Anatomy of a Hacktivist Attack: The 25-Day Reign of Terror
This white paper explores the attack tools and techniques used by today’s most notorious hacktivist group. read more more…Google Chrome 33 released, with better security
The new release proves controversial as Google tightens control over the browser to the anger of some users. In terms of new features, version 33 is rather disappointing – despite debuting in the beta channel a few weeks ago, Google Now notifications have yet to make their way across to the stable channel. In fact, […] more…My university got hacked but it’s nothing special
Through my tenure as a student at the University of Maryland from 2000 to 2004, my social security number also doubled as my student identification number. I’d use this number and a password whenever I logged into the college’s online management system, Testudo, which I did for everything from course selection and monitoring grades to […] more…Apple’s ‘Gotofail’ Security Mess Extends To Mail, Twitter, iMessage, Facetime And More
First, Apple revealed a critical bug in its implementation of encryption in iOS, requiring an emergency patch. Then researchers found the same bug is also included in Apple’s desktop OSX operating system, a gaping Web security hole that leaves users of Safari at risk of having their traffic hijacked. Now one researcher has found evidence […] more…Las Vegas Sands Websites Restored 1 Week After Hacking
Las Vegas Sands Corp. brought its worldwide websites back online on Monday after a hacking attack forced the company to shut its home pages and other online operations last week, a spokesman said. The sites were “not the identical versions” of what they were before the company was hacked, spokesman Ron Reese said. He said […] more…Let US spies keep their internet. The EU will build its own
German Chancellor Angela Merkel has lent her support to the idea of building out new European data networks to help keep Europeans’ email and other data out of the hands of US spies. In the latest edition of her weekly podcast on Saturday, Merkel said she planned to raise the issue among other topics in […] more…There’s now an exploit for ‘TheMoon’ worm targeting Linksys routers
Technical details about a vulnerability in Linksys routers that’s being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models. Last week, security researchers from the SANS Institute’s Internet Storm Center identified a self-replicating malware program that exploits an […] more…Hitting the Data Jackpot
Breaches, breaches everywhere. There has to be a reason for it – criminals aren’t just following a trend like a spring shopper buying the latest styles of shoes. If you put yourself in the shoes of a cybercriminal (not the spring shopper’s), you’ll be able to appreciate how breach data equates money in a number […] more…Not Just Pills or Payday Loans, It’s Essay SEO SPAM!
Remember back in school or college when you had to write pages and pages of long essays, but you had no time write them? Or maybe you were just too lazy? Yeah, good times. Well, it seems like some companies are trying to end this problem. They are offering services where clients pay them to […] more…Dangerous Ruling In Germany Makes Domain Registrar Liable For Copyright Infringement On Website It Registered
We already find the concept of “secondary liability” when it comes to copyright troubling enough. It’s worrisome when a third party who had no direct involvement in the actual infringement can be blamed for it. Yet, in the legacy entertainment industry’s insane infatuation with stopping all infringement, they keep going further up the chain, past […] more…Uber officially enters China with Shanghai launch
The U.S.-based transportation network company Uber announced its official launch in China on February 13, 2014, said a PingWest report. During an event held in Shanghai on Thursday, Uber said that, unlike its American model in which individual drivers register as Uber drivers, it will work with Chenghuan car rental company. According to PingWest’s report, […] more…VMware and Google announce Windows applications for Chrome OS
VMware is teaming up with Google to bring Windows applications to Chrome OS machines. The system will use VMware’s Blast HTML5 technology to virtualise a Windows environment under Chrome OS. With the rise in sales for the Google based operating system (OS), there has arisen a need to find a way to run traditional systems […] more…Have a Linksys router? Now’s a good time to update that firmware
Owners and administrators of Linksys home routers are being advised to update and secure their devices following reports of active attacks on a flaw present in at least two models. Researchers with the SANS Institutes Internet Storm Center have received reports of mass attacks on a remote access vulnerability in the Linksys E1000 and E1200. […] more…Toshiba launches 5TB enterprise hard drives
Toshiba has announced the launch of nearline enterprise capacity HDDs with a recording capacity of up to 5TB. The tech giant says these hard disk drives are the industry’s largest for models that are not filled with helium gas. Helium reduces friction and vibration, two elements that limit the storage capacity of hard drives, and […] more…Edward Snowden Got a Bunch of NSA Info By Stealing a Coworker’s Password
A civilian NSA employee recently resigned after being stripped of his security clearance for allowing former agency contractor Edward Snowden to use his personal log-in credentials to access classified information, according to an agency memo obtained by NBC News. In addition, an active duty member of the U.S. military and a contractor have been barred […] more…Google offers five grants to women in security to attend #HITB2014AMS
As part of Google’s ongoing commitment to encourage women to excel in computing and technology, Google is offering five grants to women in security to attend the Hack In The Box Amsterdam conference in May. These grants include a VIP ticket to the conference on the 29th and 30th of May, an exclusive invite to […] more…More information
- Comment on Locky: the encryptor taking the world by storm by EB
- Data Hacked for 400,000 Planned Parenthood LA Patients
- Microsoft to Retire TLS 1.0/1.1 in Office 365 Starting October 15
- Amnesty Sounds Alarm Over Gulf, Norway Virus Apps
- Cisco Video Communications Server CVE-2011-2538 Unspecified Remote Command Execution Vulnerability
- Sony’s Hirai praises staff in hack, hails freedom of speech
- The end of the Silk Road for Dread Pirate Roberts – 60 Sec Security [VIDEO]
- AT&T, Palo Alto Networks and Broadcom Develop Firewall Framework
- The Russian cyberattack threat might force a new IT stance
- Asruex Malware Exploits Old vulnerabilities to Infect PDF, Word Docs