New computers could trigger security breaches, scientist says
The next generation of computers could crack bank and financial industry coding systems and trigger catastrophic security breaches unless controls are introduced, a Cork-based …
Cyberattack on Penn State exposes passwords of 18K people
Pennsylvania State University’s College of Engineering revealed Friday that it has been the target of two “highly sophisticated” cyberattacks over the last two years. …
Chinese hackers hid malware attack controls in Microsoft TechNet comments
Microsoft has taken steps to stop a China-based hacking group from using its TechNet website as part of its attack infrastructure, according to security …
Chinese hackers hid malware attack controls in Microsoft TechNet comments
Microsoft has taken steps to stop a China-based hacking group from using its TechNet website as part of its attack infrastructure, according to security …
Safari address-spoofing bug could be used in phishing, malware attacks
From the department of things that aren’t what they seem, researchers have demonstrated a new address-spoofing exploit that tricks Safari users into thinking they’re …
Kerry: Internet ‘Needs Rules to Be Able to Flourish and Work Properly’
In a speech today in South Korea, Secretary of State John Kerry said that the Internet “needs rules to be able to flourish and …
Hacked advertising platform sent users to exploit kit
A suspected malicious advertising attack turned out to be a much deeper compromise of an online advertising company, according to Trend Micro. The security …
Visitors to top adult sites hit by malvertising attack
In the latest attack involving malicious advertisements, hackers managed to launch Flash Player exploits against the visitors of several popular porn websites. It’s not …
Homeland Security Department to open Silicon Valley office
Tech companies will soon be competing for talent with a new player in Silicon Valley: the Department of Homeland Security. During a speech today …
Online Extortionists Are Using Encryption as a Ransom Weapon
Most of the time we discuss encryption as a way to protect ourselves online , but an increasingly popular form of digital attack uses …
Recent Comments