Data Security: Hot Stories

Search Result for cyber in All Fields - Top 20 Stories

 Search Stories
Hot Words
Key Words
In Field



 Search Result for cyber in All Fields - Top 20 Stories
Disqus & Kickstarter Hacker Tells How to Against Password Reuse
After any data breached, they will be traded quickly in dark web or even public domain, and are available to cyber criminals all over the world. These privacy data are organized records to sell, showing password, email, name, address, and etc. It any vicitim reuses same password, he or she will become a potential target. The past hacker is telling how the attacks take place...
By Catalin Cimpanu  View Source  
Think before Bite: Phishing Targets Amazon Customers Ahead of Prime Day
This is a fault of Amazon or Prime Day, but its customers are becoming the targets for phishing. Recent years the more and more strong consumer group gives a larger space for cyber criminals to abuse. For example, a phishing kit makes it easy for beginning hacker to construct an email that looks uncomfortably similar to an email alert you would get from Amazon. Prime Day is becoming one of hottest shopping periods and also the hottest opportunities for cybercriminals...
By Austin Williams  View Source  
Formjacking Is the New Favorite Hack of Cyber Crooks
In some cases, your personal data is leaked not from your side. Every month, 4,800 websites around retail websites are targeted by cyber criminals, who snatch credit/debit card information with a hacking technique called formjacking, one of the newest favorite ways for hackers to steal personal data. Now small and medium-sized businesses are still the biggest targets of formjacking, but British Airways and Ticketmaster have also fallen victim to attacks. It possibly hurts confidences of online business...
By ALYSSA NEWCOMB  View Source  
North Korean Hackers Allegedly Pick on Russian Targets
North Korean hackers, known as Lazarus Group and run by government, typically focuses objects of South Korea, Japan and the U.S., but since January one of its suspected campaigns appears to have targeted Russian businesses. Some reports from international cyber security companies shew the attacks are with its signature Lazarus backdoor malware. Is it a positive signal for Feb summit?...
By Bradley Barth  View Source  
Privacy Data of Chinese Celebrities Is Reportedly for Sale
Some Chinese starts find their privacy data are for sale too. Either east or west, celebrities have found themselves victims of cyber attacks. However, difference or gap still remind us even in hackers' world: information on celebrities in China is easier and cheaper. Local Chinese media outlet Beijing News claims that they discovered it cost just US$45 to purchase data on more than 700 celebrities...
By Masha Borak  View Source  
Russian Hackers Leave Chinese in Their Cyberdust
Who is the champion on the hacker world? In the country sponsored race, Russian get the first place. Kremlin-backed groups, such as "Fancy Bear", take only 18 minutes and 49 seconds on average to "break out", or move from a single computer they have compromised into other machines in an organisation's network. The same task will costs two hours 20 minutes for North Korean hackers, and 4-5 hours for hackers of China and Iran...
By Mark Bridge  View Source  
White House Confirmed Attack On Office of Personnel Management
White House confirmed this week that China carried out the cyber attack on the OPM (Office of Personnel Management) and risk more than 22 million sensitive records on American government officials. Bolton disclosed the Chinese hacking in unveiling the Trump's new cyber strategy, which focuses on security efforts to a aggressive stance against cyber attacks. China has been the most aggressive part in cyber espionage and is also the main source to hack personal privacy...
By Bill Gertz  View Source  
Cambodia Strongman Extends 33-Year Rule in Boycotted Election
An election described as neither free nor fair in Cambodia is discussing widely. Some international factors are uncovered to impact the small country's election. Hackers from China is one of them. This month, U.S. cyber security firm FireEye said it found evidence of hackers sourced from Hainan infiltrating computer systems belonging to Cambodia’s opposition leaders and the media. Private emails and documents were stolen and fake news were targeted to particular audience...
By Philip Heijmans  View Source  
You Know Who’s Cyber Hacking Getting Ugly
This was a report of 5 years ago. Today we even cannot list its original title. It's not a concern of copyright, instead, it will add risk to be targeted as victim of cyber attack. In fact, the report is quit fair, not just point a finger to particular country or countries. It shows that America is not an innocent in the world of cyber-spying. It hints the real threat is most of victims give up fighting with dark forces so that cyber hacking is a low risk and high profit industry. 5 years passed, thing is even worse, we have to use "you know who" ...
