Data Security: Hot Stories

Search Result in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result in All Fields - Top 20 Stories
Regular File Backup Against Ransomware Threat
Ransomware is becoming a new threat in information security area. If you click a malicious link in email, the consequence is hard to predicate. Your photos or files may be gone. If you didn't backup them yet and you desperately want them back, you are possibly the victim of ransomware...
By WRAL CHANNEL  View Source  
Cybersecurity Startup Exposed Hospital Data in Demos
From time to time, we heard stories of data leak. There are so many ways and causes. But can you imagine your data are exposed because a security startup demonstrated its unbeatable features? The network of El Camino Hospital, based in Santa Clara, California was such a victim for years. As reports of Wall Street Journal, hundreds of presentations probed it...
By Jeremy Kirk  View Source  
Russian Hacker Created Starter Pack Ransomware
Hackers never stop widening their businesses. Ransomware is sort of high tech and skill crime before. But a Russian hacker is changing it, who has created a starter package to run ransomware service. With this tool, low-level criminals can join into the game easily. Ramsomware and other malware, these dark technology are impacting common people both online and offline, if you don't want own privacy to become money of others...
By Zack Whittaker  View Source  
Security Flaw Forced Shutdown of Online Government
Data you submitted to government online service are safe? Not really. Manitoba, a middle Canada province, shut down dozens of online services for four days because of security flaw. The threat is on both public service and employees' data. It is still unclear how long the system was left vulnerable to hackers. The province said it was forced to take 31 online services offline when it discovered a security vulnerability in its computer system...
By Laura Glowacki  View Source  
Hackers Access to Athletes’ Medical Records
The database of the World Anti-Doping Agency becomes one of the hottest topics again. This time is due to hackers who are believed the same group that FBI officials have tied to a broad effort to influence the United States presidential election. Lots of athletes' private medical recodes are leaked from the computer network. President of the International Association of Athletics Federations apologized to the athletes whose medical records were compromised...
By REBECCA R. RUIZ  View Source  
5 biggest cybersecurity questions answered
Everything changes, either quickly or slowly. Cyber security is in the fastest end. Some horrible things is in front of you, but you even never heard it before. How can I surf the web anonymously? Is it a question? Yes, because in most cases your internet activities or behaviors are collected and shared among venders. Can hackers access my webcam? The answer is hackers can get more than webcam if they are smart and evil enough...
By Gene Richardson  View Source  
5 Reasons Not Hire Cyber security Professional
Skilled cybersecurity professionals are easy to get job. By estimating, the talent gap will be over 1.8 million in five years. However, hiring a cyber security expert isn't easy reversely. The related opening sometimes lasts for months in at least 55% organizations. It's difficult for them to decide the hiring is right or not. The most common reasons are 5:...
By Alison DeNisco  View Source  
How CIA Hackers Rate Anti Virus Software
If you are using or planning to use any computer security software, like anti-virus products, you may ask this question again, again, and again to either yourself or some others: which is the right choice to keep your privacy and secret from hackers' attack. You may get recommends from separate channels, and feel it's not a easy tradeoff. Now you hear the comments from CIA hackers, more or less you will get ideas from guys who aren't in view of business...
By Anthony Cuthbertson  View Source  
Emma Watson Photo Hacked and Sold Online
Emma Watson's computer has been hacked and she may be the new victim of privacy leak. Some rumours about these photographs have spread online. Her team has confirmed the hack, but no nude photographs of Ms Watson were leaked. One or two websites are selling the photos in encrypted way, not for Watson's privacy but for their money...
By Helena Horton  View Source  
Using Facebook Quizzes Get Personal Data
Your personal data may be stolen from some channels you fully trust. Facebook is the new one in that risk list. The report said Facebook's random online quizzes online, where one can share the result afterwards, is raising the warning. These seemingly plain questionnaires could actually be used to infiltrate your personal data...
