- The WIP hosted #LocalVoicesTalk about Women in Islam, a Twitter event. July 22, 2014
- Infrastructure Hackers, Script Kiddies and “Watchdogs”: A Round-up of Monsters Under the Bed from CIS/MS-ISAC June 5, 2014
- Recent Activity from The European Cyber Army (ECA) April 15, 2014
- Summary of 2013 Malware Development March 26, 2014
- Turkey Thrashes Twitter, Leaks put Gov in a Twist March 21, 2014
- Commerce Dept. Cans ICANN March 21, 2014
- Point of Sale Target’ed, Millions of Credit Cards Scraped. February 12, 2014
- Hotels May Become New Data Breach Point February 12, 2014
- New White House Initiative Pledges $750 Million for Student Technology February 12, 2014
- Mask/Careto Unmasked, Shadowy Spanish Spybots Slink into Sunset February 12, 2014
Categories » Vulnerabilities
The security company indicated that a powerful program that could only have been created by a “nation state” has been finding its way into computer systems for six years.
Piecing together new information from various researchers, it’s clear the ‘Regin” malware is one of the most sophisticated nation-state spy tools ever found. The post Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptograph… Continue reading
“Backdoor Regin” bears a resemblance to Stuxnet, was developed by a wealthy nation. Continue reading
NSA Director: China can damage US power grid
Obama Will Likely Enact Panel’s Advice on Blunting Cyber Risks
Lookout, a security company, says it has been tracking malware that over the last two years has become more sophisticated as it hit millions of devices. Continue reading
Files in federal court to have banks’ data breach suit thrown out. Continue reading
Proof-of-concept exploit against LastPass could easily be extended to other apps. Continue reading
Fifteen people have been arrested, including four in the UK, in connection with the hijacking of computers. Continue reading
Hundreds of thousands of Android phones have been infected with malware that uses handsets to send spam and buy event tickets in bulk. Continue reading
Data privacy watchdogs are warning the public about a Russian website that provides links to breached webcams, baby monitors and CCTV feeds. Continue reading
Three people believed to have been involved in creating malware that penetrated Apple’s strict controls have been arrested in China. Continue reading
Northern Ireland’s culture minister apologises to users of an Irish language website after it emerged their personal details could be publicly accessed online. Continue reading
First Yosemite update should fix some of the more pressing bugs. Continue reading
AT&T has put plans to include unique tracking IDs on consumer’s mobile web traffic on hold.
The post AT&T Stops Using Invasive ‘Perma-Cookies,’ But It May Turn Them Back On appeared first on WIRED.
When a small-time Tennessee restaurateur named Khaled Abdel Fattah was running short of cash he went to an ATM. Actually, according to federal prosecutors, he went to a lot of them. Over 18 months, he visited a slew of small kiosk ATMs around Nashville and withdrew a total of more than $400,000 in 20-dollar bills. The only problem: It wasn’t his money.
The post Two Dudes Prove How Easy It Is to Hack ATMs for Free Cash appeared first on WIRED.
Near field communication exploits play starring role in hacking competition. Continue reading
Microsoft patches a critical bug in its software that had existed for 19 years, according to IBM researchers. Continue reading
After testing the USB controller chips of all eight major manufacturers, the researcher who first discovered BadUSB has some good news and some bad news. The post Only Half of USB Devices Have an Unpatchable Flaw, But No One Knows Which Half appeared f… Continue reading