-
January 7, 2014
US Defense Budget to Both Regulate and Proliferate Cyber Weapons
US Defense Budget to Both Regulate and Proliferate Cyber Weapons: The National Defense Authorization Act for Fiscal Year 2014 approved by Congress seeks to regulate the proliferation of cyber weapons while simultaneously providing bigger budgets for the military to develop more sophisticated cyber attack capabilities. The intention of the Cyber Security Initiative is to both […]
-
January 7, 2014
Snapchat CEO Interview On Security Hole
Snapchat CEO Interview On Security Hole: Snapchat’s CEO Evan Spiegel appeared on the Today Show this morning to discuss the recent security breach that caused about 4.6 million usernames and phone numbers to be leaked publicly online on New Year’s Eve. Snapchat released a statement Thursday night explaining how the hack happened, but failed to […]
-
January 7, 2014
NSA Elite Hacking Team Operations Exposed
NSA Elite Hacking Team Operations Exposed: It should come as no surprise that the National Security Agency has a special team of top-gun hackers who breaks into systems around the world to spy on its targets. But revelations published yesterday by a German magazine about the NSA’s Tailored Access Operations (TAO) Group and the agency’s […]
-
January 7, 2014
Swiped: 5 lessons from the Target card breach
Swiped: 5 lessons from the Target card breach: The theft of 40 million credit and debit card records from Target (TGT) wasn’t the biggest or most damaging data breach ever, but coming right before Christmas, it sure did get our attention-and maybe that’s good. Perhaps American consumers needed a slap in the face to focus […]
-
January 6, 2014
Top 10 Security Breaches Of 2013
Top 10 Security Breaches Of 2013: In 2013, hackers developed new methods to bypass security restrictions. They unleashed powerful denial-of-service attacks that mimic legitimate traffic better than ever before. They created new malware strains that easily bypass traditional security defenses. They honed their social engineering tactics, designing ever more believable phishing attacks to steal their […]
-
January 6, 2014
US Appeals Court Ruling Invalidating NSA Surveillance
US Appeals Court Ruling Invalidating NSA Surveillance: WASHINGTON – The US government said Friday it is appealing a judge’s ruling that the National Security Agency’s bulk collection of phone records is unconstitutional and “almost Orwellian.” The Justice Department filed a notice of appeal with the court following last month’s ruling by Judge Richard Leon. Arguments […]
-
January 6, 2014
NATO has constituted Cyber Response Teams
NATO has constituted Cyber Response Teams: NATO is establishing its reaction units to protect its infrastructure in case of cyber attacks, the organization will set-up exactly two teams for the purpose. NATO is considered a privileged target for hackers, in 2012 it suffered 2,500 “significant cases” of cyber attacks against its networks, during the 2013 […]
-
January 6, 2014
5 Biggest Cyber Threats to Watch for in 2014
5 Biggest Cyber Threats to Watch for in 2014: Here’s what to watch out for in the coming year: 1. Mobile malware We’re all familiar with malware on PCs, but according to McAfee Labs, growth in PC malware was largely flat during 2013. However, malware in Android mobile operating systems grew by 33 percent. McAfee […]
-
January 4, 2014
Security Guard. Tips and Tricks for Windows 7 Protection
Security Guard. Tips and Tricks for Windows 7 Protection: Using BitLockerBitLocker is one of the most popular and improved securities in Win 7. This hard disk and encryption technology and protecting the integrity of the boot medium first appeared in Windows Vista. We can find BitLocker in several Ultimate and Enterprise edition of Win 7. […]
-
January 3, 2014
NSA Server vulnerable to SMTP Spoofing, can be used for Social Engineering
NSA Server vulnerable to SMTP Spoofing, can be used for Social Engineering: An Indian hacker known as “Godzilla” has identified a vulnerability in the NSA website that allows an attacker to send fake emails from NSAs SMTP server. NSAs SMTP server allows anyone to use the service without verifying the IP address and password. The […]