Security This Week: The Government Really Doesn’t Seem to Like Encryption
THIS WEEK, ANDY Greenberg and Gwern Branwen uncovered the probable identity of Bitcoin creator Satoshi Nakamoto—but then again, he might be a hoaxer. We took a look at malvertising, the hack that can infect your computer even if you don’t click anything. And Anonymous announced it’s launching an online operation against national embarrassment/presidential candidate Donald Tru...
Security
Security This Week: The Government Really Doesn’t Seem to Like EncryptionTHIS WEEK, ANDY Greenberg and Gwern Branwen uncovered the probable identity of Bitcoin creator Satoshi Nakamoto—but then again, he might be a hoaxer. We took a look at malvertising, the hack that can infect your computer even if you don’t click anything. And Anonymous announced it’s launching an online operation against national embarrassment/presidential candidate Donald Tru...SecurityDecember 13, 2015, 1:48:45Security This Week: The Government Really Doesn’t Seem to Like Encryptionsource: http://www.wired.com/2015/12/security-this-week-the-government-really-doesnt-seem-to-like-encryption/ | December 13, 2015, 1:48:45
Share on Tumblr
Researchers are making the internet more secure
In 2013, an online company called Spamhaus fell victim to one of the Internet's largest-ever cyberattacks, known as a Distributed Denial of Service (DDoS) attack. Its servers were flooded with unwanted traffic from hundreds of sources, the company was temporarily forced offline, and its business was disrupted....
Security
Researchers are making the internet more secureIn 2013, an online company called Spamhaus fell victim to one of the Internet's largest-ever cyberattacks, known as a Distributed Denial of Service (DDoS) attack. Its servers were flooded with unwanted traffic from hundreds of sources, the company was temporarily forced offline, and its business was disrupted....SecurityDecember 13, 2015, 1:40:0Researchers are making the internet more securesource: http://www.sciencedaily.com/releases/2015/11/151105113744.htm | December 13, 2015, 1:40:0
Share on Tumblr
1Password for Teams offers a simple, secure way to share group passwords
AgileBits has announced a new, collaborative feature for 1Password, its password and identity management software. 1Password for Teams are a new way to use 1Password with groups of people, allowing you to easily share vaults and items with colleagues, family members, and friends. With 1Password for Teams, you'll have an easier time deploying shared vaults, along with better...
Security
1Password for Teams offers a simple, secure way to share group passwordsAgileBits has announced a new, collaborative feature for 1Password, its password and identity management software. 1Password for Teams are a new way to use 1Password with groups of people, allowing you to easily share vaults and items with colleagues, family members, and friends. With 1Password for Teams, you'll have an easier time deploying shared vaults, along with better...SecurityNovember 10, 2015, 22:14:291Password for Teams offers a simple, secure way to share group passwordssource: http://www.androidcentral.com/1password-teams-offers-simple-secure-way-share-group-passwords | November 10, 2015, 22:14:29
Share on Tumblr
Hack Brief: TalkTalk Now Says Hackers Only Hit 4 Percent of Its Users
WHEN THE UK telecom TalkTalk admitted it had been hit with a “significant and sustained cyberattack” last month, the security community imagined sophisticated Chinese hackers—not the gaggle of British teenagers who were later arrested for the breach. Now it seems TalkTalk may have overblown the damage from that breach too, raising fears of a massive data spill when in fact ju...
Security
Hack Brief: TalkTalk Now Says Hackers Only Hit 4 Percent of Its UsersWHEN THE UK telecom TalkTalk admitted it had been hit with a “significant and sustained cyberattack” last month, the security community imagined sophisticated Chinese hackers—not the gaggle of British teenagers who were later arrested for the breach. Now it seems TalkTalk may have overblown the damage from that breach too, raising fears of a massive data spill when in fact ju...SecurityNovember 8, 2015, 21:59:21Hack Brief: TalkTalk Now Says Hackers Only Hit 4 Percent of Its Userssource: http://www.wired.com/2015/11/talktalk-hack-data-breach-hit-only-157k-users/ | November 8, 2015, 21:59:21
Share on Tumblr
Security News This Week: 9 Out of 10 Websites Leak Your Data to Third Parties
THIS WEEK, HACKERS won a million dollar bounty for discovering a long-sought iOS zero-day. Federal lawmakers introduced the Stingray Privacy Act, a new bill that would require state and local lawmakers to get a warrant before using the invasive surveillance devices. The world got its first look at the full text of the Trans-Pacific Partnership trade pact. We found out the UK’s Ta...
Security
Security News This Week: 9 Out of 10 Websites Leak Your Data to Third PartiesTHIS WEEK, HACKERS won a million dollar bounty for discovering a long-sought iOS zero-day. Federal lawmakers introduced the Stingray Privacy Act, a new bill that would require state and local lawmakers to get a warrant before using the invasive surveillance devices. The world got its first look at the full text of the Trans-Pacific Partnership trade pact. We found out the UK’s Ta...SecurityNovember 8, 2015, 21:58:54Security News This Week: 9 Out of 10 Websites Leak Your Data to Third Partiessource: http://www.wired.com/2015/11/security-news-this-week-9-out-of-10-websites-leak-your-data-to-third-parties/ | November 8, 2015, 21:58:54
Share on Tumblr
CIA Email Hackers Return With Major Law Enforcement Breach
This time the group, which goes by the name Crackas With Attitude, says it gained access to an even more important target—a portal for law enforcement that grants access to arrest records and other sensitive data, including what appears to be a tool for sharing information about active shooters and terrorist events, and a system for real-time chats between law enforcement agents....