By KHRISTIAN IBARROLA  View Source  View Cache  
Naked Pictures of Kate Moss Been Stolen
The new celebrity victim of hacker attacking is Kate Moss by recent report. Her computer somehow was visited by unknown guys, and lots of photos are believed to have been stolen. These very, very private pictures are possibly involved with her friends too. Right now the leaked stuffs aren't in public yet, hopefully they are in right encryption...
By Durhamregion  View Source  View Cache  
Outdated XML Library in ESET Leads Mac Vulnerable
Antivirus itself became threat of information security. This happened again on famous ESET Endpoint Antivirus 6 for Mac OS. A outdated XML library with a parser of 2007 included in a recent update to the product is subject to a buffer overflow bug, according to Google researchers. The parser is vulnerable to attack, allowing root-level code execution...
By Mike Wuerthele  View Source  
Encryption Apps Help White House Staffers Leak
Since Donald Trump’s inauguration, a steady stream of leaks happened around the White House. Some are innocuous, and some devastating. The question is how the stories do to media secretly. In response, Trump has launched an investigation, tweeted: "Why are there so many illegal leaks coming out of Washington?" A tiny technology flaw hole will cause fatal info leak...
By LILY HAY NEWMAN  View Source  
Sex Videos Are Safe Under Rumuki
Sex tapes are a high risk object of privacy. As long as produced, they are never totally secure. We heard lots of bad or sad stories. Zealand startup Rumuki aims the market: keep sex videos security for young lovers. The device is a prenup for sex videos with encryption, and only unlocks and shows with mutual consent. In first week of its launching, more than 1,000 devices are register...
By M. J. Coren  View Source  
How good are North Korea Hackers
Hackers aren't individuals somewhere and sometime. Today's North Korea gives an example: Bureau 121. It's just a code an organised cyber-attack elite unit in Pyongyang. Never curious such an isolated nation owns the best and brightest hackers, because it's nation behaviour and acts on behalf of the nation and its leader: Kim Jong-un...
By Dave Lee  View Source  
1 Million Wordpress Pages Are Attacked
Security flaw is in almost every systems. WordPress blogging software is reported that a small flaw has let hackers attack and deface tens of thousands of web sites that trust the open source blog, and more than 1.5 million pages have been ruined. Hackers not only spoil the pages, what they really did are to take over these websites...
By Dave Lee  View Source  
Cyber security Wizards Come from Hogwarts?
Oxford, Cambridge, or Hogwarts? New cyber security experts don't come from Hogwarts. Let's view the history, the government ran some ultra-secret code & cipher schools to prepare talents for World War Two. For current information safety circumstance, the government needs more hands and minds to keep data secure. The real wizards won't come from fake schools like Hogwarts...
By Mark Flegg  View Source  
Blackmail David Beckham: 1 M Or Email Leak
David Beckham is usually in news. This time he becomes a keyword in computer security pages. He and his team refused blackmailers a deal of a £1 million. The sequence was some negative emails really leaked. David did a right thing: say no to cyber criminals. But now the society starts to move the focus to what he said in private emails...
By Kenina Christi  View Full Paper  
Don't Do Cyber Crime If Can't Do Jail Time
You may heard the old adage "Don't do the crime if you can't do the time". It's the same to young cyber criminals. A 17-year-old was sentenced to 12 months rehabilitation after hacking British telecom; another 17-year-old was sentenced to four years in Massachusetts for leading a group of villainous hackers. Hacker sometimes means go to jail.
By Steve Morgan  View Source  View Cache  
POPULAR IOS APPS VULNERABLE TO TLS INTERCEPTION ATTACKS
Apps are main risk of your iPhone data leak. By Sudo Security Group, 19 of 76 apps are high-risk. Your financial or medical credentials, authentication tokens, or any else could be siphoned off by hackers. Local network, namely Wi-Fi, is the core of these risks. You cannot always keep your iPhone from Wi-Fi, a few seconds are enough for attackers to transfer credentials through unsafe apps...
By Thomas Fox-Brewster  View Source