Data Security: Hot Stories

Search Result for Hackers in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result for Hackers in All Fields - Top 20 Stories
Texas Gunman Locked iPhone Renews Encryption Debate
When you heard FBI failed to unlock the cellphone of the Texas gunman, what do you think? Yahoo once leaked almost everyone's data to hackers, but Apple is fighting to protect privacy of murders like this shooter. Are they really so different? This sad story is reigniting the debate over encryption and government access to secured communications. It's just a blooding commerce chance for some companies and far away the nature: we must punish criminals either online or by gun...
By SAMANTHA RAPHELSON  View Source  
Guess Who Is Dating With You: A Game of Hackers
Researchers in Kaspersky are evaluating some popular dating apps. It's said that dating apps are new targets of some hacker organizations. Why? People in love are easy to cheat and are open to spend money. The recent reports are as estimation: multiple vulnerabilities are discovered and some of them leak important private data. Because data apps lack basic data protection investment, you may date with hackers who know you everything, such a terrible scenario! ...
By Kaspersky Lab  View Source  
Kaspersky Confirms It Downloaded Secret NSA Tools
Kaspersky is anti-virus and cyber security company. If someday you hear it steal hacker tools from NSA, aren't surprised. Hackers and anti-virus software are actually in same industry and share same technology base. The U.S. government ordered Kaspersky's software to be removed from government owned computers last month because of meddling in the 2016 presidential election. Now the questions is: The security software is safe itself?
By Shane Savitsky  View Source  
ESET Report Hackers Hijack Computers to Make Money
ESET reported a new type of crime of hackers: hijacking victim computers to mine cryptocurrency. Its researchers uncovered the profitable hacking. One guy aimed Windows servers and infected hundreds of them to run a mining malware, which steals cpu and memory resources to generate $63,000 in 3 months. This is just one case. Because the hackers want to hijack the victims to make money, the malware is hidden considerably and not easy to view...
By Joon Ian Wong  View Source  
Hackers Could Program Sex Robots to Kill Owners
Robots will go to common family in near future. They are becoming the targets of dark hackers. The most risk possibly is the sex robot. One reason is its market seems better than others and will enter home earlier. Another reason, it should be the root cause, its job usually is behind the backdrop. Danger tricks or actions are convenient to hide. A cybersecurity scientist has issued a bizarre warning that sex robots could one day kill their owners if hackers can get inside their heads...
By George Harrison  View Source  
U.S. employee data breach tied to China Hackers
Even if your data and your family members' data are collected and kept by US government, they aren't safe as the government promised. A Chinese hacking group is suspected of stealing sensitive information about millions of current and former U.S. government employees. FBI arrested some of the group by noticed "Deep Panda's", a hacker tool also used in Hong Kong to monitor democracy force, may hacked sensitive information of about 22.1 million federal employees, including their families and friends...
By Joseph Menn  View Source  
Credit Card vs Medical Record in Hacker Eyes
We heard news about hacking hospitals from time to time, the latest victim is a 550-bed facility in Buffalo, NY. Hackers' first target seems medical industry, at least as often as financial industry. The reason behind this is information black market: on average, hackers can sell credit card numbers for 10 to 15 cents each, but a medical record could be worth between $30 and $500...
By CBS News  View Source  
Reveals Easy Way to Hack Facebook Account
When you play with big guys, never give up protecting own privacy. Yahoo once offered some infamous examples. So did other information giants. Facebook is a target of hackers for a long time. It lets you add phone numbers or other contact ways - WhatsApp or Messenger or Snapchat or Hangouts or whatever - for social networks, but can it keep them safe? Unfortunately hackers indeed get them someway...
By James Martindale  View Source  
Android Malware Leak Private Photos To Friends
Do you mind private photos to be sent to friends? An new Android ransomware possibly asks you similar questions. If you do mind that happens, read this paper carefully. Some clues indicates the threat is distributed by Google Play. Thousands of Android users may be at risk to a malware which attempts to extort victims by threatening to leak personal information, including photos, unless a 'ransom' is paid to the hackers...
