Data Security: Hot Stories

Search Result in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result in All Fields - Top 20 Stories
China Government Use its Own Encryption in Windows 10
MS announced a news that hardly impacts global OS market but may change some people's fates in future. It will allow China's government to use own encryption in Window 10. This is a horrible start. Right now there is no detail to disclose, for example, how China replaces the original encryption with own version and if the rule will apply to all computers sold in China. The deal may solve some security concerns of China government, but is raising privacy threat on other side. Where to buy computer possibly will become a new question...
By Brad Sams  View Source  
WannaCry with Fatal Errors
WannaCry isn't smart as it seems. It got $55,000 from 200,000 computer. It has some fatal errors to low its profit so little that experts doubt the creators possibly are amateurs. However it will inspire more imitators, especially those who are better technology, more professional. If this tool is used by them, the consequences will be disastrous. It indeed rises a new form of cybersecurity threat...
By Chris McHans  View Full Paper  
WannaCry and Ransomware is Active on May
Ransomware is to demand money after launching security attack. This May large scale ransomware attacks are reports in many countries. WannaCry is one the them; its name is telling the world not to touch me, or your bad day is coming. The NHS once suffered a major cyber attack and had to cancel some operations countrywide. In China, the thing even became worse. Thousands of gas stations' computer systems had been down to follow a ransomware warning....
By Cara McGoogan  View Source  
16 Hacker Makes 400 Thousands Pounds in 4 Years
An England court is focused because of a young hacker, now 20. He created a hacking tool at 16, sold to more than 100 thousand clients, and earned near 400 thousand pounds in past years. The hacking tool, actually a DDoS tool disabled countless websites and costs millions of millions loss. The society wastes its wealthy as well as the young guys waste their talents and energies...
By Simon Parkin  View Source  
Netflix Incident and Cyber Extortion Campaigns
Recently Netflix is focused among information security topics. Some attackers declared to expose its data or disrupt its web site by DDoS unless the organization pays ransoms. 10 unaired episodes from Season 5 of Netflix’ hit series "Orange Is The New Black" have been leaked. It shows that ransomware is not the only form ...
By Jai Vijayan  View Source  
Regular File Backup Against Ransomware Threat
Ransomware is becoming a new threat in information security area. If you click a malicious link in email, the consequence is hard to predicate. Your photos or files may be gone. If you didn't backup them yet and you desperately want them back, you are possibly the victim of ransomware...
By WRAL CHANNEL  View Source  
Cybersecurity Startup Exposed Hospital Data in Demos
From time to time, we heard stories of data leak. There are so many ways and causes. But can you imagine your data are exposed because a security startup demonstrated its unbeatable features? The network of El Camino Hospital, based in Santa Clara, California was such a victim for years. As reports of Wall Street Journal, hundreds of presentations probed it...
By Jeremy Kirk  View Source  
Russian Hacker Created Starter Pack Ransomware
Hackers never stop widening their businesses. Ransomware is sort of high tech and skill crime before. But a Russian hacker is changing it, who has created a starter package to run ransomware service. With this tool, low-level criminals can join into the game easily. Ramsomware and other malware, these dark technology are impacting common people both online and offline, if you don't want own privacy to become money of others...
By Zack Whittaker  View Source  
Security Flaw Forced Shutdown of Online Government
Data you submitted to government online service are safe? Not really. Manitoba, a middle Canada province, shut down dozens of online services for four days because of security flaw. The threat is on both public service and employees' data. It is still unclear how long the system was left vulnerable to hackers. The province said it was forced to take 31 online services offline when it discovered a security vulnerability in its computer system...
By Laura Glowacki  View Source  
Hackers Access to Athletes’ Medical Records
The database of the World Anti-Doping Agency becomes one of the hottest topics again. This time is due to hackers who are believed the same group that FBI officials have tied to a broad effort to influence the United States presidential election. Lots of athletes' private medical recodes are leaked from the computer network. President of the International Association of Athletics Federations apologized to the athletes whose medical records were compromised...
