Mortgage customers' names, Social Security numbers and account numbers were exposed.
'Internet connectivity in the cabin should be considered a direct link between the aircraft and the outside world,' a GAO report states.
City workers will be able to turn lights on and off remotely, and will be able to dim them or brighten them as needed.
Still, 32 percent told the SANS Institute they have no ability to prevent an insider breach.
Both operations required coordination between government agencies and private sector partners.
The episodes were downloaded over a million times in less than a day.
The company will also provide almost 280,000 customers with free credit monitoring services, and will improve its privacy and security practices.
The attack appears to have been launched in retaliation for sanctions, according to CNN.
A recent survey found that 55 percent of organizations that have been hit by such attacks recommend negotiating with cybecriminals to restore data.
The campaign targets organizations with a combination of social engineering and DDoS attacks.
The target distribution 'strongly aligns with nation-state/political-group interests,' according to Check Point researchers.
15 CDs containing high-risk professionals' personal information were mistakenly sent to people requesting voter registration records.
'Starting today, we're giving notice to those who pose significant threats to our security or economy,' President Obama said.
The attack exploits an old ActiveX vulnerability, according to Symantec researchers.
The airline says tens of thousands of accounts were accessed.
User names, emails addresses and hashed passwords were exposed.
The vulnerability could enable a remote attacker to read or modify any file on an ANTlabs InnGate device, according to Cylance researchers.
That's an 18 percent increase over the previous year in vulnerabilities found, according to Secunia.
An undisclosed number of users were told their passwords 'could have been captured in clear text by malicious code.'
The malware installs a keylogger and scans the infected device's memory for credit card data.
The vulnerability allowed attackers to access any HHonors account simply by knowing or guessing the account number.
One third of IT professionals surveyed said they've experienced more security breaches with the public cloud than with on-premise applications.
The hackers may have accessed the personal, financial and medical information of as many as 11 million people.
The North Korean government called the accusation 'a false judgement by an idiot.'
Names, Social Security numbers, birthdates, phone numbers and home addresses were accessed.
- Mar 2015
- Feb 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Nov 2011
- Aug 2011
- Jun 2011
- Mar 2011
- Dec 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Apr 2006
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?