I don't know how much money you have in your bank account, but I'm willing to bet that if you logged into your banking's website and saw $0.00 across the board, you might be a little concerned. Some Chase customers earlier this week found themselves in this exact situation, leading many, as you might expect, to believe that they could have...Read more...
Apparently still fuming over a recent report by an American cyber security company blowing the whistle on Chinese government-sponsored hacking groups, China's Ministry of Defense says its military sites are frequent targets of attack originating from the U.S. It also said that Mandiant's report is "full of loopholes"...Read more...
Chinese authorities are none too happy with a recent report by a U.S. cyber security company highlighting suspicious hacking activities in China. According to the 60-page study released by Mandiant, the Chinese government is sponsoring a massive hacking effort against foreign companies and organizations. The report focused on the activities...Read more...
Back when Near Field Communication (NFC) technology was just becoming known, there were some who worried that it would create yet another potential attack vector for mobile devices by dint of being a wireless technology over which users would be transmitting sensitive payment or personal data. The general consensus...Read more...
Late last year, the FBI kicked DNSChanger in the teeth when it arrested a sextet of Estonian nationals running a cybercrime enterprise and shut down their servers. DNSChanger is malware that hijacked DNS servers and made users incredibly vulnerable to redirects to fake and malicious websites, malware attacks from...Read more...
Kudos to California's state Assembly for passing a bill that would make it illegal for employers to pry Facebook usernames and passwords from employees and potential job candidates. Assembly Bill 1844, sponsored by Assemblywoman Nora Campos (D-San Jose), would put all private content on social networks out of reach of...Read more...
Paranoia. It's what makes the world go 'round. So maybe that's not precisely true in all cases, but does it not apply here? With the rampant hacking that's been going on (we're looking at you, Sony!), people near and far are suddenly concerned with Internet security. It's always been a concern in reality, but these...Read more...
Listen up tightwads, if you view paying for antivirus software only slightly more appealing than shoving bamboo under your fingernails, then we have good news for you. ClamAV recently announced the public beta for ClamAV 3.0 for Windows, which the company says "includes full integration of the ClamAV engine into the Immunet Protect product."...Read more...
Automakers such as Audi wowed CES attendees last week with their gadgetry. Problem is, said gadgetry is proving to be a boon to car thieves, too. Last week, university researchers demonstrated how they could use antennas to hack into 10 models of cars that use keyless entry and start systems. A keyless entry requires the key to be within a...Read more...
Even if you aren't typically freaked out by privacy scares, there's a good possibility that this one will shake you. When you think about it, the entire Internet is built on a mythical trust. We simply trust that every piece of information we send is in good hands. We think that "secure" websites mean that our...Read more...
Like something straight out of a Hollywood action movie, foreign spies managed to swipe sensitive information from the Pentagon by plugging a dirty flash drive into a U.S. military laptop, according to reports. This actually happened some two years ago, but is just now coming to light now that it's been de-classified by Uncle Sam. "It was...Read more...
At the Usenix security conference, an "unusual" but still useful study was discussed. It involved using the smudges on touch screens to break into smartphones, among other devices. The study from researchers at the University of Pennsylvania focused on smartphone touch screens, but researchers added that such "smudge attacks" could be applied...Read more...
Gadget lovers have a particular hate for airport security. Even if they're trained professionals who fly on a weekly basis, there's just no quick way to get through the rigors involved in passing onto the sterile side. Those grey buckets become your worst enemy: before you know it, you've claimed five or six of them...Read more...
It seems, sometimes, that a new phishing scam crops up every day, no matter how much security is improved.That's not just your imagination.IBM today released its annual IBM X-Force 2009 Trend and Risk Report, which showed threats that include phishing and document format vulnerabilities, among others, are on the...Read more...
Weeks after being dismissed as a false alarm, the Conficker virus is slowly being activated. Conficker, also known as Downadup or Kido, is quietly turning thousands of personal computers into email spam servers and installing spyware. It does this by installing a second virus known as Waledac that can send out email spam without the PC owner’s...Read more...
Anyone paying close attention to the computing industry would realize that a few trends are picking up steam. Netbooks, smartphones and cloud computing -- and that's just to name a few. Cisco Systems, which definitely isn't immune to security breaches, is keying in on the latter one with a new network security lineup engineered to "help protect...Read more...
The Conficker worm has generated a fair amount of buzz in the media recently. Today, April 1, was suppose to be the worm’s day of attack. As of this evening eastern standard time, the doomsday some were predicting as a result of the Conficker worm did not materialize. That doesn’t mean Conficker is a bust, however. The worm still did what...Read more...
Googling your own name might not be such a narcissistic activity after all; in fact, it just must save you from identity theft. At least that's what Kevin Andreyo, a Wilkes University professor, discovered when he used the "deep web" search engine, Pipl, to see what information about him might be publicly available on the Internet. What he...Read more...