Computerworld-In the biggest data compromise of the year,Social Security Numbers(SSN)belonging to about 3.6 million residents in South Carolina have been exposed in an intrusion into a computer at the state's Department of Revenue. ...
Tags: credit card, debit card, SSNs
Most organisations are failing to put the necessary protections around data in virtual environments, leaving them wide open to attack, says Jason Hart, vice-president cloud solutions, SafeNet. "In the virtual world, the basic security ...
Tags: necessary protections, data, virtual environments, confidentiality
Michael Ossmann,co-founder of Great Scott Gadgets,is developing HackRF,a software-defined radio(SDR)that lets you switch between radio frequencies on the fly. Most wireless gadgets,like the 3G antenna in a phone,operate using a fixed ...
Cross-site scripting(XSS)attacks remain the top threat to web applications,databases and websites,an analysis of 15 million cyber attacks in the third quarter of 2012 has revealed. Other top attack techniques are directory traversals,SQL ...
Tags: XSS, Web Applications, CSRF, Cross-site attacks
IDG News Service-The famed iPhone hacker"Comex,"who engineered ways to hack Apple's mobile operating system,is no longer doing work for the company,according to Twitter postings. "So...no point in delaying.As of last week,after about a ...
Tags: iPhone, Apple, operating system
The UK government's decision to enable self-confessed hacker Gary McKinnon to avoid extradition to face trial for breaking into US government and military computers could set a dangerous precedent. Home secretary Theresa May said in a ...
Tags: UK government, self-confessed hacker, Gary McKinnon, extradition
A second-hand laptop purchased on auction site eBay has been found to contain over 5GB of confidential information relating to global telecoms company Alcatel-Lucent. The files,shown exclusively to Computing,include service,fault and ...
The US is at risk of a "cyber-Pearl Harbour" attack from overseas hackers and needs to take precautions against such threats. Government systems, financial networks, transport and the national power grid are all potential targets for ...
Tags: cyber-Pearl Harbour, Leon Panetta, cyber actors, cyber criminals
Hack in the Box will host its 10th security conference this week in Kuala Lumpur featuring an all-star cast of hacking luminaries and a cutting-edge program. The lengthy speakers list includes John Draper aka"Captain Crunch,"who famously ...
An international gang of cyber crooks is plotting a major campaign to steal money from the online accounts of thousands of consumers at 30 or more major U.S.banks,security firm RSA warned. In an advisory Thursday,RSA said it has ...
Tags: Cybercriminal, Trojan Attack, international gang of cyber crooks, RSA
Romanian national Manole Razvan Cernaianu,known online as TinKode,received a two-year suspended prison sentence for hacking into computer systems owned by Oracle,NASA,the U.S.Army and the U.S.Department of Defense and was ordered to pay ...
Tags: NASA, TinKode, Oracle, computer-related offenses
A hacking group that calls itself Team GhostShell this week claimed credit for breaking into servers at 100 major universities from around the world,including Harvard,Stanford,the University of Pennsylvania and the University of Michigan. ...
"Oh Kickstarter, is there anything you can't do?" Apparently not, given the supremely exciting level of participation in the Kickstarter effort for the LIFX, a WiFi-enabled, multi-colored, energy-efficient LED light bulb that you can ...
Tags: LED Bulb
In large technology departments,dysfunctional relationships breed like mushrooms in a dank basement.Your dev and ops teams are no longer on speaking terms,while your junior and senior developers can't seem to agree on anything.IT and legal ...
Tags: IT, Relationship, Developer
Samsung is facing calls to issue a security update for the Galaxy S3 smartphone after it was discovered that the device can be reset by code hidden in a web page. German security researchers have demonstrated how an 11-character code can ...
Tags: Samsung, Galaxy S3, smartphone, vulnerability, hackers