intrusions

intrusions

U.S. warns gas pipeline companies of cyberattacks

No News Is Good News? Dropbox Says No Intrusions Found, Investigation Continues

techcrunch.com
Dropbox says it hasn’t found intrusions into its internal systems or any cases of unauthorized activity in user accounts. Earlier this week, the company appeared to be suffering from what looked like a security breach. Users, mainly those based in Europe, were being sent unsolicited spam emails related to European casino scams....
No News Is Good News? Dropbox Says No Intrusions Found, Investigation Continues

McAfee to acquire firewall maker Stonesoft

www.pcworld.com
McAfee plans to acquire Stonesoft, a Helsinki-based maker of firewalls, for US$389 million in cash, the companies said Monday.The Intel subsidiary said firewalls are one of the fastest growing products in network security, which it plans to grow, according to a news release. Stonesoft's products will be integrated with...
McAfee to acquire firewall maker Stonesoft

The inescapable ’80s: 8-bit, SimCity, and Wing Commander all make a comeback

www.extremetech.com
I do everything I can to not dwell too much on the 1980s and early 1990s, but sometimes I just don’t have any other choice. I think it’s a generalized problem you experience as you get older: try as you might, you can’t completely abandon your formative years, full of...
The inescapable ’80s: 8-bit, SimCity, and Wing Commander all make a comeback

Twitter, Tumblr and Pinterest warn users after customer support service Zendesk gets hacked

thenextweb.com
Customer support service Zendesk revealed on Thursday that it had been hacked and three of its clients were affected. Twitter, Tumblr and Pinterest appear to be the three, as they have have all contacted users to warn that they may have been affected by the breach. Zendesk noted in a blog...
Twitter, Tumblr and Pinterest warn users after customer support service Zendesk gets hacked

US calls on Chinese government to crack down on hacking

www.guardian.co.uk
Obama's national security adviser urges China to recognise risk cyber-attacks pose to international relationsThe White House has urged Beijing to acknowledge, investigate and halt the widespread hacking of US firms, with Barack Obama's national security adviser warning of intrusions from China on "an unprecedented scale".Thomas Donilon described cyber-attacks as a...
US calls on Chinese government to crack down on hacking

Two Chinese Schools Said to Be Tied to Online Attacks

www.pheedcontent.com
Experts in the United States connected the intrusions into Google and other corporations to computers at a top Chinese university and a school with ties to China’s military....
Two Chinese Schools Said to Be Tied to Online Attacks

New Cybersecurity Firm Targeting Financial Malware Fears

www.fastcompany.com
TaaSera, a new firm backed by former Homeland Security Secretary Tom Ridge, is marketing advanced malware detection technologies to the financial sector. There's big money in cybersecurity services for the finance sector. TaaSera, a new malware detection firm backed by former Homeland Security Secretary Tom Ridge, officially launched in...
New Cybersecurity Firm Targeting Financial Malware Fears

Bogus zombie apocolypse warnings undermine US emergency alert system

arstechnica.com
Don't worry: today remains V-Day and not Z-Day. On Monday, hackers were responsible for broadcasting bogus emergency messages warning TV viewers of an imminent zombie invasion. It's a series of intrusions that underscore the vulnerability of the nation's public warning system. "Civil authorities in your area have reported that...
Bogus zombie apocolypse warnings undermine US emergency alert system

Trustonic: a way for mobile apps to benefit from ARM's hardware-level security

www.engadget.com
This here narrative begins back in April, when ARM, Giesecke & Devrient and Gemalto teamed up and gave themselves precisely nine months in which to find the perfect brand name for their newly merged mobile security platform. Today, we're looking at the fruits of their efforts: Trustonic; a word...
Trustonic: a way for mobile apps to benefit from ARM's hardware-level security

Anonymous Group Posts Bomb Threat For Nov. 5, Pisses Off Anonymous

betabeat.com
Screengrab A group claiming affiliation with Anonymous posted a bomb threat on its Twitter account Monday, claiming they plan to detonate a bomb in a government building on November 5th. The threat prompted disavowals from other Anon channels across the web. The threat was linked from @FawkesSecurity, which posted the...
Anonymous Group Posts Bomb Threat For Nov. 5, Pisses Off Anonymous

White House Calls On China To Cease Cyberattacks On U.S. Firms

www.fastcompany.com
Will the great superpower of the East agree to the U.S.'s three demands? President Obama's national security advisor addressed the current Sino-American hacking woes yesterday. In a speech, Tom Donilon called upon China to address three points: crack down on Chinese hackers; come to the table for talks on...
White House Calls On China To Cease Cyberattacks On U.S. Firms

OnRamp, A Free, Open Source Ad Server From OpenX, Gets Shut Down After Getting Besieged By Hackers

techcrunch.com
Another victory for hackers and a blow for the security of open source systems: OpenX, the online and mobile advertising company that announced a $22.5 million fund raising just last month, says that it is closing down its OnRamp open source ad serving platform, after the service was hacked on...
OnRamp, A Free, Open Source Ad Server From OpenX, Gets Shut Down After Getting Besieged By Hackers

MetaFlows launches low-cost SaaS product that unifies network security

www.networkworld.com
Network security monitoring startup MetaFlows launched a new Software-as-a-Service (SaaS) product that can be installed on low-cost hardware to monitor network traffic flow, detect possible intrusions and analyze event logs....
MetaFlows launches low-cost SaaS product that unifies network security
Feds poo-poo Softbank/Sprint deal over Chinese hardware fears

'Cybersecurity': how do you protect something you can't define?

www.theverge.com
It's no surprise that following the various hacks, cracks, and online intrusions which have been dominating headlines, there’s been a loud, rallying cry from governments and corporations for increased investment in something called "cybersecurity." It’s a term that has already been used to brand two pieces of controversial legislation...
'Cybersecurity': how do you protect something you can't define?

