Data Security: Hot Stories

Search Result in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result in All Fields - Top 20 Stories
New Android Trojan Red Alert 2.0 Is Coming
Do you like to download banks's apps and used to do financial transactions online. It's special time to be cautious. A new Android Trojan “Red Alert 2.0” has been discovered, which has targeted banks, and similar high value related apps. This kind of malware, trojan and bank data targeted, was found before. However, this one is cutting edge on either functions or disguise. It's more dangerous and more difficult to uncover. Keep an eye on your Android and account...
By Josh Mayfield  View Source  
Hackers Could Program Sex Robots to Kill Owners
Robots will go to common family in near future. They are becoming the targets of dark hackers. The most risk possibly is the sex robot. One reason is its market seems better than others and will enter home earlier. Another reason, it should be the root cause, its job usually is behind the backdrop. Danger tricks or actions are convenient to hide. A cybersecurity scientist has issued a bizarre warning that sex robots could one day kill their owners if hackers can get inside their heads...
By George Harrison  View Source  
Equifax Hack Showing SSN Makes Us Vulnerable
Equifax suffered a massive data breach. The information accessed primarily includes names, Social Security numbers, birth dates, addresses and, in some instances, driver’s license numbers. In addition, credit card numbers for approximately 209,000 U.S. consumers, and certain dispute documents with personal identifying information for approximately 182,000 U.S. consumers, were accessed...
By Elaine Ou  View Source  
Trend Micro Is Fighting Locky Ransomware Variants
Locky ransomware isn't new, but recent weeks an alert is urgent: one variant of this ransomware is coming under one of the largest malware campaigns in the second half of 2017: 23 million spam emails. According to Trend Micro, the ransomware is not likely to be on the scale of 'Wannacrypt' and 'Petya' that relied on Microsoft vulnerability in Windows XP. Only if you deal with the spam email in right way: delete it...
By IANS  View Source  
US Navy Collisions Stoke Cyber Threat for GPS Systems
This 4 US navy war ships got collision accidents in close areas. Each case seems having own cause but the Pentagon also doubts there are some connections among them, especially electronic guidance systems that the navy relies heavier and heavier in past decades are now an target of cyber attack. For example, some reports uncovered GPS is in short list of hackers' targets...
By Tribune News  View Source  
U.S. employee data breach tied to China Hackers
Even if your data and your family members' data are collected and kept by US government, they aren't safe as the government promised. A Chinese hacking group is suspected of stealing sensitive information about millions of current and former U.S. government employees. FBI arrested some of the group by noticed "Deep Panda's", a hacker tool also used in Hong Kong to monitor democracy force, may hacked sensitive information of about 22.1 million federal employees, including their families and friends...
By Joseph Menn  View Source  
Credit Card vs Medical Record in Hacker Eyes
We heard news about hacking hospitals from time to time, the latest victim is a 550-bed facility in Buffalo, NY. Hackers' first target seems medical industry, at least as often as financial industry. The reason behind this is information black market: on average, hackers can sell credit card numbers for 10 to 15 cents each, but a medical record could be worth between $30 and $500...
By CBS News  View Source  
One Mistake People Make Using Public Wi-Fi
Using public Wi-Fi isn't a right option in many cases, especially you may log in any accounts, either your bank or your Facebook. A basic rule is that avoid doing anything you would not want anyone in the world to know on public Wi-Fi. No matter in busy café or big-name hotel, public Wi-Fi is a major liability in view of security. The real risk isn't in your computer but the router that the Wi-Fi goes through...
By Kim Komando  View Source  
The 10 Windows Group Policy Risk Your Data Security
Microsoft Windows computers are believed to have higher security risk than Unix computers. For common users the real threat isn't that the OS is not so strong as others, but settings is too complicated to get them right, for example, Windows 8.1 has more than 3,700 settings. Group Policy is supposed as a security tool to manage office users, however it possibly causes security issue due to misuse it...
By Roger A. Grimes  View Source  
Kaspersky Lab Hands Out Free Anti-Virus
Free Kaspersky anti-virus is coming! The famous information security vendor announced that it will be offering anti-virus software for everyone by rolling out the base version globally at no charge. Free is a good marketing magic, a huge installation jump will be expected, and may possibly change the market share structure of big information security players. It's a good news for consumers, but some additional feature aren't in free list. It means Business is business, no free bread ...
