Data Security: Hot Stories

Search Result for Hackers in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result for Hackers in All Fields - Top 20 Stories
Reveals Easy Way to Hack Facebook Account
When you play with big guys, never give up protecting own privacy. Yahoo once offered some infamous examples. So did other information giants. Facebook is a target of hackers for a long time. It lets you add phone numbers or other contact ways - WhatsApp or Messenger or Snapchat or Hangouts or whatever - for social networks, but can it keep them safe? Unfortunately hackers indeed get them someway...
By James Martindale  View Source  
Android Malware Leak Private Photos To Friends
Do you mind private photos to be sent to friends? An new Android ransomware possibly asks you similar questions. If you do mind that happens, read this paper carefully. Some clues indicates the threat is distributed by Google Play. Thousands of Android users may be at risk to a malware which attempts to extort victims by threatening to leak personal information, including photos, unless a 'ransom' is paid to the hackers...
By Jason Murdock  View Source  
Russian Hackers Linked To Instagram of Britney Spears
Russian Hackers hided a malware operation in Britney Spears' Instagram account, according to Slovakian cyber-security firm ESET. The research found the hackers are connected to Turla, which once attack internet systems of the embassies and governments of a number of Eastern European nations in 2014...
By Mary Papenfuss  View Source  
FBI Suspects Russian Hackers Behind Qatar Crisis
Qatar is a hot word in last week. It actually leads a new round of Middle East crisis. When the story is developing unpredictably, its trigger has been disappeared. At very beginning the crisis starts from a news of Qatar government's website. However, Qatar deleted the news quickly and said it's fake and posted by hackers. Hacker is becoming a part of politics...
By From Spiegel  View Source  
Evidence of North Korea in Ransomware Attack
More evidence shows that North Korean hackers are behind the global ransomware attack. Ransomware's nature is crime not technology or definitely not high technology. If you want money and don't fear police, ransom is a quick way to create fortunate. None doubts North Korean needs money, and as for police ...
By NICOLE PERLROTH  View Source  
16 Hacker Makes 400 Thousands Pounds in 4 Years
An England court is focused because of a young hacker, now 20. He created a hacking tool at 16, sold to more than 100 thousand clients, and earned near 400 thousand pounds in past years. The hacking tool, actually a DDoS tool disabled countless websites and costs millions of millions loss. The society wastes its wealthy as well as the young guys waste their talents and energies...
By Simon Parkin  View Source  
Russian Hacker Created Starter Pack Ransomware
Hackers never stop widening their businesses. Ransomware is sort of high tech and skill crime before. But a Russian hacker is changing it, who has created a starter package to run ransomware service. With this tool, low-level criminals can join into the game easily. Ramsomware and other malware, these dark technology are impacting common people both online and offline, if you don't want own privacy to become money of others...
By Zack Whittaker  View Source  
Security Flaw Forced Shutdown of Online Government
Data you submitted to government online service are safe? Not really. Manitoba, a middle Canada province, shut down dozens of online services for four days because of security flaw. The threat is on both public service and employees' data. It is still unclear how long the system was left vulnerable to hackers. The province said it was forced to take 31 online services offline when it discovered a security vulnerability in its computer system...
By Laura Glowacki  View Source  
Hackers Access to Athletes’ Medical Records
The database of the World Anti-Doping Agency becomes one of the hottest topics again. This time is due to hackers who are believed the same group that FBI officials have tied to a broad effort to influence the United States presidential election. Lots of athletes' private medical recodes are leaked from the computer network. President of the International Association of Athletics Federations apologized to the athletes whose medical records were compromised...
By REBECCA R. RUIZ  View Source  
5 biggest cybersecurity questions answered
Everything changes, either quickly or slowly. Cyber security is in the fastest end. Some horrible things is in front of you, but you even never heard it before. How can I surf the web anonymously? Is it a question? Yes, because in most cases your internet activities or behaviors are collected and shared among venders. Can hackers access my webcam? The answer is hackers can get more than webcam if they are smart and evil enough...
