Search Results For: cyber

Another day, another high-profile security breach. This time the breach occurred across the pond at British telecom giant TalkTalk. TalkTalk is the United Kingdoms second largest quadruple play service provider (offering phone, TV, broadband Internet and mobile phone service) behind Virgin Media. Given its massive... Read more...
If youd like to bolster your IT skillset and become a certified Cyber Security pro, weve got an awesome deal running in the HotHardware Shop for the next few days that may be right for you. A Cyber Security Professional Training & Certification Bundle is currently discounted by 98%, making what used to... Read more...
Last month, US and Chinese governments agreed to a "digital truce", where neither country would knowingly support cyberattacks against each other to steal commercial secrets. While the agreement is solid overall, it does have a number of caveats, including the lack of protection where government secrets are... Read more...
The security gurus at Trend Micro believe that the cyber attackers behind Pawn Storm are performing their dirty deeds by way of a new zero-day vulnerability in none other than Adobe's Flash platform. Shocking that Flash is at the root of it all, isn't it? This is where we all feign surprise, sarcastically of... Read more...
As the years pass, our lives continue to become intertwined even more with theInternet. Today, the Internet acts as a backbone to critical infrastructure, and much like the risk of someone exploiting a flaw to break into our home PC, a real risk exists that enemies of thegovernmentcould break into and cause harm to... Read more...
If you're an old school gamer, then you probably remember Razer's original Diamondback mouse. Released in late 2004 at the World Cyber Games, it was one of Razer's earliest products, with only the Boomslang (multiple versions) and Viper predating it. If you were a fan of the Diamondback, you'll be happy to know... Read more...
If we may impart some words of wisdom to our younger readers out there, it's to choose your role models carefully. It's a piece of advice that comes too late for half a dozen teenagers living in the U.K. who were arrested as part of a sting operation targeting users of hacking group Lizard Squad's Lizard Stresser... Read more...
If youre in need of some quality malware protection software, weve got a deal going in the HotHardware Shop worth checking out. For the next six days, a two year subscription for Lavasoft Ad-Aware Pro is 45% off and available for only $39... Description Protect your PC with top-of-the-line antivirus software that... Read more...
There have been several high profile security breaches over the last couple of years, and in many instances, cyber thieves were able to extract personal information of their target's customers. Usually this resulted in the company offering a free year of identity theft protection to those affected, though in... Read more...
It looks as though the U.S. Government just cant catch a break when it comes to cybersecurity issues. If it isnt China thats breaching the Office of Personal Management (OPM), accessing the personnel files of 21.5 million people, then the U.S. has to keep an eye for hackers originating from Russia. The... Read more...
As the most dominant mobile platform on the planet (in terms of market share), Android has become a popular target of hackers and cyber scoundrels looking to spread their malware to unsuspecting users. It's something Samsung is taking seriously, and to ensure that you stay protected against new and emerging... Read more...
To quote Ron Burgundy in Anchorman, "Boy, that escalated quickly. I mean that really got out of hand fast." He was referring to a deadly and chaotic showdown between various news stations, but he could have just as easily been talking about a recentsecuritybreach at the U.S. Office of Personnel Management (OPM) that's... Read more...
A teenage member of the notorious hacking group Lizard Squad has received a two-year suspended sentence for numerous cyber crimes. All tallied, he was convicted of 50,700 charges related to computer crimes, and in addition to his two-year suspended sentence, he must also undergo monitoring of his online... Read more...
Liquid Metal is an alloy metal (technically, bulk metallic glass) that manages to combine the best features of a wide variety of materials into one product. Liquid Metal also has high corrosion resistance, high tensile strength, and remarkable anti-wear characteristics. It can be thought of as a super strong... Read more...
Major League Baseball has worked hard to improve its image and move on from the so-called steroids era, a period in baseball where many records were broken by players who were later found to have been doping up and using human growth hormones. But the latest scandal takes an unexpected and perhaps unprecedented twist... Read more...
Remember when skirmishes were fought on land, air, and sea? They still are, though in today's world, you can add cyberspace to the list. Cyber warfare has become a point of focus, and lest anyone doubt it, consider that that the U.S. Navy is looking to buy zero-day exploits, particularly those used on... Read more...
With the government agencies like the NSA, the CIA, and the FBI looking to ratchet up efforts to spy on both U.S. citizens within our own borders, and on foreign interests abroad, todays bombshell revelation suggests that maybe the U.S. should start taking measures to beef up its cybersecurity at all of its... Read more...
It's now believed that a crime syndicate in Russia is responsible for a security breach resulting in the theft of IRS records containing personally identifiable information for over 100,000 taxpayers. The sole purpose of the theft was to engage in identity theft for the purposes of tax fraud, a scheme that was used to file some $50 million Read more...
Consider it an unfortunate sign of the times we live in that companies have to set aside enormous funds to contend with the cost of cyber related crimes. We're not talking chump change here -- according to a study by security firm Ponemon Institute that was funded by International Business Machines, the average... Read more...
Show of hands, who actually likes paying taxes? Anyone? It's not one of our favorite tasks either, and to add insult to injury, a band of advanced hackers reportedly infiltrated the Internal Revenue Service's records to collect personally identifiable information from over 100,000 taxpayers. It's believed that the... Read more...
CareFirst, a Blue Cross Blue Shield health insurer, announced on Wednesday that it was the target of a "sophisticated cyberattack," making it the third major healthcare player this year to suffer a security breach. In this instance, CareFirst estimates that around 1.1 million current and former members and... Read more...
Security firms and anti-malware providers sure do have their work cut out for them, a fact that seems to get emphasized every day. As attackers become more creative, researchers have to dig deep in order to understand how malware manages to hide itself so well. It used to be that static scanners would be suitable... Read more...
First ... Prev 24 25 26 27 28 Next