App.net and the myth of the social network do-over

www.washingtonpost.com
Everybody, at one time or another, has dreamed about a social networking "do-over" -- completely gutting their social networking presence to get rid of all their fake followers, annoying ads and blatant intrusions by brands into their daily lives. If anything, the "I'm quitting Facebook" or "I'm quitting Twitter"...
App.net and the myth of the social network do-over
"Sombrero" mountain growth in the Andes rides on rising magma plumes

MPAA attempts Hotfile takedown: Online file-sharing is dead

www.zdnet.com
Forget earthquakes or floods and fire. Hackers and server intrusions are more of a threat. But the law itself poses the greatest headache for file-sharing services like Hotfile....
MPAA attempts Hotfile takedown: Online file-sharing is dead

Hacker Crackdown: Blame AT&T's Crappy Security, Not Weev

readwrite.com
Another hacker bites the dust. This morning, Andrew Auernheimer -- aka "weev" -- got handed a sentence of 41 months in prison, 3 years of supervised release and a $36,500 fine. All for basically exposing a major security hole at AT&T and publicly shaming the company that hadn't ever bothered to...
Hacker Crackdown: Blame AT&T's Crappy Security, Not Weev

Chinese army hackers return from vacation, renew attacks on US

arstechnica.com
After being publicly exposed in February as the source of a long list of cyberattacks on U.S. companies and media organizations, the Chinese People's Liberation Army's Unit 61396 largely pulled back from the networks the unit had infiltrated. But now, the New York Times reports, the hackers are back...
Chinese army hackers return from vacation, renew attacks on US

Hackers crack two FreeBSD Project app dev servers

www.pcworld.com
Hackers have compromised two servers used by the FreeBSD Project to build third-party software packages. Anyone who has installed such packages since September 19 should completely reinstall their machines, the project's security team warned. Intrusions on two machines within the FreeBSD.org cluster were detected on November 11, the FreeBSD...
Hackers crack two FreeBSD Project app dev servers

Chinese hackers suspected in attack on The Post's computers

www.washingtonpost.com
A sophisticated cyberattack targeted The Washington Post in an operation that resembled intrusions against other major American news organizations and that company officials suspect was the work of Chinese hackers, people familiar with the incident said. Read full article >>...
Chinese hackers suspected in attack on The Post's computers

DHS Report: Energy Sector Now a Bigger Target for Cyber Attackers

allthingsd.com
The energy sector is reporting an enormous increase in the number of attempted cyber attacks in 2013, according to a new report from the Department of Homeland Security. Some of the new attempted attacks have included the industrial control systems of gas compression stations across the Midwest. There were 111...
DHS Report: Energy Sector Now a Bigger Target for Cyber Attackers

Barack Obama and Xi Jinping meet as cyber-scandals swirl

www.guardian.co.uk
US and China presidents' summit takes place amid tensions over state-sponsored intrusions and revelations about NSA harvesting data from millions of personal online accountsPresident Barack Obama has brushed aside the outcry over surveillance operations by the US government to tell China's President Xi Jinping he wants a world order where...
Barack Obama and Xi Jinping meet as cyber-scandals swirl

Executive Order -- Improving Critical Infrastructure Cybersecurity

www.whitehouse.gov
EXECUTIVE ORDER - - - - - - - IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY   By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows: Section 1. Policy. Repeated cyber intrusions into critical infrastructure demonstrate...
Executive Order -- Improving Critical Infrastructure Cybersecurity

Ohio man charged for Anonymous-sponsored attacks on police websites

arstechnica.com
An Ohio man has been charged with hacking into two websites controlled by law enforcement groups after he posted Twitter messages boasting of the intrusions, which were carried out under the banner of "CabinCr3w," an offshoot of the Anonymous hacking collective. John Anthony Borell III of Toledo, Ohio, was...
Ohio man charged for Anonymous-sponsored attacks on police websites
Chinese hackers drain U.S. military secrets from defense contractor

A Guide to the Digital Advertising Industry That's Watching Your Every Click

www.theatlantic.com
In this excerpt from his new book, The Daily You, University of Pennsylvania professor Joseph Turow takes you on a tour of the industry that's trafficking in the data you generate every day on the Internet. You don't have to be a privacy stickler to be worried. At the start...
A Guide to the Digital Advertising Industry That's Watching Your Every Click

China Sees Cyberwar as Reducing US Advantage In Future Conflict

allthingsd.com
It’s one thing to read news reports concerning the latest report to Congress by the US Department of Defense on China’s latest military activities. But with regard to China’s evolving stance and capabilities in the cyber-arena, it’s especially interesting to read the original report. I did just that this morning....
China Sees Cyberwar as Reducing US Advantage In Future Conflict
× Just a test of the new info bar. What do you think?