By Gene Richardson  View Source  
How CIA Hackers Rate Anti Virus Software
If you are using or planning to use any computer security software, like anti-virus products, you may ask this question again, again, and again to either yourself or some others: which is the right choice to keep your privacy and secret from hackers' attack. You may get recommends from separate channels, and feel it's not a easy tradeoff. Now you hear the comments from CIA hackers, more or less you will get ideas from guys who aren't in view of business...
By Anthony Cuthbertson  View Source  
Using Facebook Quizzes Get Personal Data
Your personal data may be stolen from some channels you fully trust. Facebook is the new one in that risk list. The report said Facebook's random online quizzes online, where one can share the result afterwards, is raising the warning. These seemingly plain questionnaires could actually be used to infiltrate your personal data...
By KHRISTIAN IBARROLA  View Source  View Cache  
Naked Pictures of Kate Moss Been Stolen
The new celebrity victim of hacker attacking is Kate Moss by recent report. Her computer somehow was visited by unknown guys, and lots of photos are believed to have been stolen. These very, very private pictures are possibly involved with her friends too. Right now the leaked stuffs aren't in public yet, hopefully they are in right encryption...
By Durhamregion  View Source  View Cache  
How good are North Korea Hackers
Hackers aren't individuals somewhere and sometime. Today's North Korea gives an example: Bureau 121. It's just a code an organised cyber-attack elite unit in Pyongyang. Never curious such an isolated nation owns the best and brightest hackers, because it's nation behaviour and acts on behalf of the nation and its leader: Kim Jong-un...
By Dave Lee  View Source  
1 Million Wordpress Pages Are Attacked
Security flaw is in almost every systems. WordPress blogging software is reported that a small flaw has let hackers attack and deface tens of thousands of web sites that trust the open source blog, and more than 1.5 million pages have been ruined. Hackers not only spoil the pages, what they really did are to take over these websites...
By Dave Lee  View Source  
Don't Do Cyber Crime If Can't Do Jail Time
You may heard the old adage "Don't do the crime if you can't do the time". It's the same to young cyber criminals. A 17-year-old was sentenced to 12 months rehabilitation after hacking British telecom; another 17-year-old was sentenced to four years in Massachusetts for leading a group of villainous hackers. Hacker sometimes means go to jail.
By Steve Morgan  View Source  View Cache  
POPULAR IOS APPS VULNERABLE TO TLS INTERCEPTION ATTACKS
Apps are main risk of your iPhone data leak. By Sudo Security Group, 19 of 76 apps are high-risk. Your financial or medical credentials, authentication tokens, or any else could be siphoned off by hackers. Local network, namely Wi-Fi, is the core of these risks. You cannot always keep your iPhone from Wi-Fi, a few seconds are enough for attackers to transfer credentials through unsafe apps...
By Thomas Fox-Brewster  View Source  
Will Trump Let Arab Hackers To Make America Safe Again
The first of first for safe is trust. Arab hackers are becoming a new issue for America safe. A new case is that Cairo-born Mohamed Saher has been told he shouldn't leave U.S., he works for a security firm, NSS Labs, and his boss doubts Trump's travel ban may finally cover more countries...
By Thomas Fox-Brewster  View Source  
The car hackers of Fremont
Hackers years ago demonstrated an ability to commandeer, remotely, a vehicle’s transmission and steering, although the known cases have not been random, broad-based attacks but instead were aimed at specific vulnerabilities in specific cars.
By David R. Baker  View Source  
Urge Clinton to Challenge Election Results for Hacker Issue
Hillary Clinton's campaign is being urged by a special group, top computer scientists or top good hackers, who believe they have found evidence of bad hackers to cheat the result, and doubt this happened in multiple states. So they are calling for a recount of vote in Wisconsin, Michigan and Pennsylvania, ....
By Dan Merica  View Source