The Mega file-sharing service has launched a vulnerability reward program that will pay up to 10,000 euros (around $13,600) for every serious security flaw found in the platform and reported responsibly. The rules of the program were laid ...
Tags: Mega, file-sharing service, vulnerability reward program
The U.S. Department of Energy said Monday that personal information about several hundred employees and contractors was stolen in a mid-January hack, but that no classified information was compromised. The agency is working with federal ...
The Hyundai Elantra is another one of those small cars that is more mid-size when it comes to interior space and luggage capacity. Launched in Australia in June 2011, the fifth-generation Hyundai Elantra is the Korean carmaker’s ...
Today’s mobile spam and phishing attacks will increasingly delivered by mobile malware networks, despite mobile device operating systems being more secure than those of desktop or laptop computers, a report has found. Blue Coat ...
Tags: mobile spam, mobile, malware networks
February 1, 2013 -- Canada Credit Fix, Canada’s leading credit restoration and debt settlement specialists, has recently offered its services to the Canadian government in response to a recent loss of student loans data. The loss of ...
Tags: Canada Credit, Loan Victims, Service
Performance, Ride & Handling 3 Comfort & Interior 4 Quality & Design 2.5 Value & Features 2.5 Green 2.5 There are iconic nameplates in the motoring industry, and there is the Nissan Patrol. In its 60 years and five generations, ...
Tags: motoring industry, Nissan, Nissan Patrol
Twitter's servers have been breached by "extremely sophisticated" hackers who may have made off with user names and passwords for about 250,000 users, the company said Friday. Twitter said unusual access patterns led it to identify the ...
Tags: Twitter, Passwords, Computer Products
The California Lighting Technology Center at the University of California, Davis, helped prompt the California Energy Commission to include quality criteria for LED replacement lamps in its first-in-the-nation energy efficiency directive on ...
A String of cyber attacks on major US media outlets has intensified worries over Chinese hackers, who analysts say are probably linked to the secretive Beijing government. The attacks, part of a series of incidents traced to Chinese ...
Tags: Hacking Incidents, Fears, China
Secure Photo storage is a useful new photo security solution that enables users to keep the photos stored on their mobile devices safe from intruders & anyone else unauthorized to view them. CHICAGO, IL, February 05, 2013 ...
Tags: iPhone, iOS, Computer Products
The passwords of about 250,000 Twitter users were stolen in a "sophisticated" cyber attack similar to those that recently hit major Western news outlets. "This attack was not the work of amateurs, and we do not believe it was an isolated ...
Tags: cyber attack, media companies, network
A quarter of a million Twitter accounts have been compromised by hackers, according to the social network. This follows similar attacks on the Wall Street Journal and the New York Times in the last two weeks. Analysis: Why Twitter may ...
Tags: Twitter, social network, cyber security
Mozilla yesterday announced it would automatically disable all plug-ins in Firefox except the latest version of Adobe's Flash Player, citing security and stability reasons for the move. The feature, called "click-to-play," has been part ...
IBM has rolled out a tool it says can cull massive terabytes of data, including email — to help customers detect external attacks aimed at stealing sensitive information or insider threats that might reveal corporate secrets. The ...
Tens of millions of network-enabled devices including routers, printers, media servers, IP cameras, smart TVs and more can be attacked over the Internet because of dangerous flaws in their implementation of the UPnP (Universal Plug and ...
Tags: network-enabled devices, routers, printers, media servers, IP cameras