Palo Alto Networks , have described the hack-attack as the "largest known Apple account theft caused by malware" - eek! The malware, named 'KeyRaider' reportedly uses stolen account details to "download applications from the official App Store and make in-app purchases without actually paying". Using the stolen key information, the hackers can lock users out of their own phone, with at least one person reporting a ransom note had displayed on their screen.

    Comment?

  9. Research and Markets: Hybrid Networks: The 21st Century Enterprise...Read the original story

    21 hrs ago | Information Technology

    This week's SPIE discusses evolving enterprise network topologies, and the resulting security concerns, with an emphasis on hybrid networks. Hybrid networks are also discussed from the perspective of the 3 tenets of security: visibility, control, and predictability.

    Comment?

  10. NCA hacker clampdown draws Lizard Squad wrathRead the original story

    22 hrs ago | Aurora Era-Banner

    The website of the National Crime Agency was down this morning, with the Twitter account believed to be that of Lizard Squad claiming responsibility. The NCA admitted that the website failure was due to a Distributed Denial of Service attack, which hits websites with huge amounts of data to make them inaccessible to users.

    Comment?

  11. Ashley Madison says cheating site still growingRead the original story w/Photo

    22 hrs ago | KGNS-TV Laredo

    Despite a massive hack that exposed the personal information of millions of users, the Ashley Madison dating site for married people is growing, the company says. "Recent media reports predicting the imminent demise of Ashley Madison are greatly exaggerated,"Avid Life Media, said in a release Monday.

    Comment?

  12. Keyraider Malware Takes Aim at Jailbroken Apple iOS DevicesRead the original story w/Photo

    22 hrs ago | CNet News

    NEWS ANALYSIS: With jailbroken devices, the simple truth is you're at risk from a lot more than just Keyraider, which has now claimed 225,000 victims. Network security vendor Palo Alto Networks is warning about a new form of iOS malware it has dubbed Keyraider, which has already claimed 225,000 victims.

    Comment?

  13. FirstNet sets bar high for cybersecurity while pursuing ambitious timelineRead the original story w/Photo

    22 hrs ago | Mobile Radio Technology

    At a time high-profile government and corporate entities are suffering data breaches on a regular basis, FirstNet officials want to develop a cybersecurity solution that will be effective long term, is affordable and can be executed without disrupting first responders from their primary missions. Sounds challenging, especially given FirstNet's goal of issuing a final RFP - with cybersecurity - by the end of the year.

    Comment?

  14. 3rd Circuit Affirms FTC's Cybersecurity OversightRead the original story w/Photo

    23 hrs ago | JD Supra

    In light of the 3rd Circuit's decision, companies should be on immediate notice that they are likely subject to continued - and, quite possibly, increased - FTC enforcement actions for their cybersecurity practices based on currently existing FTC guidance Companies should also become familiar with Start With Security , the FTC's recently published cybersecurity guide for businesses that summarizes "lessons learned from FTC cases." Last week, the Federal Trade Commission secured a major appellate victory in its quest to challenge lax corporate cybersecurity practices through its general enforcement authority over "unfair" trade practices.

    Comment?

  15. Note to Critics: Bank-Backed Message Service Not Backing DownRead the original story w/Photo

    23 hrs ago | American Banker

    Hot Debate: There are two sides to giving government agencies "back-door" access to data, says Symphony CEO David Gurle. "On one side there's privacy, which we do have to protect.

    Comment?

  16. Popular Belkin Wi-Fi routers plagued by unpatched security flawsRead the original story w/Photo

    23 hrs ago | PC World

    If your Wi-Fi network is using the popular Belkin N600 DB router, be warned: it may have several vulnerabilities that could allow hackers to take it over. Remote unauthenticated attackers could exploit the vulnerabilities to spoof DNS responses and direct users to rogue websites or trick users' browsers to change the device configuration, the CERT Coordination Center at Carnegie Mellon University said Monday in an advisory .

    Comment?

  17. Chilling Effects of the Ashley Madison Scarlet LetterRead the original story

    23 hrs ago | Common Dreams

    It's been a little over a week since massive amounts of data from the popular cheating website, Ashley Madison, were published online. Impact Team, the group behind the breach, released everything from email and home addresses of Ashley Madison's users to their credit card and bank account information.

    Comment?

  18. September 1, 2015 - Third Circuit says FTC can sue companies for...Read the original story

    23 hrs ago | Public Power

    The U.S. Court of Appeals for the Third Circuit on Aug. 24 issued a precedential opinion regarding the Federal Trade Commission's authority to file suit over cybersecurity breaches. In the case, FTC v.

    Comment?

  19. Shadow BYOD runs rampant in federal governmentRead the original story w/Photo

    23 hrs ago | Network World

    A new survey highlights the extent to which government employees insist on bringing their own devices to work, despite rules to the contrary. Government CIOs have been struggling mightily with developing prudent policies to enable employees to use their personal mobile devices for work without putting sensitive information at risk or otherwise compromising the security of agency systems.

    Comment?

  20. CyberArk Software Upgraded Amid Market MeltdownRead the original story w/Photo

    23 hrs ago | Investor's Business Daily

    On another rough session for the stock market today , CyberArk stock was flat in midday trading, near 51. But shares have fallen 17% since Aug. 19, the last time the stock was near its 50-day moving average line. CyberArk stock hit a seven-month low below 41 on Aug. 24. Still, Piper Jaffrey analyst Andrew Nowinski sees CyberArk lapping up market share as companies mull necessary internal data protection.

    Comment?