malicious hackers

malicious hackers

Hackers hack and delete websites of prominent tech blogger Amit Agarwal

thenextweb.com
I’ve been in the tech blogging space for some time now and throughout there’s been one blogger – based out of India – who has provided such utility, it’s utterly surprising to hear news that he has been targeted by malicious hackers. Amit Agarwal, tech columnist at WSJ India and...
Hackers hack and delete websites of prominent tech blogger Amit Agarwal

A more open Apple will talk iOS security at Black Hat

gigaom.com
In another sign of the changing culture at Apple, the company is planning to speak at one of the premier information security conferences, Black Hat 2012, for the very first time. Bloomberg reports that Apple’s platform security manager, Dallas DeAtley, is set to address the conference about security technologies...
A more open Apple will talk iOS security at Black Hat

Google patches SVG and IPC exploits in Chrome, discoverer banks $60,000 in the process

www.engadget.com
Google revels in hacking contests as ways of testing Chrome's worth. Even if the browser is compromised, the failure provides a shot at fixing an exploit under much safer circumstances than an in-the-wild attack. No better example exists than the results of Google's Pwnium 2 challenge in Malaysia: the...
Google patches SVG and IPC exploits in Chrome, discoverer banks $60,000 in the process

Rep. Gohmert Wants A Law That Allows Victims To Destroy The Computers Of People Who Hacked Them

www.techdirt.com
Last week, we had talked about some concerns about how various cybersecurity provisions would allow those hit by malicious hackers to "hack back" or, as some call it, engage in an "active defense." There were significant concerns about this, but as Marvin Ammori briefly mentioned in last week's favorites post,...
Rep. Gohmert Wants A Law That Allows Victims To Destroy The Computers Of People Who Hacked Them

Assessing Doomsday: How Cyber War Could Attack U.S. Infrastructure

www.readwriteweb.com
U.S. Defense Secretary Leon Panetta did his best to scare the pants off of the American people last week. In a briefing with reporters, he warned of the growing danger of cyberwarfare and its potential to cripple critical infrastructure in the United States. With the rise of so-called state-sponsored...
Assessing Doomsday: How Cyber War Could Attack U.S. Infrastructure
Defects leave critical military, industrial infrastructure open to hacks

This Is Why Your Company Won't Ditch Microsoft For Apple (APPL)

www.businessinsider.com
Apple still really hasn't figured out how to make it big in the enterprise—even though it's having a lot of accidental luck there as employees bring in their own iPhones, iPads and Macs. But it doesn't care about this hot trend called "BYOD," or Bring Your Own Device, that's upending...
This Is Why Your Company Won't Ditch Microsoft For Apple (APPL)

Rep. Gohmert Wants A Law That Allows Victims To Destroy The Computers Of People Who Hacked Them

www.techdirt.com
Last week, we had talked about some concerns about how various cybersecurity provisions would allow those hit by malicious hackers to "hack back" or, as some call it, engage in an "active defense." There were significant concerns about this, but as Marvin Ammori briefly mentioned in last week's favorites post,...
Rep. Gohmert Wants A Law That Allows Victims To Destroy The Computers Of People Who Hacked Them

New Google site aims to help webmasters of hacked sites

www.pcworld.com
Google has launched a site for webmasters whose sites have been hacked, something that the company says happens thousands of times every day. The new site features articles and videos designed to help webmasters identify, diagnose and recover from hacks. The site addresses different types of ways sites can...
New Google site aims to help webmasters of hacked sites

India is the world’s largest source of spam, UK no longer among the ‘Dirty Dozen’: Sophos

thenextweb.com
Security and data protection solutions provider Sophos this morning announced the publication of its latest ‘Dirty Dozen’ report, covering the first quarter of this year. Compared to the same period last year, India appears to have overtaken the United States as the top global contributor of junk messages, while spam...
India is the world’s largest source of spam, UK no longer among the ‘Dirty Dozen’: Sophos

Op-ed--A plea to Google: Protect our e-mail privacy

arstechnica.com
opensourceway We recently learned that even the director of the CIA, David Petraeus, can’t seem to secure his private e-mail conversations properly, and over the past month tech commentators have responded to that discovery with a familiar litany of depressing advice: Privacy doesn’t exist online, e-mail is as public...
Op-ed--A plea to Google: Protect our e-mail privacy

Electrical Grid At Risk From Terrorists

www.fastcompany.com
Tethering America's electrical grid to the Internet was a boon for consumers. However, a Congressional hearing revealed that foreign agents could easily hack into energy grids nationwide.Could America's electrical grid be targeted by terrorists or hostile foreign states? Anything's possible. Is a catastrophic electrical grid attack likely? The House of...
Electrical Grid At Risk From Terrorists

Japan's Finance Ministry Hacked for 2 Years

www.readwriteweb.com
A security audit has found that 123 computers in Japan's Finance Ministry were infiltrated by malware that went undetected for nearly two years. According to media reports, the ministry said that no confidential taxpayer information was exposed. It is not known who was behind the hack, which started in 2010...
Japan's Finance Ministry Hacked for 2 Years

Security Experts Warn Hackers Could Hijack Satellites

betabeat.com
SpaceX’s Dragon. Probably won’t fall on you. (SpaceX.com) An alarming report in The Independent may serve as a warning to satellite operators and a challenge to hackers: cyber security experts attending a conference in the United Kingdom say our satellites face more dangers than ever, including hijacking and sabotage by...
Security Experts Warn Hackers Could Hijack Satellites
McAfee, Trust Guard certifications can make websites less safe

