A security researcher has released software and technical instructions for modifying a drone so that it can identify and hijack other drones. Security researcher Samy Kamkar created the hacker drone, which uses the Parrot AR.Drone 2.0 ...
IBM yesterday announced an agreement to acquire Fiberlink Communications, saying the purchase is a key part of a broader mobile-security strategy to provide assurance in transactions conducted via devices such as iPhones and Android ...
Tags: IBM, Fiberlink, mobile-security, strategy, lynchpin
West Africa is experiencing a surge in piracy, with well-organised hijackers targeting the region's growing oil and gas industries, writes national security expert Dr James Jay Carafano in World Review. Although efforts to combat crime at ...
Tags: pirate, plunder, West Africa, oil, gas
With Bob Dylan's "The Times They Are a Changin" booming into the Marriott World Centre conference hall, American Trucking Associations president Bill Graves took to the stage this morning and addressed how change will transform the US ...
Tags: Transportation, Auto, truck
Network Solutions is investigating an attack by a pro-Palestinian hacking group that redirected websites belonging to several companies. Owned by Web.com, Network Solutions registers domain names, provides hosting services and sells other ...
Tags: DNS Hijack, Network Solutions
LinkedIn's domain name was temporarily redirected to a third-party server Thursday, which resulted in a service outage and potentially put user accounts at risk of compromise. Uptime monitoring service Pingdom recorded that LinkedIn was ...
The first three months of 2013 have seen a surge in spam volume, as well as large numbers of samples of the Koobface social networking worm and master boot record (MBR) infecting malware, according to antivirus vendor McAfee. After ...
Tags: McAfee, Spam, MBR Attack
Much-hacked social networking site Twitter has finally introduced two-factor authentication in a bid to cut down on the hijacking of accounts. The move follows a string of hacks of high-profile accounts by groups such as the ...
Tags: Twitter, Authentication, Google, Facebook
Security researchers from Russian cybercrime investigations firm Group-IB have uncovered a cyberfraud operation that uses specialized financial malware to target the customers of several major Australian banks. Over 150,000 computers, ...
Cybercriminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG). Forty-seven percent of all ...
Tags: Hackers Target, Computer Products
Cyber criminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG). Forty-seven percent of all ...
Tags: Hackers, Web Hosting Servers
Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online. ...
Tags: Researchers, Trading Software
The lack of security in communication technologies used in the aviation industry makes it possible to remotely exploit vulnerabilities in critical on-board systems and attack aircraft in flight, according to research presented Wednesday at ...
Thousands of wireless IP cameras connected to the Internet have serious security weaknesses that allow attackers to hijack them and alter their firmware, according to two researchers from security firm Qualys. The cameras are sold under ...
Tags: Wireless IP Cameras, Cameras
Security vendor Sophos has released an update for the software used on its Web gateway security appliance in order to address three serious vulnerabilities in the product's Web-based user interface. The vulnerabilities could allow ...
Tags: Web Security Appliance, Security, Computer Products, web, Security vendor