Data Security: Hot Stories

Search Result for attack in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result for attack in All Fields - Top 20 Stories
North Korean Malware Still Lurks in Computers Worldwide
The US Department of Homeland Security issued an alert about a hacker group "Hidden Cobra" also known as "Lazarus" that run a victims' networks and may launch further network exploitation. This hacker group is believed related to North Korea. Last month, Britain had blamed the country for being behind the WannaCry cyber attack in May. The malware had infected lots of computers of 150 countries, and even some Britain's hospitals had to cancel scheduled operations. FBI doubts Volgmer "backdoor Trojan" is the next...
By WION Web Team  View Source  
Top 10 Passwords Deciphered Less Than A SECOND
When you choose own password, either simple or complex, you usually don't have extra payment. So, why do select a simpler one? The top 10 commonest passwords can be deciphered in less than a SECOND in hacker world. It means totally useless in front of security attack. Complex passwords, however, show us another story. A security expert reveals how to create one that will take 227 MILLION years to crack...
By SIOFRA BRENNAN  View Source  
US Navy Collisions Stoke Cyber Threat for GPS Systems
This 4 US navy war ships got collision accidents in close areas. Each case seems having own cause but the Pentagon also doubts there are some connections among them, especially electronic guidance systems that the navy relies heavier and heavier in past decades are now an target of cyber attack. For example, some reports uncovered GPS is in short list of hackers' targets...
By Tribune News  View Source  
Rehab Camp for Young Cyber-Attackers on Right Track
Cyber attack is crime, but never fun. The worse and worse cyber safety issue is largely due to some teenagers never think cyber attack is definitely a crime and risks to be put into jail, so that ruin life on crime entrance. Using a key to try other's door is a crime, so is to try other's email. However teenagers possibly don't completely agree with this. To decrease the cyber attacker's base, and divert young attackers away from a life of crime, NCA will run rehab camp to help them back to...
By BBC Technology  View Source  
Cyber Attack Sweeps Globe Seems WannaCry Linked
A new global computer virus attacked from Tuesday; many Russian and Ukrainian targets, like oil companies and banks, are attacked by a virus similar to the ransomware WannaCry. The virus copied codes from earlier ransomware campaigns known as "Petya" and "GoldenEye." Technically, it's not a new one; but it's more aggressive in spreading and attacking. The good news is update patch for WannaCry may protect some machines from the new virus...
By Jack Stubbs  View Source  
The World Is Not Ready For Cyber Attack
Cyber attack is a high frequent word in information industry as well as in social news. When people talk about it, it seems at least some of us knew the threat and can deal with whatever. The truth isn't so optimistic. The NSA is supposed to run as a info security agency, however, its by-products - cyber weapons or say back doors - are stolen ...
By NICOLE PERLROTH  View Source  
What have we learned from WannaCry
WannaCry demos a sample of ransomware, which has been a growing threat in recent years. Cyber security is a key area of FBI. It said more than 4,000 ransomware attacks every day since 2016. In cyber space ransom seems easier , lower cost, and much higher frequent. The WannaCry ransomware attack gives computer owners a surprise as well as a lesson: how to defend from cyber ransom is becoming a question widespread ...
By Michelle Drolet  View Source  
Russian Hackers Linked To Instagram of Britney Spears
Russian Hackers hided a malware operation in Britney Spears' Instagram account, according to Slovakian cyber-security firm ESET. The research found the hackers are connected to Turla, which once attack internet systems of the embassies and governments of a number of Eastern European nations in 2014...
By Mary Papenfuss  View Source  
Evidence of North Korea in Ransomware Attack
More evidence shows that North Korean hackers are behind the global ransomware attack. Ransomware's nature is crime not technology or definitely not high technology. If you want money and don't fear police, ransom is a quick way to create fortunate. None doubts North Korean needs money, and as for police ...
By NICOLE PERLROTH  View Source  
WannaCry and Ransomware is Active on May
Ransomware is to demand money after launching security attack. This May large scale ransomware attacks are reports in many countries. WannaCry is one the them; its name is telling the world not to touch me, or your bad day is coming. The NHS once suffered a major cyber attack and had to cancel some operations countrywide. In China, the thing even became worse. Thousands of gas stations' computer systems had been down to follow a ransomware warning....
