The passwords of about 250,000 Twitter users were stolen in a "sophisticated" cyber attack similar to those that recently hit major Western news outlets. "This attack was not the work of amateurs, and we do not believe it was an isolated ...
Tags: cyber attack, media companies, network
Google chairman Eric Schmidt has labelled China a menace to the internet, complicit in the use of cyber-crime as part of efforts to undermine its corporate and political opponents. The claims are made in his upcoming book, The New Digital ...
Tags: Google, cyber-crime, China, cyber security
A quarter of a million Twitter accounts have been compromised by hackers, according to the social network. This follows similar attacks on the Wall Street Journal and the New York Times in the last two weeks. Analysis: Why Twitter may ...
Tags: Twitter, social network, cyber security
The operator of the Path social networking app has agreed to settle Federal Trade Commission charges that it deceived users by collecting personal information from their mobile device address books without their knowledge and consent. The ...
Tags: Path social networking app, Federal Trade Commission, mobile device
Apple software hackers unveiled a website late Wednesday where the latest untethered jailbreak is expected to be released soon. An elite team of hackers has been working for months to develop an untethered jailbreak for iOS 6, Apple's ...
Tags: Apple, software hackers, company news
The scary stories from the Web are getting worse.First there were a few stolen credit card numbers.Then there were a few thousand.Now we hear about millions of financial records being exposed by security breaches,and we grow numb to the ...
Tags: Code Safeguard, Developers, Internet
Enterprise security managers have yet another worry to add to their list: cyberwarfare attacks. Now, in addition to guarding against targeted attacks from cybercriminals and activists, enterprise security managers must increasingly guard ...
The Wall Street Journal said Thursday it had been targeted by hackers trying to monitor the newspaper's coverage of China, less than a day after a similar revelation from its competitor The New York Times. The Journal, which is owned by ...
Tags: China, revelation, cyuber security
Oracle on Friday released a critical patch update for Java SE, coming through ahead of schedule to stave off an active exploitation affecting the Java Runtime Environment in desktop browsers. Server-side fixes are being offered as well. ...
Tags: critical patch update, Java SE, Oracle
Mac computers have stopped running programs written using the Java programming language in their browsers, as Apple blocked it because of security problems. Apple has previously blocked, then unblocked, the latest version of Java on the ...
Oracle's head of Java security, Milton Smith, has assured users of the software that the vendor will fix its security issues and improve communication efforts. In a conference call with Java User Group leaders, Smith outlined the ...
Tags: Oracle, Java security, software
Hackers working under the name of the Anonymous hacktivist collective hit a U.S. government website on Saturday, replacing its home page with a 1,340 word text detailing its frustrations with the way the American legal system works and a ...
Tags: US Government, Threat, Anonymous Attack
Cloud hosting company FireHost has claimed that cross-site scripting attacks increased by an estimated 160 per cent in the final quarter of 2012. The company claims that it has detected a spike in what it calls a "superfecta" of attempted ...
Hacker group Anonymous said it had disabled the US Sentencing Commission's website in revenge for the death of internet freedom advocate Aaron Swartz, and vowed to release government data. The website of the commission, an independent ...
Java's new security settings, designed to block "drive-by" browser attacks, can be bypassed by hackers, a researcher announced Sunday. The news came in the aftermath of several embarrassing "zero-day" vulnerabilities, and a recent ...
Tags: Bug, Moot Java, Anti-Exploit Defense