Kiwis unplug supercomputer after intrusion
A $12.7 million supercomputer owned by Niwa has been targeted by a computer hacker believed to have come from China. The computer, known as FitzRoy, is housed in a specially constructed room at the National Institute for Water and Atmospheric Research base at Greta Point, Wellington. Tags: NZ Hacker Security more…Who owns Mega after Kim splits with Mona?
Exactly who owns and controls privacy company and website Mega is up in the air after Kim Dotcom announced his separation from wife Mona last week. Mona Dotcom held the largest shareholding in Mega through a company MD Corporate Trustees until earlier this month when just over 10,000 shares were transferred to Hong Kong resident […] more…"Copyright troll" Prenda Law completely bombs at appeals court
Prenda Law, the firm that became controversial as a prolific “copyright troll” by suing thousands with lawsuits over downloading porn movies, has fallen apart over the course of the last year. The organization and the lawyers widely believed to be behind it—John Steele, Paul Hansmeier, and Paul Duffy—have been sanctioned by numerous federal judges. While […] more…Senator says Snapchat ‘hiding something’ by skipping data breach hearing
Snapchat has drawn fire from US Senator Jay Rockefeller, the powerful chairman of the Senate Committee on Commerce, Technology, and Transportation, for refusing to testify in a hearing on data breaches. more…Senator says Snapchat ‘hiding something’ by skipping data breach hearing
Snapchat has drawn fire from US Senator Jay Rockefeller, the powerful chairman of the Senate Committee on Commerce, Technology, and Transportation, for refusing to testify in a hearing on data breaches. more…RSA Conference 2014: The Way Forward
I attended the RSA 2014 Conference in San Francisco, which has held about two weeks ago. This year the conference offered new insights to today’s threat landscape, which will help us all plan for and protect users in 2014 and beyond. Largest Security Conference of 2014 The attendance numbers for RSA are always impressive: this […] more…Improving the State of 4K Display Support Under OS X
In my Mac Pro review I lamented the state of 4K display support under OS X 10.9.0. In my conclusion I wrote: “4K display compatibility under OS X is still a bit like the wild west at this point”. Compatibility was pretty much only guaranteed with the ASUS/Sharp 4K displays if you cared about having […] more…The cost of doing business at the RSA Conference
Each year, hundreds of vendors head to the RSA Conference in San Francisco, California, arguably the largest security gathering in the U.S. For many of those vendors, the show is a requirement, but there’s a steep cost involved. For smaller companies, the show can create a sink or swim environment. Tags: Industry News more…Hackers to demo a $20 iPhone-sized gadget that zombifies cars
At Black Hat Asia next month, researchers plan to show a palm-sized device that costs less than $20 to build from off-the-shelf, untraceable parts and that, depending on the car model, can screw with windows, headlights and even the truly scary, make-you-crash bits: i.e., steering and brakes. more…Malware and Winter Olympics
Whenever there’s a global sporting event, we get questions about the “cyber” angle. Could an event like The Olympics be targeted by malware outbreaks, or maybe DDoS attacks? And while there are some real security concerns, most coverage of cyber attacks during Olympics end up to be incorrectly reported or just hype. This is not […] more…How Facebook leaked thousands of private messages all because of a typo
We shouldn’t know about how this teenager’s friends slaughtered calves in Farmville or that her idol is some dreamy looking guy, but we do, all because of a bizarre, fluky little glitch in the email confirmation (that’s only now being fixed). more…What’s next for the Microsoft insiders who didn’t get the CEO nod
Now that it’s official that Satya Nadella is Microsoft’s next CEO, it’s time to ponder what happens with some of the other leading company insiders who didn’t get the nod. As part of the search process, the Microsoft CEO search committee considered not only more than a few outsiders, but also a number of internal […] more…Website Mesh Networks Distributing Malware
Can you imagine having the keys to a kingdom? How awesome would that be!! This is true in all domains, especialy when it comes to your website. This is almost like the holy grail of website attacks, gain access and do what you want with someone else’s pride and joy. We all know that once […] more…Keygens For Engineering, Scientific Software Leads To FAKEAV
In the past few weeks, we have seen increasing numbers of infections related to the TROJ_GATAK, especially in the North American region. This malware family is not particularly well known; we discussed it in 2012 in relation with file infectors that were hitting Dutch users. In checking for its possible causes, we’ve found the malware […] more…Bluetooth Hackers Allegedly Skimmed Millions Via Gas Stations
Thirteen suspects have been indicted in New York on a gas station skimming scheme that netted them more than $2 million, according to court documents. The skimming devices, placed on card readers at gas station pumps throughout the southern U.S., recorded credit and debit card data, as well as PINs, which the thieves then used […] more…TED Talk, in Your Language
All talks on TED.COM are translated to various languages. And all this work is done by volunteer TED Translators. My talk on NSA Surveillance has now been translated to following languages: DutchFinnishFrenchGermanGreekHebrewHungarianIndonesianItalianKoreanPersianBrazilian PortugueseRomanianSpanish In fact, there are 16 more translations underway. I’d like to thank the people who have translated and reviewed the translations of […] more…More information
- Several Vulnerabilities Patched in Drupal
- Defining Cloud Security – Is It the Endpoint, Your Data, or the Environment?
- Synopsys to Acquire Code Testing Firm Cigital
- Krebs Exits SentinelOne After Security Clearance Pulled
- Are the likes of Visa and MasterCard doomed?
- What makes MS think it could ban non-IE browsers in Win8?
- Apple critical patches fix in-the-wild iPhone exploits – update now!
- Threat modeling explained: A process for anticipating cyber attacks
- Scientists just found a hidden 48-dimensional world in quantum light
- IDG Contributor Network: Nest Cam first look: Privacy problems and deal-breaking delays