Stories about wealth of outgoing premier Wen Jiabao appeared to be catalyst for attack, possibly by military, says paper Jonathan Kaiman in Beijing guardian.co.uk, Thursday 31 January 2013 01.02 EST Chinese hackers, possibly from the country’s military, hacked the New… Read More ›
Technology
Hackers on anti-Egypt spree bury Egyptology journal in the sand
Bystanders in online war blasted offline By John Leyden Posted in Security, 23rd January 2013 10:57 GMT Free whitepaper – Enabling Datacenter and Cloud Service Management for Mid-Tier Enterprises Hackers waging war against Egyptian websites have forced the closure of… Read More ›
America archives its billions of tweets
AFP Tuesday, Jan 22, 2013 WASHINGTON – The Library of Congress, repository of the world’s largest collection of books, has set for itself the enormous task of archiving something less weighty and far more ephemeral – Americans’ billions of tweets…. Read More ›
Paging Dr Evil: Philips medical device control kit ‘easily hacked’
Homeland Security ‘taking an interest’ By John Leyden Posted in Security, 18th January 2013 17:03 GMT Free whitepaper – Enabling Datacenter and Cloud Service Management for Mid-Tier Enterprises Researchers have discovered security problems in management systems used to control X-ray… Read More ›
Security audit finds dev OUTSOURCED his JOB to China to goof off at work
Cunning scheme netted him ‘best in company’ awards By Iain Thomson in San Francisco Posted in Business, 16th January 2013 01:29 GMT Free whitepaper – Why RAID is Dead for Big Data Storage A security audit of a US critical… Read More ›
‘Red October’ has been spying on WORLD LEADERS for 5 years – researchers
New flavour of cyberespionage malware uncovered by security bods By John Leyden Posted in Security, 14th January 2013 18:04 GMT Free whitepaper – Shutterfly and Cleversafe Partner Case Study Security watchers have discovered a malware-based cyber-espionage campaign targeting diplomats, governments and… Read More ›
Outdated version of WordPress leads to MasterCard Hack
Author : Mohit Kumar on 1/09/2013 07:29:00 AM . On tip of a readers, yesterday we came across a new MasterCard hack, performed by Syrian Electronic Army. Hackers was able to breach MasterCard Blog (https://insights.mastercard.com) and make a new blog… Read More ›
Under the hood of recent DDoS Attack on U.S. Banks
Author : Wang Wei on 1/10/2013 02:48:00 AM Incapsula security study reveals how a simple neglect in managing the administrative password of a small UK site was quickly exploited by Botnet shepherds operating obscurely out of Turkey to hurl large… Read More ›
Armed forces are vulnerable to cyber attack, warn MPs ” entire combat units, such as aircraft and warships, could be rendered completely dysfunctional by a cyber attack “
Commons Defence Committee said threat to UK security had ability to evolve at ‘almost unimaginable speed’ Gavin Cordon Wednesday, 9 January 2013 The armed forces are now so dependent on information technology that their ability to operate could be “fatally… Read More ›
US nuke lab drops Chinese networking kit
Report says Los Alamos ditched H3C kit over security concerns By Simon Sharwood, APAC Editor Posted in Security, 8th January 2013 02:31 GMT Free whitepaper – The Definitive Guide to Dispersed Storage The Los Alamos National Laboratory, home of some… Read More ›
Could Human Enhancement Turn Soldiers Into Weapons That Violate International Law? Yes
•Subscribe •Renew •Give a Gift •Digital Edition By Patrick Lin New technologies reveal ambiguities and hidden assumptions in international humanitarian law. Alexis C. Madrigal Science fiction, or actual U.S. military project? Half a world away from the battlefield, a soldier… Read More ›
Anti-virus products are rubbish, says Imperva
‘Spend not proportional to effectiveness’ By Richard Chirgwin Posted in Security, 1st January 2013 21:15 GMT Free whitepaper – Media and Entertainment Goes Digital A study released in December by US security outfit Imperva has tipped a bucket on the… Read More ›
One in three have online medical record, many without knowledge
More than one in three people have had their medical details uploaded onto a central database accessible by healthcare professionals across the country, many without their knowledge, it has been claimed. Health Secretary Jeremy Hunt is keen to boost the… Read More ›
Chinese Hackers exploiting Internet Explorer Zero Day vulnerability for Cyber Espionage
Author : Mohit Kumar on 12/29/2012 03:37:00 AM Web site for the Council on Foreign Relations was compromised and recently hit by a drive-by attack that was detected earlier this week. Hacker are suspected to be from China… Read More ›
New WordPress vuln emerges
W3 Total Cache has faulty defaults By Richard Chirgwin Posted in Security, 27th December 2012 21:29 GMT Free whitepaper – Why RAID is Dead for Big Data Storage Sorry to spoil the day for any sysadmins that thought today would be… Read More ›
Satellite Wars: China unveils ‘cheaper’ answer to GPS
Published: 27 December, 2012, 22:33 Edited: 27 December, 2012, 22:33 China’s rapidly-expanding rival to GPS, called BeiDou, has become available to customers across Asia-Pacific for the first time. It aims to claim a fifth of the satellite services market… Read More ›
Maybe it’s time for a little human enhancement – Morally enhancing drugs added to our Water Supply
Sam de Brito Published: December 23, 2012 – 3:00AM ‘There’s something in the water.” That’s what we say when we observe a bunch of locals behaving in the same, odd way, but maybe it’s also the answer to… Read More ›
Personalised pricing: driving prices down? Yes, a Price Just for You !
The Office of Fair Trading is probing whether some websites use data to hike prices for individual consumers – legal expert Vanessa Barnett says the opposite is likely to be the case. Personalised pricing is similar to supermarkets’ loyalty schemes,… Read More ›
Ready to eat: the first GM fish for the dinner table
US decision after 17-year battle over fast-growing salmon could pave way for same step in Britain Steve Connor Monday, 24 December 2012 A GM salmon which grows twice as fast as ordinary fish could become the first genetically-modified animal in… Read More ›
Stabuniq Trojan rapidly stealing data from US banks
Author : Mohit Kumar on 12/23/2012 04:26:00 AM Trojan.Stabuniq geographic distribution by unique IP address Security researchers from Symantec have identified a new Trojan that appears to be targeting financial institutions. Dubbed Trojan.Stabuniq, the malware has been collecting information from… Read More ›
10,000 Indian government and military emails hacked
State-sponsored snoopers suspected of large scale incursion By Phil Muncaster Posted in Security, 21st December 2012 05:14 GMT Free whitepaper – Why RAID is Dead for Big Data Storage India’s government and military have suffered one of the worst cyber attacks… Read More ›
Google starts watching what you do off the Internet too
Published: 20 December, 2012, 22:24 Edited: 20 December, 2012, 22:24 The most powerful company on the Internet just got a whole lot creepier: a new service from Google merges offline consumer info with online intelligence, allowing advertisers to target… Read More ›
Twitter suspends Anonymous account
Dec 19, 2012 21:10 Moscow Time © Collage “The Voice of Russia” YourAnonNews, a Twitter account used by members of Anonymous to relay messages pertinent to the hacktivist movement, has been suspended. Twitter users aligned with Anonymous and other online… Read More ›
WordPress Pingback Vulnerability Serves DDoS attack feature
Author : Mohit Kumar on 12/18/2012 06:47:00 AM Accunetix a web application security company reported vulnerabilities found in the WordPress Pingback feature. According to report, Pingback vulnerability exists in the WordPress blogging platform that could leak information and lead to… Read More ›
Stolen NASA laptop contained private info on 10,000+ employees
By Stephen C. Webster Monday, December 17, 2012 15:55 EST A laptop computer stolen from a vehicle of a NASA employee on Halloween contained sensitive, private information on more than 10,000 current and former NASA employees, an internal report… Read More ›
Korean Cyber espionage attack Targets Russia
Ask an expert on cyber espionage and he for sure he will speak of China, the most active and advanced country in this sector, this time a clamorous campaign apparently originated from Korea has been discovered. . Security company FireEye… Read More ›
Internet Explorer flaw allows Hackers to Track your Mouse; “Almost every US-based user of Internet Explorer will have their mouse cursor tracked via this exploit almost every day “
Author : Mohit Kumar on 12/15/2012 05:09:00 AM A vulnerability in different versions of Microsoft‘s widely used browser Internet Explorer can allow hackers to track the movements of your mouse. Microsoft is investigating reports of a mouse-tracking flaw that puts… Read More ›
McAfee warns of Project Blitzkrieg hack attack on US banks
No, not that McAfee, the other McAfee By Iain Thomson in San Francisco Posted in Security, 15th December 2012 00:52 GMT Free whitepaper – Shutterfly and Cleversafe Partner Case Study Security firm McAfee warns that there is a credible threat of… Read More ›
CU-Boulder team develops swarm of pingpong ball-sized robots
December 14, 2012 University of Colorado Boulder Assistant Professor Nikolaus Correll likes to think in multiples. If one robot can accomplish a singular task, think how much more could be accomplished if you had hundreds of them. Correll and his… Read More ›
Hacker ruined Australian military security in 3 Minutes
Author : Mohit Kumar on 12/12/2012 06:25:00 AM Some 22,300 purported student and staff records held by the Australian Defence Force Academy were stolen and published online last month. A member of the Anonymous group, known as Darwinaire, is claiming responsibility… Read More ›
MPs: ‘Chilling’ new libel law will CENSOR THE TRUTH online
We’re not trolling, you can silence a site with an email By Kelly Fiveash, Networks Correspondent Posted in Law, 12th December 2012 13:57 GMT Free whitepaper – A Paradigm Shift in Digital Asset Storage A proposed overhaul to the UK’s… Read More ›
Russian space research org targeted by mystery malware attack
Korean message forum becomes cyber-espionage hub By John Leyden Posted in Security, 12th December 2012 10:03 GMT Free whitepaper – A Paradigm Shift in Digital Asset Storage Security researchers have discovered a targeted attack against Russian hi-tech firm that appears to… Read More ›
GhostShell hackers release 1.6 million NASA, FBI, ESA accounts
Hacktivist crew signs off for Christmas By Iain Thomson in San Francisco Posted in Security, 11th December 2012 01:19 GMT Free whitepaper – Enabling Datacenter and Cloud Service Management for Mid-Tier Enterprises The hacking collecting GhostShell has announced it has finished… Read More ›
Do we live in a computer simulation? UW researchers say idea can be tested
By Vince StricherzNews and Information A decade ago, a British philosopher put forth the notion that the universe we live in might in fact be a computer simulation run by our descendants. While that seems far-fetched, perhaps even incomprehensible, a… Read More ›
Saudi Aramco: Foreign hackers tried to cork our gas output
Worm outbreak targeted oil giant’s sensitive machinery By John Leyden Posted in Security, 10th December 2012 14:56 GMT Free whitepaper – A private Cloud-based approach Hackers who used the Shamoon worm to attack oil giant Saudi Aramco were bent on… Read More ›
Hackers Hit Former U.S. Military Chief
Author : Mohit Kumar on 12/07/2012 06:28:00 AM According to reports, the hackers targeted personal computers retired Admiral Mike Mullen, the former chairman of the Joint Chiefs of Staff. The FBI is hunting for foreign hackers. Mullen is currently teaching WWS 318:… Read More ›
Search for Life Suggests Solar Systems More Habitable than Ours
12/3/12 Poster P11B-1816, “The Distribution of Radiogenic Elements in Stars with and without Planetary Systems: Implications for Dynamics and Habitability,” will be presented from 8:00 a.m. – 12:20 p.m PT on Monday, Dec. 3, 2012 in Moscone South Hall A-C…. Read More ›
Robopocalypse, or killing robots: where humans are the target
Sarah Neary Dec 6, 2012 18:12 Moscow Time © Photo: SXC.hu Run for cover! Robots may become self-governing devices with built-in firearms in massive numbers worldwide. Yet, robots’ picking who to destroy on the battlefield is a recipe for disaster…. Read More ›
Couple Claim Cop Stole Their Drugs: Utah does not safeguard personal prescription information from unlawful access or dissemination
By JONNY BONNER SALT LAKE CITY (CN) – A city cop used Utah’s prescription drug database to visit a couple’s home for so-called “pill checks” and steal their pain drugs, hoping “they would be too dumb to notice the pills… Read More ›
New Mac Malware ‘Dockster’ Found on Dalai Lama site
Author : Mohit Kumar on 12/05/2012 03:48:00 AM A new trojan horse app called Dockster is targeting Mac users by exploiting a known Java vulnerability CVE-2012-0507. The trojan is apparently being delivered through a website (gyalwarinpoche.com) dedicated to… Read More ›
US and UK spooks alerted over massive Swiss data leak
Rogue IT admin plundered state secrets By Iain Thomson in San Francisco Posted in Security, 4th December 2012 19:25 GMT Free whitepaper – A private Cloud-based approach The Swiss intelligence agency (NDB) has been warning its US and UK counterparts that… Read More ›
Sensitive information of 1 Million people breached at Nationwide Insurance
Author : Mohit Kumar on 12/02/2012 09:25:00 PM Nationwide Insurance was breached last week and Sensitive information of about 1 Million people is at risk. The FBI is investigating a breach, including policy and non-policy holders. . Nationwide mailed notices to… Read More ›
Who’s using ‘password’ as a password? TOO MANY OF YOU
Study of hacked websites reveals top 25 common passphrases By John Leyden Posted in Security, 3rd December 2012 12:37 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques A study to find the top 25 leaked passwords of… Read More ›
From sci-fi to reality: The computer-blitzing drone that can cripple a nation’s electronics at the touch of a button
Aircraft manufacturer Boeing have created a weapon that can knock out computers The missile is thought to be able to penetrate bunkers and caves Experts warn, in the wrong hands, could bring Western cities to their knees By Ben Ellery… Read More ›
Malware slurps rocket data from Japanese space agency
Secrets of Epsilon go out the door By Iain Thomson in San Francisco Posted in Security, 30th November 2012 22:58 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques Malware on a computer in the Japan Aerospace Exploration… Read More ›
Crooks inject malicious Java applet into FOREX trading website
VXers wouldn’t give a XXXX for anything else By John Leyden Posted in Security, 30th November 2012 07:29 GMT Free whitepaper – The Benefits of a Hybrid Security Architecture A FOREX trading website has been contaminated with a malicious Java… Read More ›
Microsoft STALKS YOU even more than supermarkets do, says dev
Original URL: http://www.theregister.co.uk/2012/11/29/web_tracking/ Hey, get your tracker kit out of my trouser browser By John Leyden Posted in Security, 29th November 2012 12:57 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques Web-tracking is rife on technology vendor websites,… Read More ›
Antivirus biz’s founder unmasked as noted Chinese hacker
Original URL: http://www.theregister.co.uk/2012/11/29/anvisoft_chinese_intrigue/ Blackhat once attacked US Department of Defense By John Leyden Posted in Security, 29th November 2012 09:19 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques Antivirus startup Anvisoft was founded by an infamous Chinese hacker… Read More ›
U.S. DoD’s Autonomous Weapons Directive Keeps Man in the Loop: ” Humans still must play an oversight role “
Nov. 27, 2012 – 01:43PM | By AARON MEHTA | The U.S. Defense Department has issued a new directive on the use of autonomous and semi-autonomous weapon systems, an attempt to regulate a technology that officials say could be years… Read More ›
US software firm hacked for years after suing China
Original URL: http://www.theregister.co.uk/2012/11/29/solid_oak_china_hacked_three_years/ Solid Oak nearly went under after three years of persistent attack By Phil Muncaster Posted in Security, 29th November 2012 04:05 GMT Free whitepaper – Gartner: Secure Web Gateway Malware Detection Techniques A Californian software company which sued… Read More ›