Stay informed on the latest cybersecurity threats and news to better protect your data, networks, applications, and devices. Our coverage includes emerging vulnerabilities, evolving attack techniques, and the latest security breaches to help you understand and mitigate risks.
As security breaches continue to grow both in frequency and in the amount of damage they cause (according to Symantec, the average organization incurred $470,000 in losses from endpoint cyber attacks in 2011), penetration testing is becoming increasingly important for organizations of all sizes. For IT professionals seeking to expand their knowledge in that…
According to Symantec’s annual Internet Security Threat Report, religious and ideological Web sites have far more security threats per infected site than adult/pornographic Web sites. “We hypothesize that this is because pornographic Web site owners already make money from the Internet and, as a result, have a vested interested in keeping their sites malware-free —…
Members of Anonymous and the Peoples Liberation Front (PLF) recently announced the launch of the AnonPaste service for the uploading and sharing of data. “Paste services have become very popular, and many people want to post controversial material,” the groups wrote in a joint statement. “This is especially so for those involved in Information Activism.…
According to an FBI affadavit, alleged CabinCr3w hacker Higinio O. Ochoa III was caught by FBI agents after posting a photo of his girlfriend online. “Higino O. Ochoa III was charged with illegally hacking into U.S. law enforcement websites and releasing personal information of several U.S. police officers under the online name ‘w0rmer,’” writes Digital…
Nude photos of “Glee” star Heather Morris were recently posted online. “The naked pictures are alleged to have been stolen by hackers from the 25-year-old actress’s mobile phone,” writes Sophos’ Graham Cluley. “In November 2011, Christopher Chaney of Florida pleaded not guilty to hacking into the email and cellphones of some 50 people, including Scarlett…
A new botnet coded by TheGrimReap3r is currently nearing completion, and will soon be offered for sale on hacking forums for $8,000. “THOR does not use a central [command and control server],” Infosecurity reports. “It has a decentralized architecture based on peer-to-peer (P2P) technology. P2P botnets are the latest innovation in the battle between whitehat…
The porn site Digital Playground was recently hacked by The Consortium, exposing 72,794 customers’ user names, e-mail addresses and passwords, as well as more than 44,000 credit card numbers. “They did not dump the 44,663 credit card numbers that they claim to have acquired, but note that card numbers, card expiration date, cvv and all…
In the earlier days of computers, virus writers and hackers were viewed as fame-seeking and adrenaline-hungry teens with nothing better to do. But as PC usage and the Internet grew, the amount of potential victims grew exponentially and money became the hacker’s greatest motivator; spawning a whole new cyber-lexicon that now includes the term criminal.…
The cornerstone of any reliable security system is authentication, the way of confirming the truth of something or the identity of a person. To protect data and/or control access to data, many organizations still rely on the simplest and most common form of authentication: the password. Not surprisingly, the basic password is too often breached…
Members of Anonymous claim to have taken down more than 50 child pornography Web sites and leaked the names of more than 1,500 members of one of the sites. “The Anonymous campaign began Oct. 14, when members of the hacktivist group found a cache of child-pornography websites while browsing a secret website called the Hidden…