Data Security: Hot Stories

Search Result for Hackers in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result for Hackers in All Fields - Top 20 Stories
Russian Hacker Created Starter Pack Ransomware
Hackers never stop widening their businesses. Ransomware is sort of high tech and skill crime before. But a Russian hacker is changing it, who has created a starter package to run ransomware service. With this tool, low-level criminals can join into the game easily. Ramsomware and other malware, these dark technology are impacting common people both online and offline, if you don't want own privacy to become money of others...
By Zack Whittaker  View Source  
Security Flaw Forced Shutdown of Online Government
Data you submitted to government online service are safe? Not really. Manitoba, a middle Canada province, shut down dozens of online services for four days because of security flaw. The threat is on both public service and employees' data. It is still unclear how long the system was left vulnerable to hackers. The province said it was forced to take 31 online services offline when it discovered a security vulnerability in its computer system...
By Laura Glowacki  View Source  
Hackers Access to Athletes’ Medical Records
The database of the World Anti-Doping Agency becomes one of the hottest topics again. This time is due to hackers who are believed the same group that FBI officials have tied to a broad effort to influence the United States presidential election. Lots of athletes' private medical recodes are leaked from the computer network. President of the International Association of Athletics Federations apologized to the athletes whose medical records were compromised...
By REBECCA R. RUIZ  View Source  
5 biggest cybersecurity questions answered
Everything changes, either quickly or slowly. Cyber security is in the fastest end. Some horrible things is in front of you, but you even never heard it before. How can I surf the web anonymously? Is it a question? Yes, because in most cases your internet activities or behaviors are collected and shared among venders. Can hackers access my webcam? The answer is hackers can get more than webcam if they are smart and evil enough...
By Gene Richardson  View Source  
How CIA Hackers Rate Anti Virus Software
If you are using or planning to use any computer security software, like anti-virus products, you may ask this question again, again, and again to either yourself or some others: which is the right choice to keep your privacy and secret from hackers' attack. You may get recommends from separate channels, and feel it's not a easy tradeoff. Now you hear the comments from CIA hackers, more or less you will get ideas from guys who aren't in view of business...
By Anthony Cuthbertson  View Source  
Using Facebook Quizzes Get Personal Data
Your personal data may be stolen from some channels you fully trust. Facebook is the new one in that risk list. The report said Facebook's random online quizzes online, where one can share the result afterwards, is raising the warning. These seemingly plain questionnaires could actually be used to infiltrate your personal data...
By KHRISTIAN IBARROLA  View Source  View Cache  
Naked Pictures of Kate Moss Been Stolen
The new celebrity victim of hacker attacking is Kate Moss by recent report. Her computer somehow was visited by unknown guys, and lots of photos are believed to have been stolen. These very, very private pictures are possibly involved with her friends too. Right now the leaked stuffs aren't in public yet, hopefully they are in right encryption...
By Durhamregion  View Source  View Cache  
How good are North Korea Hackers
Hackers aren't individuals somewhere and sometime. Today's North Korea gives an example: Bureau 121. It's just a code an organised cyber-attack elite unit in Pyongyang. Never curious such an isolated nation owns the best and brightest hackers, because it's nation behaviour and acts on behalf of the nation and its leader: Kim Jong-un...
By Dave Lee  View Source  
1 Million Wordpress Pages Are Attacked
Security flaw is in almost every systems. WordPress blogging software is reported that a small flaw has let hackers attack and deface tens of thousands of web sites that trust the open source blog, and more than 1.5 million pages have been ruined. Hackers not only spoil the pages, what they really did are to take over these websites...
By Dave Lee  View Source  
Don't Do Cyber Crime If Can't Do Jail Time
You may heard the old adage "Don't do the crime if you can't do the time". It's the same to young cyber criminals. A 17-year-old was sentenced to 12 months rehabilitation after hacking British telecom; another 17-year-old was sentenced to four years in Massachusetts for leading a group of villainous hackers. Hacker sometimes means go to jail.
By Steve Morgan  View Source  View Cache  
POPULAR IOS APPS VULNERABLE TO TLS INTERCEPTION ATTACKS
Apps are main risk of your iPhone data leak. By Sudo Security Group, 19 of 76 apps are high-risk. Your financial or medical credentials, authentication tokens, or any else could be siphoned off by hackers. Local network, namely Wi-Fi, is the core of these risks. You cannot always keep your iPhone from Wi-Fi, a few seconds are enough for attackers to transfer credentials through unsafe apps...
By Thomas Fox-Brewster  View Source  
Will Trump Let Arab Hackers To Make America Safe Again
The first of first for safe is trust. Arab hackers are becoming a new issue for America safe. A new case is that Cairo-born Mohamed Saher has been told he shouldn't leave U.S., he works for a security firm, NSS Labs, and his boss doubts Trump's travel ban may finally cover more countries...
By Thomas Fox-Brewster  View Source  
The car hackers of Fremont
Hackers years ago demonstrated an ability to commandeer, remotely, a vehicle’s transmission and steering, although the known cases have not been random, broad-based attacks but instead were aimed at specific vulnerabilities in specific cars.
By David R. Baker  View Source  
Urge Clinton to Challenge Election Results for Hacker Issue
Hillary Clinton's campaign is being urged by a special group, top computer scientists or top good hackers, who believe they have found evidence of bad hackers to cheat the result, and doubt this happened in multiple states. So they are calling for a recount of vote in Wisconsin, Michigan and Pennsylvania, ....
By Dan Merica  View Source  
Hackers Guilty of Mining Millions from EA Game
The virtual money and online marketplace are targets of hackers too. A young guy from CA was found guilty not because he stole money from a US bank, but mined $16 million FIFA coins from a soccer game of EA. This isn't a first hack case related to virtual money, and higher value cases would come very soon in cyber security circumstances...
By Sean Buckley  View Source  
Donald Trump Unveiled Four-Part Cyber Security Strategy
President-elect Donald Trump disclosed his cyber security strategy, which is getting mixed reactions. Experts say it has some good ideas. "It sounds like a fairly rational, high-level playbook... but much of this is already being done to a certain extent," chief technology officer at Binary Defense Systems agreed with him...
By JOSE PAGLIERY  View Source  
Does Censorship Is A Way for Cyber Security
A new law related to cyber security is in table of Chinese law makers. The draft bill caused some controversial comments. For example, hackers aren't the key part there although they are the role in most of cyber attacks or accidents. Instead, government are granted to censor Internet. Cyber security has separate definitions by countries. In China, ...
By Reuters  View Source  
Cameras IoT Brings New Hacker Risk
IoT, Internet of Things, is officially part of modern Internet. Cameras, DVRs, and things attached on Internet are objects of hackers too. The recent massive Internet Outage are suggested to be a DDOS attack from millions of CCTV video cameras, these online cameras are really independent computers so they can be as source to such attack as long as their password leaded...
By Brian Krebs  View Source  
DDOS Attacks Slowed Down Many Major Websites
On Oct 21 many usual DDOS attacks target major websites from the east coast to the west coast, and finally resulted in massive internet outages. Why do the hackers launch these attacks? Internet security experts don't want to give a clear answer, or don't get the answer yet. Some even believe this isn't a real attack, but just a test...
By William A. Jacobson  View Source  
UCSB Hackers Advance in Worldwide Competition
Hackers aren't always in dark side. Near 20 thousands students from the earth contest on the hacker skills in September. New York University hosted this event, which has a meaningful name: Capture the Flag. A group of hackers from UC Santa Barbara finally got that Flag, the first place...
By Allison Garfield  View Source