By Asha McLean  View Source  
Rehab Camp for Young Cyber-Attackers on Right Track
Cyber attack is crime, but never fun. The worse and worse cyber safety issue is largely due to some teenagers never think cyber attack is definitely a crime and risks to be put into jail, so that ruin life on crime entrance. Using a key to try other's door is a crime, so is to try other's email. However teenagers possibly don't completely agree with this. To decrease the cyber attacker's base, and divert young attackers away from a life of crime, NCA will run rehab camp to help them back to...
By BBC Technology  View Source  
Reveals Easy Way to Hack Facebook Account
When you play with big guys, never give up protecting own privacy. Yahoo once offered some infamous examples. So did other information giants. Facebook is a target of hackers for a long time. It lets you add phone numbers or other contact ways - WhatsApp or Messenger or Snapchat or Hangouts or whatever - for social networks, but can it keep them safe? Unfortunately hackers indeed get them someway...
By James Martindale  View Source  
Android Malware Leak Private Photos To Friends
Do you mind private photos to be sent to friends? An new Android ransomware possibly asks you similar questions. If you do mind that happens, read this paper carefully. Some clues indicates the threat is distributed by Google Play. Thousands of Android users may be at risk to a malware which attempts to extort victims by threatening to leak personal information, including photos, unless a 'ransom' is paid to the hackers...
By Jason Murdock  View Source  
Kaspersky Lab Open Source Code To Prove Malicious-less
After you install a security software or app, are you safer than before? The answer is possible, depending on if you get a right security product. The new argument is on Kaspersky, a very famous and successful information security vendor. The US Senate is considering to ban the use of Kaspersky Lab software by government agencies. The company offered to source code and testify in front of Congress "to prove that we don't behave maliciously." However, if a security software really opens all its code, who will trust it's strong enough to protect us ...
By Mathew J. Schwartz  View Source  
Cyber Attack Sweeps Globe Seems WannaCry Linked
A new global computer virus attacked from Tuesday; many Russian and Ukrainian targets, like oil companies and banks, are attacked by a virus similar to the ransomware WannaCry. The virus copied codes from earlier ransomware campaigns known as "Petya" and "GoldenEye." Technically, it's not a new one; but it's more aggressive in spreading and attacking. The good news is update patch for WannaCry may protect some machines from the new virus...
By Jack Stubbs  View Source  
The World Is Not Ready For Cyber Attack
Cyber attack is a high frequent word in information industry as well as in social news. When people talk about it, it seems at least some of us knew the threat and can deal with whatever. The truth isn't so optimistic. The NSA is supposed to run as a info security agency, however, its by-products - cyber weapons or say back doors - are stolen ...
By NICOLE PERLROTH  View Source  
Reinforce Small and Medium Enterprise Against Cyber Threats
For small or medium size enterprise (SME) cyber security is a special challenge. Its cash or budget isn't as much as big guys, but its cyber risk is as same as latter. SME, many of them are in private sector, usually cannot afford a solid team or service to protect from cyber threats. They have to compromise some information security requirement in view of pure business pursuit. However, there are still some effective ways for them to drive cyber threats away...
By Sneha Paul  View Source  
Facebook Moderators Information Leaked
You work for a top IT company but your identity has been exposed because of a security lapse. The terrorist groups are review more than 1000 moderators of Facebook. One moderator lives in constant fear for his safety because he believe his job's detail - to stop terrorist users - is uncovered...
By Olivia Solon  View Source  
What have we learned from WannaCry
WannaCry demos a sample of ransomware, which has been a growing threat in recent years. Cyber security is a key area of FBI. It said more than 4,000 ransomware attacks every day since 2016. In cyber space ransom seems easier , lower cost, and much higher frequent. The WannaCry ransomware attack gives computer owners a surprise as well as a lesson: how to defend from cyber ransom is becoming a question widespread ...
By Michelle Drolet  View Source  
WannaCry Driving Scareware and Bogus Anti-Virus Downloads
WannaCry let's know that we may meet not only fake ransomware but also fake anti-virus app. WannaCry pushed people into install anti-virus app in panic, but some of them are tricked by bogus software. Fake anti-virus apps account for 12.2% in the Google Play store. It said one in ten are infected by real malware just because of the threat of WannaCry...
By Dark Reading  View Source