U.S. Gov Insists It Doesn’t Stockpile Zero-Day Exploits to Hack Enemies
For years the government has refused to talk about or even acknowledge its secret use of zero-day software vulnerabilities to hack into the computers …
Nuke Remark Stirred Hack on Sands Casinos That Foreshadowed Sony
Most gamblers were still asleep, and the gondoliers had yet to pole their way down the ersatz canal in front of the Venetian casino …
How impoverished North Korea built elite ‘secret war’ hacker unit
Despite its poverty and isolation, North Korea has poured resources into a sophisticated cyber-warfare cell called Bureau 121, defectors from the secretive state said …
Sony Pictures hacked, data held for ransom
Sony Pictures was hit by a hack that forced employees to shut down their computers Monday and stay off the film studio’s network, according …
Hackers Can Steal Data Wirelessly From PCs That Aren’t Even Online
When governments, utilities and corporations need to protect their most sensitive data, they create what’s called an air-gap network. It involves storing information on …
Security Contractor Breach Not Noticed for Months
A cyberattack similar to previous hacker intrusions from China penetrated computer networks for months at USIS, the government’s leading security Relevant Products/Services clearance contractor, …
Before Getting Rid of Your Old Printer, Say ‘Goodbye’ to Lingering Data
In the security business, there’s a lot of talk about protecting your smartphones and computers from malware and viruses, as well as loss and …
Microsoft includes XP users in Internet Explorer fix
Microsoft has said users of its Windows XP operating system will also get the security update it has issued to fix a flaw in …
The biggest iPhone security risk could be connecting one to a computer
Apple has done well to insulate its iOS mobile operating system from many security issues, but a forthcoming demonstration shows it’s far from perfect. …
NSA vs. Cloud Encryption: Which is Stronger?
Revelations from the NSA leaks shows that the NSA can steal or use the law to demand encryption keys from providers. The NSA (and …
Recent Comments