Security  

  •  
  • By Eduard Kovacs
  • April 2nd, 2012
MalSec Hackers Deface Site of Cayman Island Security Firm (Updated)

MalSec Hackers Deface Site of Cayman Island Security Firm (Updated)

The hackers were "kind enough" not to cause any damage

  •  
  • By Eduard Kovacs
  • April 2nd, 2012
Anonymous: We Don’t Agree with LulzSec Reborn

Anonymous: We Don’t Agree with LulzSec Reborn

The name of LulzSec will be forever associated with infiltrators and traitors

  •  
  • By Eduard Kovacs
  • April 2nd, 2012
PBS Website Hacked by Anonymous, Passwords Dumped

PBS Website Hacked by Anonymous, Passwords Dumped

Thousands of record sets were published online by the hackers

  •  
  • By Eduard Kovacs
  • April 2nd, 2012
Global Payments: Hackers Exported 1.5 Million Card Numbers

Global Payments: Hackers Exported 1.5 Million Card Numbers

It turns out that the hackers didn't obtain SSNs, names, or addresses

  •  
  • By Eduard Kovacs
  • April 1st, 2012
Corruption Makes Intelligent Servers Go on Strike, Experts “Find”

Corruption Makes Intelligent Servers Go on Strike, Experts “Find”

Servers from datacenters have become self-aware and decided to protest

  •  
  • By Eduard Kovacs
  • March 31st, 2012
Crooks Use Rogue Applications to Take Over Twitter Accounts

Crooks Use Rogue Applications to Take Over Twitter Accounts

The shady apps spam followers with free iPhone scams

  •  
  • By Eduard Kovacs
  • March 31st, 2012
Hackers Around the World: INER7IA, a “Nuclear” Black Hat from the US

Hackers Around the World: INER7IA, a “Nuclear” Black Hat from the US

This week's interview is with a TeamHav0k hacker who works in the Navy

  •  
  • By Eduard Kovacs
  • March 31st, 2012
Expert Shows How Hackers Can Use CSRF Browser Vulnerability

Expert Shows How Hackers Can Use CSRF Browser Vulnerability

The hacker that breached GitHub returns with other interesting finds

  •  
  • By Eduard Kovacs
  • March 31st, 2012
Video: FBI Official on Cyber Security and Threats

Video: FBI Official on Cyber Security and Threats

An FBI veteran details the evolution and the dangers of cyber threats in an interview

  •  
  • By Eduard Kovacs
  • March 31st, 2012
Scammers Call Victims Pretending to Be “Tech Department of Windows”

Scammers Call Victims Pretending to Be “Tech Department of Windows”

Phone scams can be just as effective as those powered by malware

  •  
  • By Eduard Kovacs
  • March 31st, 2012
Global Payments Confirms Breach, Cardholders at Risk

Global Payments Confirms Breach, Cardholders at Risk

It's believed that hackers from Central America are responsible for the breach

  •  
  • By Eduard Kovacs
  • March 31st, 2012
TweetDeck Taken Offline After User Gains Access to Hundreds of Accounts

TweetDeck Taken Offline After User Gains Access to Hundreds of Accounts

8 hours later the issue was addressed and the service was restored

  •  
  • By Eduard Kovacs
  • March 31st, 2012
Gambit Finds XSS in “World’s Most Private Search Engine” (Exclusive)

Gambit Finds XSS in “World’s Most Private Search Engine” (Exclusive)

The Start Page search engine turns out to be vulnerable to XSS attacks

  •  
  • By Eduard Kovacs
  • March 30th, 2012
Thousands of Swedes Exposed After Hackers Target Tax Agency

Thousands of Swedes Exposed After Hackers Target Tax Agency

Some of the victims of the breach are individuals with protected identities

  •  
  • By Eduard Kovacs
  • March 30th, 2012
Australian Government to Use iPads and iPhones to Store Secret Data

Australian Government to Use iPads and iPhones to Store Secret Data

iOS 5 passed all the security tests performed by the DSD

  •  
  • By Eduard Kovacs
  • March 30th, 2012
Anonymous Hacks Afghan Election Commission to Avenge Killed Troops

Anonymous Hacks Afghan Election Commission to Avenge Killed Troops

A news article about the death of 3 NATO soldiers sparked the hack

  •  
  • By Eduard Kovacs
  • March 30th, 2012
Expert: Electronics from China May Come with Backdoors

Expert: Electronics from China May Come with Backdoors

iPad, iPhones, Androids and even TVs may be fitted with backdoors

 
Want more? Browse: