A top internet security official in China has said that his organization has “mountains of data” on U.S. cyber attacks against the country. Huang Chengqing, the director of the National Computer Network Emergency Response Technical Team Coordination Center of China (CNCERT), made the comments in the state-run China Daily newspaper, calling for greater cooperation between the two states on hacking.
China has accused the United States of being, “the real hacking empire” after a Pentagon report which said for the first time that cyber attacks on the U.S. were “directly attributable” to Beijing.
Up to 600,000 gamers at risk as emails and other details stolen from online zombie game
Stepping up protection of the Apple ID falters as password reset bug emerges before two-step verification is fully implemented.
The Associated Press reports that celebrities, including ashton Kutcher and Kim Kardashian, along with top government officials have had private financial information stolen and posted to a rogue website.
Several email accounts belonging to family members of former President George W. Bush were hacked and the contents made public, exposing private data, correspondence and personal photos, according to The Smoking Gun. The apparent hack affected email threads between several members of the Bush family, including both former U.S. Presidents. According to the report, the
The uncertainty around Java shows no sign of abating as Apple blocks all versions of Java on OS 10.6 and above through its anti-malware security applet, XProtect. This follows the blocking in all but name by Mozilla as it moved to end auto-loading of plug ins for the Firefox browser.
A hacker who broke into celebrity email accounts and leaked nude pictures of Hollywood actors, including Scarlett Johansson, has been sentenced to 10 years in prison, according to an Associated Press report.
An attack on the Australian Defence Force Academy servers held at the University of New South Wales (UNSW) resulted in the loss of 20,000 user records. According to a report in the Sydney Morning Herald the hacker, known as Darwinare, managed to break in and steal the records, including passwords and email addresses in a
As you may know, October is National Cyber Security Awareness Month in America, which is a good time to ask yourself how aware you are when it comes to threats to your digital devices and personal information.
In May we read that game maker Blizzard, developer of a series of popular games including World of Warcraft, Diablo III and Starcraft, was hacked, but that turned out to just be individual compromised accounts from some of its users. Now we read, from Blizzard itself rather than a third party, that they have been
Sharing details of the hack that “wiped his life” has earned Mat Honan a place in the annals of information system security; the specific inter-dependence of flawed authentication systems that cost him so dearly–encompassing Apple, iCloud, Amazon.com, Gmail and more–would probably still exist if Mat had not gone public. Wired has the full story here
Gamigo learned a few months ago about a breach and alerted its users that they had been attacked. But now, we see an estimated 8+ million records just went public, no small amount for the attackers. What is interesting is that by one account, hash cracking was able to decrypt over 90% of the passwords,
We read in the New York Times that Google is rolling out a service that will attempt to alert users when it thinks their accounts might be subject to hacking by a government, hoping the user will take precautions after getting a notice that says “Warning: We believe state-sponsored attackers may be attempting to compromise
You just got a new wireless router for Christmas, but when you set it up it asks about wireless security. Do you want WEP, WPA, WPA2 or any of the other alphabet soup options they give? While it’s easiest to just pick the default setting, are you setting yourself up for trouble from aspiring hackers?
Recently we noted that unencrypted credit card storage was on the rise in 2011, and also highlighted the expense involved to the company in the event of a credit card breach. Now we see personal data – including unencrypted credit card information – being paraded out as a part of the recent Stratfor hack. Also,
One of the blessings of Open Source initiatives is the rapidity with which coders can release quality collaborative code. This is one of the ways the Android managed to claw its way into the smartphone mainstream, after arriving late to the game. But as the app ecosystem matures, vulnerability/patch management becomes more of an issue,
With all the recent headlines about data breaches, should your organization hire a “thief to catch a thief?” That’s a question Kevin Mitnick, sitting near the top of the hacker hall-of-fame for famous hack sprees in decades past, has been contemplating. He’s not alone – many companies are wondering the same thing. There is a
On the heels of the recent activity with Stuxnet, the industrial process control computer worm that targeted Iranian nuclear centrifuges, a Blackhat talk by Thanassis Giannetsos explains how to hack yet another commonly used family of controllers. We have mused that this trend, targeting critical infrastructure nodes, is but a shade of things yet to