By REBECCA R. RUIZ  View Source  
5 biggest cybersecurity questions answered
Everything changes, either quickly or slowly. Cyber security is in the fastest end. Some horrible things is in front of you, but you even never heard it before. How can I surf the web anonymously? Is it a question? Yes, because in most cases your internet activities or behaviors are collected and shared among venders. Can hackers access my webcam? The answer is hackers can get more than webcam if they are smart and evil enough...
By Gene Richardson  View Source  
5 Reasons Not Hire Cyber security Professional
Skilled cybersecurity professionals are easy to get job. By estimating, the talent gap will be over 1.8 million in five years. However, hiring a cyber security expert isn't easy reversely. The related opening sometimes lasts for months in at least 55% organizations. It's difficult for them to decide the hiring is right or not. The most common reasons are 5:...
By Alison DeNisco  View Source  
How CIA Hackers Rate Anti Virus Software
If you are using or planning to use any computer security software, like anti-virus products, you may ask this question again, again, and again to either yourself or some others: which is the right choice to keep your privacy and secret from hackers' attack. You may get recommends from separate channels, and feel it's not a easy tradeoff. Now you hear the comments from CIA hackers, more or less you will get ideas from guys who aren't in view of business...
By Anthony Cuthbertson  View Source  
Emma Watson Photo Hacked and Sold Online
Emma Watson's computer has been hacked and she may be the new victim of privacy leak. Some rumours about these photographs have spread online. Her team has confirmed the hack, but no nude photographs of Ms Watson were leaked. One or two websites are selling the photos in encrypted way, not for Watson's privacy but for their money...
By Helena Horton  View Source  
Using Facebook Quizzes Get Personal Data
Your personal data may be stolen from some channels you fully trust. Facebook is the new one in that risk list. The report said Facebook's random online quizzes online, where one can share the result afterwards, is raising the warning. These seemingly plain questionnaires could actually be used to infiltrate your personal data...
By KHRISTIAN IBARROLA  View Source  View Cache  
Naked Pictures of Kate Moss Been Stolen
The new celebrity victim of hacker attacking is Kate Moss by recent report. Her computer somehow was visited by unknown guys, and lots of photos are believed to have been stolen. These very, very private pictures are possibly involved with her friends too. Right now the leaked stuffs aren't in public yet, hopefully they are in right encryption...
By Durhamregion  View Source  View Cache  
Outdated XML Library in ESET Leads Mac Vulnerable
Antivirus itself became threat of information security. This happened again on famous ESET Endpoint Antivirus 6 for Mac OS. A outdated XML library with a parser of 2007 included in a recent update to the product is subject to a buffer overflow bug, according to Google researchers. The parser is vulnerable to attack, allowing root-level code execution...
By Mike Wuerthele  View Source  
Encryption Apps Help White House Staffers Leak
Since Donald Trump’s inauguration, a steady stream of leaks happened around the White House. Some are innocuous, and some devastating. The question is how the stories do to media secretly. In response, Trump has launched an investigation, tweeted: "Why are there so many illegal leaks coming out of Washington?" A tiny technology flaw hole will cause fatal info leak...
By LILY HAY NEWMAN  View Source  
Sex Videos Are Safe Under Rumuki
Sex tapes are a high risk object of privacy. As long as produced, they are never totally secure. We heard lots of bad or sad stories. Zealand startup Rumuki aims the market: keep sex videos security for young lovers. The device is a prenup for sex videos with encryption, and only unlocks and shows with mutual consent. In first week of its launching, more than 1,000 devices are register...
By M. J. Coren  View Source  
How good are North Korea Hackers
Hackers aren't individuals somewhere and sometime. Today's North Korea gives an example: Bureau 121. It's just a code an organised cyber-attack elite unit in Pyongyang. Never curious such an isolated nation owns the best and brightest hackers, because it's nation behaviour and acts on behalf of the nation and its leader: Kim Jong-un...
By Dave Lee  View Source