By Jason Murdock  View Source  
Russian Hackers Linked To Instagram of Britney Spears
Russian Hackers hided a malware operation in Britney Spears' Instagram account, according to Slovakian cyber-security firm ESET. The research found the hackers are connected to Turla, which once attack internet systems of the embassies and governments of a number of Eastern European nations in 2014...
By Mary Papenfuss  View Source  
FBI Suspects Russian Hackers Behind Qatar Crisis
Qatar is a hot word in last week. It actually leads a new round of Middle East crisis. When the story is developing unpredictably, its trigger has been disappeared. At very beginning the crisis starts from a news of Qatar government's website. However, Qatar deleted the news quickly and said it's fake and posted by hackers. Hacker is becoming a part of politics...
By From Spiegel  View Source  
Evidence of North Korea in Ransomware Attack
More evidence shows that North Korean hackers are behind the global ransomware attack. Ransomware's nature is crime not technology or definitely not high technology. If you want money and don't fear police, ransom is a quick way to create fortunate. None doubts North Korean needs money, and as for police ...
By NICOLE PERLROTH  View Source  
16 Hacker Makes 400 Thousands Pounds in 4 Years
An England court is focused because of a young hacker, now 20. He created a hacking tool at 16, sold to more than 100 thousand clients, and earned near 400 thousand pounds in past years. The hacking tool, actually a DDoS tool disabled countless websites and costs millions of millions loss. The society wastes its wealthy as well as the young guys waste their talents and energies...
By Simon Parkin  View Source  
Russian Hacker Created Starter Pack Ransomware
Hackers never stop widening their businesses. Ransomware is sort of high tech and skill crime before. But a Russian hacker is changing it, who has created a starter package to run ransomware service. With this tool, low-level criminals can join into the game easily. Ramsomware and other malware, these dark technology are impacting common people both online and offline, if you don't want own privacy to become money of others...
By Zack Whittaker  View Source  
Security Flaw Forced Shutdown of Online Government
Data you submitted to government online service are safe? Not really. Manitoba, a middle Canada province, shut down dozens of online services for four days because of security flaw. The threat is on both public service and employees' data. It is still unclear how long the system was left vulnerable to hackers. The province said it was forced to take 31 online services offline when it discovered a security vulnerability in its computer system...
By Laura Glowacki  View Source  
Hackers Access to Athletes’ Medical Records
The database of the World Anti-Doping Agency becomes one of the hottest topics again. This time is due to hackers who are believed the same group that FBI officials have tied to a broad effort to influence the United States presidential election. Lots of athletes' private medical recodes are leaked from the computer network. President of the International Association of Athletics Federations apologized to the athletes whose medical records were compromised...
By REBECCA R. RUIZ  View Source  
5 biggest cybersecurity questions answered
Everything changes, either quickly or slowly. Cyber security is in the fastest end. Some horrible things is in front of you, but you even never heard it before. How can I surf the web anonymously? Is it a question? Yes, because in most cases your internet activities or behaviors are collected and shared among venders. Can hackers access my webcam? The answer is hackers can get more than webcam if they are smart and evil enough...
By Gene Richardson  View Source  
How CIA Hackers Rate Anti Virus Software
If you are using or planning to use any computer security software, like anti-virus products, you may ask this question again, again, and again to either yourself or some others: which is the right choice to keep your privacy and secret from hackers' attack. You may get recommends from separate channels, and feel it's not a easy tradeoff. Now you hear the comments from CIA hackers, more or less you will get ideas from guys who aren't in view of business...
By Anthony Cuthbertson  View Source  
Using Facebook Quizzes Get Personal Data
Your personal data may be stolen from some channels you fully trust. Facebook is the new one in that risk list. The report said Facebook's random online quizzes online, where one can share the result afterwards, is raising the warning. These seemingly plain questionnaires could actually be used to infiltrate your personal data...
By KHRISTIAN IBARROLA  View Source  View Cache  
Naked Pictures of Kate Moss Been Stolen
The new celebrity victim of hacker attacking is Kate Moss by recent report. Her computer somehow was visited by unknown guys, and lots of photos are believed to have been stolen. These very, very private pictures are possibly involved with her friends too. Right now the leaked stuffs aren't in public yet, hopefully they are in right encryption...
By Durhamregion  View Source  View Cache