How to Avoid Getting Kicked Off the Internet by DNSChanger Malware [Video]

www.readwriteweb.com
A malicious bit of software called DNSChanger has infected hundreds of thousands of computers over the last five years, linking the computers together into a massive botnet, which malicious hackers use in denial-of-service attacks, to send spam or to steal financial information like credit card numbers - all without...
How to Avoid Getting Kicked Off the Internet by DNSChanger Malware [Video]

European Cyber Security Agency ENISA Names Drive-By Exploits The Biggest Threat, Spam On The Decline

techcrunch.com
ENISA, the European Network and Information Security Agency, today named drive-by exploits as the biggest, most increasing threat of the moment in the Internet landscape, amongst a sea of other all-too-familiar issues like worms, phishing and botnets. Spam, one of the oldest and most annoying aspects of being online, is...
European Cyber Security Agency ENISA Names Drive-By Exploits The Biggest Threat, Spam On The Decline

Security vendor exposes vulnerabilities in DDoS rootkit

www.computerworld.com
In what it says is an attempt to turn the tables on malicious hackers, security vendor Prolexic has released details of vulnerabilities it discovered in a toolkit family used by hackers to launch distributed denial of service attacks against corporate networks....
Security vendor exposes vulnerabilities in DDoS rootkit

Hackers claiming to be from Anonymous take out Vatican site

www.computerworld.com
The main website of the Vatican was inaccessible Wednesday after what appears to have been an attack by malicious hackers claiming to be affiliated with the Anonymous hacking collective....
Hackers claiming to be from Anonymous take out Vatican site

Who Are These UGNazi Kiddie Hackers?

www.readwriteweb.com
A group of malicious hackers calling themselves UGNazi claims it took down Twitter late last week for about 40 minutes. Despite reports confirming the attack, Twitter denied that UGNazi was responsible for the outage, calling it a “cascading bug.” Who is UGNazi? When it comes to tracking the “hacktivist” types,...
Who Are These UGNazi Kiddie Hackers?
Brave New World--medical devices use biometrics to prevent hack attacks

Oppose CISPA If you value any privacy in our digital world | Dan Gillmor

www.guardian.co.uk
Cyber-security is a real problem, but Congress' latest CISPA bill tries to solve it by attacking the freedom of the internetIf you are eligible to vote in the United States, please take a break from whatever you're doing today and call your member of the US House of Representatives. Tell...
Oppose CISPA If you value any privacy in our digital world | Dan Gillmor
Oh, The Irony: National Vulnerbality Database Taken Down By Malware

Security Loophole In Facebook's Camera App Allowed Hackers To Hijack Accounts Over WiFi

techcrunch.com
PSA to all Facebook Camera users on iOS: If you haven’t update you app in the past few days, update it now. The older version of the app, pre-1.1.2 and released before December 21, has a security loophole. When used over WiFi networks, malicious hackers can tap the network and hijack Camera...
Security Loophole In Facebook's Camera App Allowed Hackers To Hijack Accounts Over WiFi

Juniper: Mobile Malware Increased 155% in 2011

www.readwriteweb.com
Malware permeated the mobile ecosystem in 2011. The issue is not going away either. Smartphones have an unprecedented amount of personal data that malicious hackers are drooling to obtain. Everyday they are coming up with more sophisticated attacks and scheming ways on how to infiltrate that data trove in your...
Juniper: Mobile Malware Increased 155% in 2011

BlackBerry warns of TIFF vulnerability that could allow malware to run on enterprise servers

nakedsecurity.sophos.com
Malicious hackers could create a boobytrapped TIFF image file and either trick a BlackBerry smartphone user into visiting a webpage carrying the image, or embed the malicious image directly into an email or instant message... ..and plant malware on your enterprise server....
BlackBerry warns of TIFF vulnerability that could allow malware to run on enterprise servers

GitHub Hit With Another DDoS Attack, Second In Two Days, And "Major Service Outage"

techcrunch.com
Services on code-sharing site GitHub have been interrupted for over an hour in what started as a “major service outage” because of a “brief DDoS attack.” This is the second DDoS attack in as many days. Yesterday, GitHub also reported a DDoS incident. In October 2012, the service also went...
GitHub Hit With Another DDoS Attack, Second In Two Days, And "Major Service Outage"

[Infographic] Between MWC and RSA, Worlds of Mobility and Security Collide

www.readwriteweb.com
Mobile World Congress, the largest and most important mobile conference of the year, starts this week in Barcelona. Meanwhile, about 6000 miles away in San Francisco, the RSA Conference brings together cryptographers and security geeks. These conferences, while seemingly unrelated, have more in common in 2012 than ever before. Juniper...
[Infographic] Between MWC and RSA, Worlds of Mobility and Security Collide

Encap Raises $2M For A Mobile ID App As An Alternative Two-Factor Authentication

techcrunch.com
As high-profile sites like Twitter, Google, and most recently Evernote and LinkedIn turn to two-factor authentication to help their users protect themselves from malicious hackers and security breaches, Encap, a startup based out of Norway, has created an alternative it says is better and safer, using an app on a person’s mobile...
Encap Raises $2M For A Mobile ID App As An Alternative Two-Factor Authentication

Smartphone botnet piggybacks on pirated copies of Angry Birds Space

www.insidemobileapps.com
Unscrupulous developers are once again using the popularity of Rovio’s Angry Birds games to spread malware. Antivirus company SophosLabs has discovered a trojan called Andr/KongFu-L that hides inside a fully functional, pirated version of Angry Birds Space. The company has found the malware in several third-party Android app stores, but...
Smartphone botnet piggybacks on pirated copies of Angry Birds Space
× Just a test of the new info bar. What do you think?