Search Results For: hackers.aspx
by
Joshua Gulick - Mon, Nov 17, 2014
Government agencies are prime targets for many hackers (particularly those funded by other governments), so it’s not surprising that the State Department was recently attacked. What makes the attack unusual is that it appears to have...
Read more...
by
Sean Knight - Wed, Oct 29, 2014
It appears that hackers were able to breach the White House’s unclassified computer network, used by employees of the Executive Office of the President, according to anonymous White House officials. The breach has led to temporary...
Read more...
by
Paul Lilly - Tue, Jul 01, 2014
A group of Russian hackers known collectively as either "Energetic Bear" or "Dragonfly" is mounting sabotage operations against a number of power and oil companies primarily located in the U.S. and throughout parts of Europe. Among the...
Read more...
by
Seth Colaner - Sat, Mar 22, 2014
Wireless security has always been something of a problem. Basic WEP encryption, for example, has been beaten so soundly that it’s a wonder device makers even offer it as a security option anymore. Fortunately, we’ve had WiFi protected access 2 (WPA2) keeping our networks safe--but...
Read more...
by
Paul Lilly - Fri, Oct 04, 2013
Adobe is trying to downplay a recent security breach by saying that "cyber attacks are one of the unfortunate realities of doing business today," and even though that might be true, it's unlikely to provide comfort to the 2.9 million...
Read more...
by
Paul Lilly - Thu, Sep 05, 2013
TRENDnet, a maker of home networking and security products, has agreed to settle charges brought on by the Federal Trade Commission (FTC) alleging that its "lax security practices" left consumers susceptible to remote viewing by hackers...
Read more...
by
Seth Colaner - Sun, Jul 21, 2013
Whether it’s for the lulz (as they say) or for more nefarious reasons, the Ubuntu forums have been hacked. Canonical posted the message via a splash page where the forum site is usually located. “There has been a security...
Read more...
by
Rob Williams - Mon, Apr 08, 2013
I'm sure it comes as a surprise to no one that Google is a great place to find some questionable items online, whether it's malware, exploits, someone belly-flopping a pool of ice - whatever. However, even with as much as what Google...
Read more...
by
Joshua Gulick - Tue, Feb 19, 2013
Spammers are changing tactics, and Google is trying to get the word out. These days, the bad guys are using hijacked accounts to launch their scams. By now, spam filters can spot old-school spam mail with reliability, but it’s harder...
Read more...
by
Seth Colaner - Wed, Dec 12, 2012
Smart TVs are intriguing pieces of technology that seem to foreshadow a future where our TVs and computers are one and the same. It seems that if nothing else, one of the things that computers and smart TVs--in particular, some of the ones...
Read more...
by
Michael Santo - Fri, Jul 15, 2011
It's not as though the Pentagon has militarized cyberspace in the mode you might think of in some sort of anime like "Ghost in the Shell," but they are going to look at cyberspace differently. On Thursday, the Pentagon announced it would begin treating cyberspace as an operational domain, like...
Read more...