Data Security: Hot Stories

Search Result in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result in All Fields - Top 20 Stories
Spectre and Meltdown Explained: What They Are and How They Work
As you may have heard in the news, there are 3 significant flaws on all computer systems running modern hardware called Meltdown and Spectre, the latter actually means 2 flaws. If exploited, these flaws can expose sensitive information on your computer (e.g. passwords, encryption keys, company documents). The risks are in nearly every computer chip manufactured in the last 20 years. Is there a design to tolerate fundamental security flaws for higher performance? ...
By Josh Fruhlinger  View Source  
Confessions of Former Hacker: 5 Techniques to Make More Secure Online
We spend money and time on privacy secret in this or that way, but do we know how the hackers think about? The guy, who was on the US government’s “Most Wanted” list and finally served 5 years in prison for hacking mobile phones, recently gave some suggestions to to safeguard personal information online: The first one is to use a password manager. Is is a good idea, especially which is from a hacker? At least, I dislike password manager because it hints hackers what is the gateway of my privacy...
By Jeanie Ahn  View Source  
Hackers Spying on Sonos and Bose Smart Systems
Anything attached to internet, it will be potential object of hackers. The warnings about toys isn't passed completely, the home speakers are reported to have a number of security gaps that could give anyone access to the device from a remote location. Some famous brands, like Sonos and Bose, are in the warning list. As a matter of fact, the internet connected devices give the physical accessing of hackers, it opens a crack, small or big, to cause home security issues...
By CHEYENNE MACDONALD  View Source  
Is your toy spying on you? Find out how to hack the hackers
In holiday season, toys are the commonest presents of boys and girls. More and more smart toys run in bedroom, living room, or bathroom, which are bringing new privacy issues or threats. FBI once raised warnings on toys, e.g. Grinch-like, which said toys connected to the Internet could be a target of hackers to listen in on conversations or to steal information related household. Read the paper and an eye on kid's toys...
By AP New York  View Source  
Chinese Hacker Groups To Shift Focus To India In 2018
Hackers aren't identical to criminals, although common people usually feel the risks from them and even leak data or lose money. Some hacker groups are actually backed by nation-states, called as APTs (Advanced Persistent Threat). It's one reason why cyber security situation is worse and malware is more. The recent reports disclosed Chinese APT groups are shifting focus in 2018 to India and other south Asia counties as a part of Beijing's global market goal. It's time to check if your data center is safe...
By Indo-Asian News  View Source  
Hacking the House: MPs Have to Care about Cyber Security
Is it common to share login passwords with your colleagues? At least this happens in the House of Commons. If an assistant can login to a MP's computer and somehow uses it to view pornography, the story isn't just limited in broken office code. The true risk is these sort of websites are the main distributers of malware, either spyware or ransomware. Considering the MP's computers have lots of classified data and files, hackers may get inspiration from recent porn website scandal there...
By Rory Cellan-Jones  View Source  
Uber Pays $100,000 to Hacker for 57M Accounts Leak
Uber is facing a moment of truth. It needs to clean up its act. This company have our address and credit card information, and even details of travel history. It admitted a serious data leak was hidden: hackers breached and gained access to 57 million user accounts. What the Uber did is to pay $100,000 to hackers to delete the data. None argue it's deal with criminals. Does Uber really think customers' privacy is a small trade with hackers? They trusts hackers, but we have different opinion...
By Jake Novak  View Source  
North Korean Malware Still Lurks in Computers Worldwide
The US Department of Homeland Security issued an alert about a hacker group "Hidden Cobra" also known as "Lazarus" that run a victims' networks and may launch further network exploitation. This hacker group is believed related to North Korea. Last month, Britain had blamed the country for being behind the WannaCry cyber attack in May. The malware had infected lots of computers of 150 countries, and even some Britain's hospitals had to cancel scheduled operations. FBI doubts Volgmer "backdoor Trojan" is the next...
By WION Web Team  View Source  
Texas Gunman Locked iPhone Renews Encryption Debate
When you heard FBI failed to unlock the cellphone of the Texas gunman, what do you think? Yahoo once leaked almost everyone's data to hackers, but Apple is fighting to protect privacy of murders like this shooter. Are they really so different? This sad story is reigniting the debate over encryption and government access to secured communications. It's just a blooding commerce chance for some companies and far away the nature: we must punish criminals either online or by gun...
By SAMANTHA RAPHELSON  View Source  
Guess Who Is Dating With You: A Game of Hackers
Researchers in Kaspersky are evaluating some popular dating apps. It's said that dating apps are new targets of some hacker organizations. Why? People in love are easy to cheat and are open to spend money. The recent reports are as estimation: multiple vulnerabilities are discovered and some of them leak important private data. Because data apps lack basic data protection investment, you may date with hackers who know you everything, such a terrible scenario! ...
By Kaspersky Lab  View Source  
Kaspersky Confirms It Downloaded Secret NSA Tools
Kaspersky is anti-virus and cyber security company. If someday you hear it steal hacker tools from NSA, aren't surprised. Hackers and anti-virus software are actually in same industry and share same technology base. The U.S. government ordered Kaspersky's software to be removed from government owned computers last month because of meddling in the 2016 presidential election. Now the questions is: The security software is safe itself?
By Shane Savitsky  View Source  
Top 10 Passwords Deciphered Less Than A SECOND
When you choose own password, either simple or complex, you usually don't have extra payment. So, why do select a simpler one? The top 10 commonest passwords can be deciphered in less than a SECOND in hacker world. It means totally useless in front of security attack. Complex passwords, however, show us another story. A security expert reveals how to create one that will take 227 MILLION years to crack...
By SIOFRA BRENNAN  View Source  
2018 AVG Internet Security: A Premium Antivirus Suite
AVG has a big advantage in the free antivirus market. Most of us know AVG because of AVG Free. Now the free stuff is still there, but the worse Internet security trend is bringing new business chances to the company. The logic is you love the free stuff so much that you’ll eventually upgrade to one of its paid products. Its AVG Internet Security, flagship product of next generation PC security, integrates main crucial features and is priced at $70,...
By Ian Paul  View Source  
Computer Anti-Virus Scam Cost 2 Durham Region Guys More Than $32k
You buy anti-virus software to protect privacy, but the result is your losing lots of money. Police are warning about a computer scam after two Durham Region residents lost more than $32,000. The scammer called victims to sell them software protection. After a few months the deal done, they called back saying there was an issue with the software, and that the purchase price will be returned to the victim’s bank account...
By National Post  View Source  
Kaspersky Joined Avian Presents Kaspersky Internet Security 2018
The modern household is changing, on average, it cares for 2.4 people , 0.3 pets and now also 6.3 connected devices. With devices playing such a prominent role in today's average home, Kaspersky Lab launched the updated version, namely Kaspersky Internet Security 2018, to help people care for their devices from ransomware protection to parents control...
By Daily Mirror  View Source  
Yahoo: All 3 Billion Accounts Breached in 2013
The secret is finally uncovered by Yahoo itself: its entire user base of 3 billion accounts was compromised by an August 2013 data breach. Back to that year and that moment, Yahoo said another tone: 1 billions accounts may be impacted. Although it's a large number, as a user of Yahoo, you and me, possibly think we aren't in the victim group. Now the truth isn't just triple the initial report, but the entire user base were compromised! So who do we trust to protect our privacy? The IT giant, or ourselves?
By Jeremy Kirk  View Source  
ESET Report Hackers Hijack Computers to Make Money
ESET reported a new type of crime of hackers: hijacking victim computers to mine cryptocurrency. Its researchers uncovered the profitable hacking. One guy aimed Windows servers and infected hundreds of them to run a mining malware, which steals cpu and memory resources to generate $63,000 in 3 months. This is just one case. Because the hackers want to hijack the victims to make money, the malware is hidden considerably and not easy to view...
By Joon Ian Wong  View Source  
New Android Trojan Red Alert 2.0 Is Coming
Do you like to download banks's apps and used to do financial transactions online. It's special time to be cautious. A new Android Trojan “Red Alert 2.0” has been discovered, which has targeted banks, and similar high value related apps. This kind of malware, trojan and bank data targeted, was found before. However, this one is cutting edge on either functions or disguise. It's more dangerous and more difficult to uncover. Keep an eye on your Android and account...
By Josh Mayfield  View Source  
Hackers Could Program Sex Robots to Kill Owners
Robots will go to common family in near future. They are becoming the targets of dark hackers. The most risk possibly is the sex robot. One reason is its market seems better than others and will enter home earlier. Another reason, it should be the root cause, its job usually is behind the backdrop. Danger tricks or actions are convenient to hide. A cybersecurity scientist has issued a bizarre warning that sex robots could one day kill their owners if hackers can get inside their heads...
By George Harrison  View Source  
Equifax Hack Showing SSN Makes Us Vulnerable
Equifax suffered a massive data breach. The information accessed primarily includes names, Social Security numbers, birth dates, addresses and, in some instances, driver’s license numbers. In addition, credit card numbers for approximately 209,000 U.S. consumers, and certain dispute documents with personal identifying information for approximately 182,000 U.S. consumers, were accessed...
By Elaine Ou  View Source