The mother of hacker Gary McKinnon marked the end of a traumatic chapter of their lives when she give thanks to all those who helped their 10-year campaign against a US order for his extradition to face charges for hacking federal ...
Tags: Gary McKinnon, hacking federal computer, home secretary, computer
Microsoft may have known about last week's Internet Explorer (IE) zero-day bug for some time, according to its security advisory. The vulnerability, which was patched Friday in an emergency, or "out-of-band," update, first became public ...
Tags: Microsoft, IE, bug, vulnerability
When you talk with the executives of most U.S. companies the subject often turns to the global market and the opportunities for growth that countries like China offer. However, as that conversation continues the next thing you often hear is ...
Tags: China, opportunities, Intellectual Property, theft of IP
Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Coppola, who is a security ...
Tags: SOHO routers, botnet clients, backdoored versions, firmware
In the wake of a multi-faceted hack of a technology reporter that ended with his smartphone, tablet and notebook wiped of all data, Google's spam chief yesterday urged users to set two-factor authentication on their log-ins. "I ... advise ...
Tags: Google, spam chief, authentication, tech reporter hack job
A hacker group calling itself the Arab Youth Group has claimed responsibility for what appears to be a serious hacking attack on Saudi Aramco, one of the world's largest energy companies. The attack comes at the same time security firms ...
Tags: hacker group, Arab Youth Group, Saudi Aramcom, energy companies
A new Trojan horse tries to covers its tracks by crippling the victim's computer after stealing data, a security researcher said today. Dubbed "Shamoon" by most antivirus companies, the malware has been used in targeted attacks aimed at ...
Tags: Trojan horse, tracks, victim's computer, shamoon malware, Windows PCs
Shopping or banking online depends on trust. Individuals interact with sites that they trust, and sites have to trust the person who is transacting with them. Many online banking sites are turning to two-factor authentication to confirm ...
Tags: Banking fraud, education issue, online banking, trust
A small New York-based company that specializes in exchanging Bitcoins is back online after hackers stole about $250,000 worth of the virtual currency earlier this month. Roman Shtylman, founder of BitFloor, said by phone from London on ...
Tags: Bitcoins, back online, hackers
Approximately 3.6 million Social Security numbers and 387,000 credit and debit card numbers belonging to South Carolina taxpayers were exposed after a server at the state’s Department of Revenue was breached by an international ...
Tags: credit cards, Data leak, protection, security breach, Social securtiy
A Russian man has been arrested in Cyprus on charges that he launched denial-of-service attacks on Amazon.com and eBay in 2008, the U.S. Department of Justice announced. Dmitry Olegovich Zubakha, 25, of Moscow, was arrested Wednesday, the ...
Tags: Russian man, Cyprus, attacks, Amazon.com, eBay
U.S. officials today expressed dismay over the U.K. government's refusal to extradite British hacker Gary McKinnon, but insisted the broader extradition relationship between the two countries is as strong as ever. In separate statements, ...
Tags: U.S.officials, U.K.government, hacker, Gary McKinnon
An official document containing policies and pledges for customers of Oracle's cloud services reveals that many aspects fall in line with industry standards, while others may prompt cause for worry among customers, according to analysts. ...
Tags: Computer Products, Oracle Cloud, industry standards, monitoring tools
Attackers using two recently-uncovered Java unpatched vulnerabilities, or "zero-days," have quickly expanded their reach by going mainstream, security experts said today. And on Tuesday, Mozilla, maker of Firefox, joined the chorus of ...
Tags: Java, unpatched vulnerabilities, mainstream, security experts
The U.S. Air Force is openly soliciting technologies that would improve its capability of launching cyberattacks and gathering intelligence during cyberwarfare operations. "The Air Force Life Cycle Management Center invites concept papers ...
Tags: U.S., Air Force, soliciting technologies, cyberwarfare capabilities