On February 26th the Federal Communications Commission voted in favor of stronger net neutrality rules. The vote reclassifies both wired and wireless broadband internet service providers (ISPs) as utilities under Title II of the Communications Act of 1934. Most of the media attention has focused on the ruling barring ISPs from blocking or prioritizing… Read More »
Billion Dollar Bank Hackers Use Old Phishing Technique
Last week the internet security firm Kaspersky Lab released a report on a highly-successful group of cybercriminals who targeted banks and may have stolen up to a billion across 100 financial institutions worldwide. While Kaspersky Labs did not name the victimized organizations, the report indicates they were mostly located in China, Russia and the United… Read More »
Android & PC Tie For First Place In Malware
A report published last week by Alcatel-Lucent revealed malware on mobile devices has caught up to the infection rate on traditional PCs. The report was created by the telecommunications company’s Motive Security Labs and used data compiled from fixed and mobile networks using their Motive Security Guardian software. The software is deployed in networks around… Read More »
My Phone Is Held Hostage By Ransomware, Now What?
Ransomware is a type of malware that holds your data hostage. It has been a problem with computers for many years, but it’s only recently started showing up on mobile devices. When you activate the program or app, it blocks you from accessing the data on the device and displays a message demanding payment by… Read More »
ISIS Hacks CENTCOM And You Are Next
On Monday, January 12th, the official Twitter account & YouTube channel for US Central Command or CENTCOM were hacked by ISIS supporters. Pro-ISIS propaganda appeared on @CENTCOM Twitter homepage warning “American Soldiers, we are coming, watch your back. ISIS.” @CyberCaliphate account is currently suspended but claims to have hacked the US Central Command Twitter account. Besides the… Read More »
Sony’s Dirty Laundry Reveals MPAA Attack Plans
Most of the information from the Sony Pictures Entertainment hack leaked so far has been embarrassing for the company, but not directly related to Internet security. However, last week some leaked emails revealed the Motion Picture Association of America (MPAA) is trying to find ways to effectively delete sites that host pirated content from the… Read More »
Sony Screams About Hackers But They’ve Invaded Our Privacy For Years
The hack attack on Sony Pictures Entertainment that’s been making headlines over the last couple of weeks is just the latest in a line of security breaches at Sony that stretch back to 2011. Many companies get attacked just because they are vulnerable targets, but Sony seems to have raised the special ire of the… Read More »
Penetration Testing Basics
As computer networks become more complex, they become more vulnerable to hackers. These weak points can take the form of hardware, operating system bugs, software and users who don’t adhere to security policies. One of the best ways to uncover them is to get a hacker to break in. What is Penetration Testing? It’s essentially… Read More »
- « Previous Page
- 1
- …
- 6
- 7
- 8
- 9
- 10
- …
- 12
- Next Page »