Prism whistle-blower Edward Snowden persuaded other National Security Agency (NSA) colleagues to give him their login details and passwords, which he later used to gain access to classified information that he later leaked to the media. ...
Tags: Computer Products, software
Security expert and reformed hacker Kevin Mitnick has branded anti-virus software useless, claiming: "The only thing McAfee is good at is making videos." Further reading Not enough cyber warriors to fight computer hackers, says former ...
Tags: Computer Products, software, hacker
There's a shortage computer hackers willing to fight back against cyber criminals on behalf of government and businesses, a former White House security chief has warned. "As with anything, it really comes down to human capital and there ...
Tags: Computer Products, software, web security
Kaspersky has discovered 'Icefog', a hacking campaign that targets the supply chains of Western companies, a report by the security and anti-virus software solutions provider has revealed, as it warns about the growing threat of ...
Tags: Kaspersky, software, Computer Products
German hackers claim to have breached the Apple iPhone 5S's fingerprint security. In a post on its website, German group Chaos Computer Club (CCC) describes how members of its biometric hacking team were apparently able to take a photo of ...
Tags: Apple Iphone, Computer Products
On the surface, Bitcoin seems to be a great way to hide cash. Actually, it's a terrible way to launder money. That's the conclusion of a?new academic study?that analyzed Bitcoin's blockchain, or the public ledger that records bitcoin ...
Tags: Computer Products, software
The New York Times website was unavailable to its readers yesterday afternoon in the US, after a cyber attack on the organisation's web host, Melbourne IT. Twitter, which uses Melbourne IT as a domain name registrar, was also affected by ...
Tags: Computer Products, webservice
Firefox is the most stable web browser and Internet Explorer (IE) the most error- and crash-prone, according to mobile testing company Sauce Labs. It made the claims after testing the various popular browsers. Further reading Microsoft ...
Tags: Computer Products, Firefox, software
Facebook has blamed a misunderstanding for an embarrassing incident last week in which founder Mark Zuckerberg's Timeline was hacked to draw attention to a security flaw a researcher believed was being ignored by firm. As QEDs go, what ...
Tags: Facebook, Computer Products
After a Palestinian researcher was denied a bug bounty by Facebook, Marc Maiffret, CTO of BeyondTrust, kicked off a crowd-sourced fund yesterday to come up with a reward. The researcher, Khalil Shreateh, expressed his gratitude today to ...
Tags: Computer Products, software
Researchers showed a Black Hat audience how femotcell technology, used by phone companies to boost cell phone coverage, can be hacked to intercept cell phone calls, text messages and other data. Tom Ritter and Doug DePerry , researchers ...
Tags: Phone Calls, Exploit Cellular Tech
A skeptical but mostly respectful crowd of Black Hat security attendees Wednesday listened intently as National Security Agency Director Keith Alexander defended controversial U.S. surveillance programs in a keynote address. The nearly ...
Tags: NSA Spy Programs
More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system. Security vendor Webroot and ReKey, a collaboration between Northeastern University in Boston and ...
Tags: Computer Products, software
Cyber criminals could face tougher penalties across the European Union under new rules adopted by the European Parliament, which include the creation of a specific offence of using botnets. The draft directive adopted by the parliament on ...
Tags: EU Parliament, Cyber Attacks
A four-year-old vulnerability could infect 99 per cent of Android devices with Trojan malware without users even realising, a team of security researchers has claimed. A blog post by Bluebox CTO Jeff Forristal said the vulnerability has ...
Tags: Android, virus, data safety