Security
CIA Email Hackers Return With Major Law Enforcement BreachThis time the group, which goes by the name Crackas With Attitude, says it gained access to an even more important target—a portal for law enforcement that grants access to arrest records and other sensitive data, including what appears to be a tool for sharing information about active shooters and terrorist events, and a system for real-time chats between law enforcement agents....SecurityNovember 8, 2015, 21:58:19CIA Email Hackers Return With Major Law Enforcement Breachsource: http://www.wired.com/2015/11/cia-email-hackers-return-with-major-law-enforcement-breach/ | November 8, 2015, 21:58:19
Share on Tumblr
Linux Ransomware Is Now Attacking Webmasters
A new bit of ransomware is now attacking Linux-based machines, specifically the folders associated with serving web pages. Called Linux.Encoder.1 the ransomware will encrypt your MySQL, Apache, and home/root folders. The system then asks for a single bitcoin to decrypt the files....
Security
Linux Ransomware Is Now Attacking WebmastersA new bit of ransomware is now attacking Linux-based machines, specifically the folders associated with serving web pages. Called Linux.Encoder.1 the ransomware will encrypt your MySQL, Apache, and home/root folders. The system then asks for a single bitcoin to decrypt the files....SecurityNovember 7, 2015, 1:4:33Linux Ransomware Is Now Attacking Webmasterssource: http://techcrunch.com/2015/11/06/linux-ransomware-is-now-attacking-webmasters/ | November 7, 2015, 1:4:33
Share on Tumblr
Teen hackers have broken into law enforcement and employee records
The same group that breached CIA director John Brennan's personal email last month seems to have stayed busy. A new cache of data has been published, first discovered by Motherboard and apparently from the same group of hackers. The data contains the names, phone numbers, and email addresses of more than 2,000 law enforcement officers, military officers, and government empl...
Security
Teen hackers have broken into law enforcement and employee recordsThe same group that breached CIA director John Brennan's personal email last month seems to have stayed busy. A new cache of data has been published, first discovered by Motherboard and apparently from the same group of hackers. The data contains the names, phone numbers, and email addresses of more than 2,000 law enforcement officers, military officers, and government empl...SecurityNovember 7, 2015, 0:54:4Teen hackers have broken into law enforcement and employee recordssource: http://www.theverge.com/2015/11/6/9684038/teen-hackers-law-enforcement-fbi-employee-records | November 7, 2015, 0:54:4
Share on Tumblr
The CISO, the CIO, the CEO, or you: Who is really responsible for cybersecurity?
The security threat continues to grow and IT leaders struggle to deal with an ever-increasing danger. Yet the cyber threat, however significant, only forms one element of corporate security. So who should be responsible for security and how can businesses adopt a more proactive stance to the threats they face? Five IT experts give their views....
Security
The CISO, the CIO, the CEO, or you: Who is really responsible for cybersecurity?The security threat continues to grow and IT leaders struggle to deal with an ever-increasing danger. Yet the cyber threat, however significant, only forms one element of corporate security. So who should be responsible for security and how can businesses adopt a more proactive stance to the threats they face? Five IT experts give their views....SecurityOctober 25, 2015, 4:3:54The CISO, the CIO, the CEO, or you: Who is really responsible for cybersecurity?source: http://www.zdnet.com/article/who-is-really-responsible-for-cybersecuritythe-ciso-the-cio-the-ceo-or-you-who-is-really-responsible/ | October 25, 2015, 4:3:54
Share on Tumblr
Hackers Love Your Social Media Shares. Here’s Why.
Social media has become an indispensable part of our modern lives. You are most likely more connected to more online social circles now than ever before. The problem here is that you love to share, perhaps even a little too much. Yes, we were taught that sharing is caring, but oversharing will lead to privacy and security breaches....
Security
Hackers Love Your Social Media Shares. Here’s Why.Social media has become an indispensable part of our modern lives. You are most likely more connected to more online social circles now than ever before. The problem here is that you love to share, perhaps even a little too much. Yes, we were taught that sharing is caring, but oversharing will lead to privacy and security breaches....SecurityOctober 15, 2015, 23:11:7Hackers Love Your Social Media Shares. Here’s Why.source: http://www.hongkiat.com/blog/social-media-hackers-paradise/ | October 15, 2015, 23:11:7
Share on Tumblr
Is your digital information more at risk today than it was ten years ago?
It's easy to form the mental image of a hacker hunched over a computer, probing a way to get your personal information, whether to sell it, acquire credit cards in your name or use your health insurance....
Security
Is your digital information more at risk today than it was ten years ago?It's easy to form the mental image of a hacker hunched over a computer, probing a way to get your personal information, whether to sell it, acquire credit cards in your name or use your health insurance....SecurityOctober 15, 2015, 23:5:57Is your digital information more at risk today than it was ten years ago?source: http://www.sciencedaily.com/releases/2015/10/151013103623.htm | October 15, 2015, 23:5:57
Share on Tumblr
New tool expands tracking of personal data on the Web
Researchers have developed a second-generation tool called 'Sunlight' that matches user-tailored ads and recommendations to tidbits of information supplied by users at a greater scale and level of accuracy than its predecessor, XRay....
Security
New tool expands tracking of personal data on the WebResearchers have developed a second-generation tool called 'Sunlight' that matches user-tailored ads and recommendations to tidbits of information supplied by users at a greater scale and level of accuracy than its predecessor, XRay....SecurityOctober 15, 2015, 23:2:26New tool expands tracking of personal data on the Websource: http://www.sciencedaily.com/releases/2015/10/151009185433.htm | October 15, 2015, 23:2:26
Share on Tumblr