A hacker group said to be connected to Hamas has claimed responsibility for distributed denial-of-service (DDoS) attacks on US banks in retaliation to the controversial video "The Innocence of Muslims" posted on Google's YouTube service. ...
Tags: DDoS, US banks, controversial video, Wells Fargo
A security researcher known for finding Java bugs has uncovered a new critical zero-day vulnerability in all currently-supported versions of the popular Oracle software. The bug,which was publicly reported on the Full Disclosure security ...
Tags: Zero-Day Java Bug, security researcher, Security Explorations
Telvent,a Canadian energy firm whose systems are used to control more than half of all oil and gas pipelines in North America and Latin America,today confirmed a security breach involving the project files of some of its customers. In a ...
UK domain registrar 123-reg is helping website owners to protect themselves and their visitors with a new tool that identifies and helps remove malicious code from legitimate websites. According to the latest Anti-Phishing Working Group ...
Tags: compromised websites, legitimate websites, star Emma, Scanner software
A White House executive order on cyber security is "close to completion," according to Janet Napolitano, US Secretary of Homeland Security. The news comes just weeks after former White House cyber security chief Howard Schmidt said US ...
Tags: White House, US, cyber security, network
Despite an increasing number of successful cyberattacks launched by East Asian hackers against companies and government institutions around the world in recent years,Eastern European cybercriminals remain a more sophisticated threat to the ...
"The number of fronts of risk and war, as some people call it, are definitely multiplying," says Clinton McFadden, senior operations manager for IBM X-Force research and development, which just released the results of its X-Force 2012 ...
Tags: Cyberwarfare, Trend and Risk Report., IBM, US
Computerworld - Microsoft on Wednesday released a stopgap defense that protects Internet Explorer (IE) against attacks until the company issues a patch on Friday. The update will fix five flaws, including one revealed by a security ...
At least 19 major Japanese websites have fallen victim to cyber-attacks,thought to be from China,as a territorial dispute between the countries rumbles on. Japan's National Police Agency says websites including those of the ...
Tags: Japanese website, territorial dispute, China, Japan
The Financial Services Information Sharing and Analysis Center (FS-ISAC) has put U.S. banks on high alert against cyberattackers seeking to steal employee network login credentials to conduct extensive wire transfer fraud. The alert warns ...
Tags: Cybercrime, Hacking, U.S.Banks, IT security
Cyber criminals from eastern Europe pose just as big a threat as their more high-profile east Asian rivals, says security firm Trend Micro. Research has shown that east European hackers tend to use custom-built, highly-complex malware. ...
Tags: Cyber criminals, security, cyber security, hackers
The UK national Cyber Security Challenge has launched another competition to test the ability of amateur cyber defenders to protect a simulated government IT system. The competition is designed and run by the government's communications ...
Tags: defend, government, cyber attacks
With opposition growing to reported plans by President Obama to issue an Executive Order to bolster cybersecurity within the nation's critical infrastructure,the main question now is whether the White House will plow ahead with the idea or ...
Tags: Obama, White House, cybersecurity, hacker
The website of Domino's Pizza India was hacked,but customers'information was not compromised,the local franchisee Jubilant FoodWorks said on Wednesday. Personal information including names,phone numbers,email addresses,passwords and city ...
Tags: Domino, Turkish hacker group, India, security breach
Big data and intelligence-driven security are to be the focus of the RSA Conference Europe 2012 in London next month. Three of the keynote sessions are related to these topics and they are represented in just about every time slot of the ...
Tags: Big data and intelligence-driven security, RSA Conference Europe 2012