The unique identifiers of 1 million Apple iOS devices that hackers leaked last week were stolen from the servers of a Florida-based digital publishing firm called Bluetoad. Bluetoad develops digital distribution technologies. Its ...
Tags: Apple iOS devices, US, Cybercrime, Hacking
In a decision likely to be sobering for companies fighting insider threats, an appeals court has ruled that an employee who used his valid computer access rights to access data from his employer can't be prosecuted under a federal ...
Tags: federal law, cybercrime, hacking, USA
Apple today issued a Java update for OS X Lion and Snow Leopard to make it more difficult for hackers to exploit other vulnerabilities. The update brought Java 6 up to par with Oracle's version 35,which it released last ...
Tags: Apple, Java 6, OS X Snow Leopard And Lion, Oracle
The FBI on Tuesday denied that the 1 million unique device identifiers for Apple devices(UDIDs)posted publicly by hacker group AntiSec on Monday had come from its computers. In a brief statement,the FBI's national press office said the ...
Hackers stole about$250,000 from BitFloor,a BitCoin exchange,on Monday and it does not have the money to reimburse account holders,according to the website's founder. BitCoins are an electronic currency that are generated as computers ...
Claims that 12 million unique device identifiers(UDIDs)of Apple iPads were hacked from the laptop of an FBI agent have been rebutted by the US law enforcement organisation. The FBI–which has its own Twitter feed–initially ...
Tags: FBI, Apple iPad UDID leak, 12 million unique device identifiers
Hackers operating under the Antisec banner have leaked over one million Apple user IDs that they say they took from the FBI. The hackers were able to get their hands on the information when they accessed a laptop belonging to an FBI ...
Tags: Hackers, Antisec banner, Apple user IDs, leaked, FBI
Hackers are distributing rogue email notifications about changes in Microsoft's Services Agreement to trick people into visiting malicious pages that use a recently circulated Java exploit to infect their computers with malware. "We're ...
Tags: Malware, Vulnerabilitie, rogue email notification, malicious email
Computerworld-Oracle today issued an emergency update to patch the critical vulnerabilities hackers have been using in increasing numbers to hijack Windows PCs. According to Rapid7,the security firm that maintains the Metasploit ...
Tags: Oracle, patch, hackers, hijack Windows PCs
Computerworld Hong Kong - At a Computerworld Hong Kong event years ago, I heard a senior executive explain how online retailer Amazon re-engineered their e-commerce process for the Christmas gift-giving season. Like many retail ...
Tags: Amazon, hackers, MS, reddit, Miss Hong Kong
Details of further Java exploits are coming to light,while Oracle has still yet to release a fix for its customers. Since Computing reported on Michael Schierl's research into the Java 7 exploit,Immunity Products'Esteban Guillardoy has ...
Tags: Oracle, Java exploit, security bug, patch
IDG News Service-The source code of"We The People,"the online system that can be used by citizens to submit their petitions to the White House,is being offered as open source software,an official said on Thursday. "Now anybody,from other ...
Tags: petitions, open source software, SOPA, PIPA, API
A timer found in the Shamoon cyber-sabotage malware discovered last week matches the exact time and date when a hacktivist group claims to have disabled thousands of computers from the network of Saudi Aramco,the national oil company of ...
Tags: Shamoon cyber-sabotage malware, Saudi Arabia, oil company, Aramco company
A flaw found in Apple's iPhone that can allow text messages to sidestep Apple's safeguard is"severe",according to an iPhone security researcher. In a blog post,the researcher,named Pod2g,said that the issue could mean that cyber criminals ...
Tags: iPhone SMS security flaw, iPhone security researcher, blog post Pod2g
Cybersecurity researchers have uncovered a new threat targeting infrastructure in the energy sector that is believed to have hit at least one organisation. The malware, dubbed Shamoon, corrupts files on a compromised computer and ...
Tags: threat targeting infrastructure, computer security, computer attack