-
January 2, 2014
Skype’s Blog and Social Profiles Hacked By Syrian Electronic Army
Skype’s Blog and Social Profiles Hacked By Syrian Electronic Army: We’re not even through the first day of 2014 and cyber attacks have already made their appearance. Earlier today, a person (or a few people) breached Skype’s security and hacked its Twitter account, Facebook page, and blog. The group claiming responsibility is the Syrian Electronic […]
-
January 2, 2014
Obama knew of NSA spying on Merkel and approved it, report says
Obama knew of NSA spying on Merkel and approved it, report says: President Barack Obama knew of the organization’s spying on German Chancellor Angela Merkel – and approved of the efforts, a National Security Agency official has reportedly told a German newspaper. The Economic Times writes the “high-ranking” NSA official spoke to Bild am Sonntag […]
-
January 2, 2014
Top Ten Info-Security “Oops” Moments of 2013
Top Ten Info-Security “Oops” Moments of 2013: On the last day of 2013, I thought I would reprise my annual column of the top ten biggest information security breaches or exploits.Nowadays, with news of million-plus caches of credit cards and identities being stolen almost a daily occurrence, one can get numb to these announcements. However, […]
-
January 2, 2014
SD Cards Aren’t As Secure As We Think
SD Cards Aren’t As Secure As We Think: The hardware hacker Bunnie Huang gave a talk at the Chaos Compute Club Congress where he offered some good news and some bad news. The good news? SD cards contain powerful, handy micro controllers that are useful to hackers and hobbyists. The bad news? SD cards are […]
-
January 2, 2014
Microsoft Was Right To Worry That Government Snooping Constituted An ‘Advanced Persistent Threat’
Microsoft Was Right To Worry That Government Snooping Constituted An ‘Advanced Persistent Threat’: Early this month, Microsoft declared that ”government snooping potentially now constitutes an ‘advanced persistent threat,’” a statement that became ironic this weekend, given that, early this month, Microsoft likened government surveillance to “sophisticated malware and cyber attacks.” New NSA revelations out this weekend detailed […]
-
January 2, 2014
Cyber thieves are stealing money from ATMs with infected USB sticks
Cyber thieves are stealing money from ATMs with infected USB sticks: German researchers at the last Chaos Computing Congress in Hamburg revealed how cyber thieves steal money from ATMs win infected USB Sticks. Cyber criminals are exploiting new techniques to attack ATMs (Automated Teller Machines) infecting the devices with specifically crafted malware. Security researchers discovered […]
-
January 1, 2014
Hackers Stole Millions Of Phone Numbers And Usernames From Snapchat — Here’s How To See If You’re OK
Hackers Stole Millions Of Phone Numbers And Usernames From Snapchat — Here’s How To See If You’re OK: Last night, hackers posted a database of 4.6 million Snapchat usernames and phone numbers online. The database appears to have been taken down in the past few hours. To check if your phone number or Snapchat user […]
-
January 1, 2014
Top 13 Cyber Security predictions for 2014
Top 13 Cyber Security predictions for 2014: Cyber security is now a topic with implications for every major line of business and market segment. Palo Alto Networks shares its 13 predictions for cyber security, the threat landscape, firewall and mobile security for 2014. 1. Securing the mobile device will be inextricably linked to securing the […]
-
December 31, 2013
DROPOUTJEEP. Can the NSA spy on every iPhone on the planet?
DROPOUTJEEP. Can the NSA spy on every iPhone on the planet?: The claims that the NSA has a backdoor into the iPhone, giving it the opportunity to spy upon virtually all activity on the device, came amid a much wider talk given yesterday by computer security researcher Jacob Applebaum (aka @ioerror) at 30C3, the 30th […]
-
December 31, 2013
7 sneak attacks used by today’s most devious hackers
7 sneak attacks used by today’s most devious hackers: Stealth attack No. 1: Fake wireless access pointsNo hack is easier to accomplish than a fake WAP (wireless access point). Anyone using a bit of software and a wireless network card can advertise their computer as an available WAP that is then connected to the real, […]