By Cara McGoogan  View Source  
Netflix Incident and Cyber Extortion Campaigns
Recently Netflix is focused among information security topics. Some attackers declared to expose its data or disrupt its web site by DDoS unless the organization pays ransoms. 10 unaired episodes from Season 5 of Netflix’ hit series "Orange Is The New Black" have been leaked. It shows that ransomware is not the only form ...
By Jai Vijayan  View Source  
How CIA Hackers Rate Anti Virus Software
If you are using or planning to use any computer security software, like anti-virus products, you may ask this question again, again, and again to either yourself or some others: which is the right choice to keep your privacy and secret from hackers' attack. You may get recommends from separate channels, and feel it's not a easy tradeoff. Now you hear the comments from CIA hackers, more or less you will get ideas from guys who aren't in view of business...
By Anthony Cuthbertson  View Source  
Outdated XML Library in ESET Leads Mac Vulnerable
Antivirus itself became threat of information security. This happened again on famous ESET Endpoint Antivirus 6 for Mac OS. A outdated XML library with a parser of 2007 included in a recent update to the product is subject to a buffer overflow bug, according to Google researchers. The parser is vulnerable to attack, allowing root-level code execution...
By Mike Wuerthele  View Source  
1 Million Wordpress Pages Are Attacked
Security flaw is in almost every systems. WordPress blogging software is reported that a small flaw has let hackers attack and deface tens of thousands of web sites that trust the open source blog, and more than 1.5 million pages have been ruined. Hackers not only spoil the pages, what they really did are to take over these websites...
By Dave Lee  View Source  
POPULAR IOS APPS VULNERABLE TO TLS INTERCEPTION ATTACKS
Apps are main risk of your iPhone data leak. By Sudo Security Group, 19 of 76 apps are high-risk. Your financial or medical credentials, authentication tokens, or any else could be siphoned off by hackers. Local network, namely Wi-Fi, is the core of these risks. You cannot always keep your iPhone from Wi-Fi, a few seconds are enough for attackers to transfer credentials through unsafe apps...
By Thomas Fox-Brewster  View Source  
Cyber Security Experts Share Horror Stories
Recent DDoS attack across USA causes many topics, it's not only billions of dollars in lost but potentially harm individuals. From daily mobile malware to vulnerabilities with the electric grid, some cyber security experts share stories here. Hopefully, the unknown stories can help to defend the worst-case scenarios...
By Dan Patterson  View Source  
Cameras IoT Brings New Hacker Risk
IoT, Internet of Things, is officially part of modern Internet. Cameras, DVRs, and things attached on Internet are objects of hackers too. The recent massive Internet Outage are suggested to be a DDOS attack from millions of CCTV video cameras, these online cameras are really independent computers so they can be as source to such attack as long as their password leaded...
By Brian Krebs  View Source  
DDOS Attacks Slowed Down Many Major Websites
On Oct 21 many usual DDOS attacks target major websites from the east coast to the west coast, and finally resulted in massive internet outages. Why do the hackers launch these attacks? Internet security experts don't want to give a clear answer, or don't get the answer yet. Some even believe this isn't a real attack, but just a test...
By William A. Jacobson  View Source  
Hackers use websites you visit daily to attack you
It's generally accepted that hackers are smart and sneaky, but we got another big reminder last weekend when several major sites, including the New York Times, BBC, MSN, Answers.com, AOL.com and thousands of other sites were used to serve malicious ads. Tens of thousands of users clicking on the ads ended up on sites that launched automated...
By The Kim Komando Show  View Source  
Flaw in iMessage encryption revealed by researchers
Researchers at Johns Hopkins University have cracked the encryption on Apple’s iMessage service, proving that a skilled attacker is capable of reading messages sent between iPads, iPhones and Macs despite the security measures protecting the devices. The attack relies on a flaw in iMessage which will be fixed in iOS 9.3, released today. But until...
By Alex Hern  View Source