- The WIP hosted #LocalVoicesTalk about Women in Islam, a Twitter event. July 22, 2014
- Infrastructure Hackers, Script Kiddies and “Watchdogs”: A Round-up of Monsters Under the Bed from CIS/MS-ISAC June 5, 2014
- Recent Activity from The European Cyber Army (ECA) April 15, 2014
- Summary of 2013 Malware Development March 26, 2014
- Turkey Thrashes Twitter, Leaks put Gov in a Twist March 21, 2014
- Commerce Dept. Cans ICANN March 21, 2014
- Point of Sale Target’ed, Millions of Credit Cards Scraped. February 12, 2014
- Hotels May Become New Data Breach Point February 12, 2014
- New White House Initiative Pledges $750 Million for Student Technology February 12, 2014
- Mask/Careto Unmasked, Shadowy Spanish Spybots Slink into Sunset February 12, 2014
Categories » Vulnerabilities
Unidentified hackers have been releasing internal documents from Sony Pictures Entertainment. Renee Montagne talks to Kim Zetter, a senior staff reporter at Wired magazine, about the attack. Continue reading
A week into the Sony hack, however, there is a lot of rampant speculation but few solid facts. Here’s a look at what we do and don’t know about what’s turning out to be the biggest hack of the year.
The post Sony Got Hacked Hard: What We Know and Don’t Know So Far appeared first on WIRED.
Credit cards have more legal protection than debit cards, but a quick response is the key to keeping intruders from your accounts and identity. Continue reading
The Defense Department and leading computer scientists are working together to improve security by imagining an Internet rebuilt from scratch. Continue reading
The naïveté of new Internet users, and an emphasis on bolstering the web’s growth, have left China’s more than 600 million Internet users vulnerable to cybercrime.
Employee salary, health data mixed in with other corporate data leaked. Continue reading
Operation Cleaver gets near-complete control of airlines, gas producers, defense. Continue reading
Advanced tactics raise the bar on spearphishing attacks, making them harder to spot. Continue reading
James Hoff’s art glitches music and images with malware like NSA-created Stuxnet and the ILOVEYOU viruses.
The post This Artist’s Images Integrate Code From Malware Like Stuxnet and Flame appeared first on WIRED.
The security company indicated that a powerful program that could only have been created by a “nation state” has been finding its way into computer systems for six years.
Piecing together new information from various researchers, it’s clear the ‘Regin” malware is one of the most sophisticated nation-state spy tools ever found. The post Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptograph… Continue reading
“Backdoor Regin” bears a resemblance to Stuxnet, was developed by a wealthy nation. Continue reading
NSA Director: China can damage US power grid
Obama Will Likely Enact Panel’s Advice on Blunting Cyber Risks
Lookout, a security company, says it has been tracking malware that over the last two years has become more sophisticated as it hit millions of devices. Continue reading
Files in federal court to have banks’ data breach suit thrown out. Continue reading
Proof-of-concept exploit against LastPass could easily be extended to other apps. Continue reading
Fifteen people have been arrested, including four in the UK, in connection with the hijacking of computers. Continue reading