SEC charges 32 in press release hacking, stock trading scheme
The U.S. Securities and Exchange Commission has charged 32 defendants with fraud in an international scheme that used stolen, yet-to-be-published press releases from hacked …
File sync services provide covert way to control hacked computers
File synchronization services, used to accommodate roaming employees inside organizations, can also be a weak point that attackers could exploit to remain undetected inside …
How fear and self-preservation are driving a cyber arms race
When a man was fired from his job in Minneapolis, Minn., last May, he inadvertently touched off a boom in Silicon Valley. Gregg Steinhafel, …
Online Extortionists Are Using Encryption as a Ransom Weapon
Most of the time we discuss encryption as a way to protect ourselves online , but an increasingly popular form of digital attack uses …
Stealing Data From Computers Using Heat
AIR-GAPPED SYSTEMS, WHICH are isolated from the Internet and are not connected to other systems that are connected to the Internet, are used in …
Privacy is dead, Harvard professors tell Davos forum
Imagine a world where mosquito-sized robots fly around stealing samples of your DNA. Or where a department store knows from your buying habits that …
British Spy Agency Hacking and Stealing Emails From NBC News, NY Times, Washington Post
Newly released National Security Agency documents obtained by whistleblower Edward Snowden show that during a 10 minute timespan in 2008, the UK’s GCHQ spy …
Recent Comments