By The Economist  View Source  
Hackers Abuse Google Ad To Spread Malware That Mines Cryptocurrency
Everyone is possible to become a victim of malware, even IT giants like Google. Trend Micro have spotted Google's ad network was abused to spread malware by hackers to mine cryptocurrency like Bitcoin. The network reaches about a quarter billion unique viewers in the U.S. alone, but cyber criminals just infected 5 countries up to now: France, Italy, Japan, Spain and Taiwan. The malware's goal is to mine cryptocurrency on your computers. It steals power of your computer power instead of privacy in it...
By Lee Mathews  View Source  
Chinese Hacker Groups To Shift Focus To India In 2018
Hackers aren't identical to criminals, although common people usually feel the risks from them and even leak data or lose money. Some hacker groups are actually backed by nation-states, called as APTs (Advanced Persistent Threat). It's one reason why cyber security situation is worse and malware is more. The recent reports disclosed Chinese APT groups are shifting focus in 2018 to India and other south Asia counties as a part of Beijing's global market goal. It's time to check if your data center is safe...
By Indo-Asian News  View Source  
Hacking the House: MPs Have to Care about Cyber Security
Is it common to share login passwords with your colleagues? At least this happens in the House of Commons. If an assistant can login to a MP's computer and somehow uses it to view pornography, the story isn't just limited in broken office code. The true risk is these sort of websites are the main distributers of malware, either spyware or ransomware. Considering the MP's computers have lots of classified data and files, hackers may get inspiration from recent porn website scandal there...
By Rory Cellan-Jones  View Source  
North Korean Malware Still Lurks in Computers Worldwide
The US Department of Homeland Security issued an alert about a hacker group "Hidden Cobra" also known as "Lazarus" that run a victims' networks and may launch further network exploitation. This hacker group is believed related to North Korea. Last month, Britain had blamed the country for being behind the WannaCry cyber attack in May. The malware had infected lots of computers of 150 countries, and even some Britain's hospitals had to cancel scheduled operations. FBI doubts Volgmer "backdoor Trojan" is the next...
By WION Web Team  View Source  
Kaspersky Confirms It Downloaded Secret NSA Tools
Kaspersky is anti-virus and cyber security company. If someday you hear it steal hacker tools from NSA, aren't surprised. Hackers and anti-virus software are actually in same industry and share same technology base. The U.S. government ordered Kaspersky's software to be removed from government owned computers last month because of meddling in the 2016 presidential election. Now the questions is: The security software is safe itself?
By Shane Savitsky  View Source  
Trend Micro Is Fighting Locky Ransomware Variants
Locky ransomware isn't new, but recent weeks an alert is urgent: one variant of this ransomware is coming under one of the largest malware campaigns in the second half of 2017: 23 million spam emails. According to Trend Micro, the ransomware is not likely to be on the scale of 'Wannacrypt' and 'Petya' that relied on Microsoft vulnerability in Windows XP. Only if you deal with the spam email in right way: delete it...
By IANS  View Source  
US Navy Collisions Stoke Cyber Threat for GPS Systems
This 4 US navy war ships got collision accidents in close areas. Each case seems having own cause but the Pentagon also doubts there are some connections among them, especially electronic guidance systems that the navy relies heavier and heavier in past decades are now an target of cyber attack. For example, some reports uncovered GPS is in short list of hackers' targets...
By Tribune News  View Source  
U.S. employee data breach tied to China Hackers
Even if your data and your family members' data are collected and kept by US government, they aren't safe as the government promised. A Chinese hacking group is suspected of stealing sensitive information about millions of current and former U.S. government employees. FBI arrested some of the group by noticed "Deep Panda's", a hacker tool also used in Hong Kong to monitor democracy force, may hacked sensitive information of about 22.1 million federal employees, including their families and friends...
By Joseph Menn  View Source  
Rehab Camp for Young Cyber-Attackers on Right Track
Cyber attack is crime, but never fun. The worse and worse cyber safety issue is largely due to some teenagers never think cyber attack is definitely a crime and risks to be put into jail, so that ruin life on crime entrance. Using a key to try other's door is a crime, so is to try other's email. However teenagers possibly don't completely agree with this. To decrease the cyber attacker's base, and divert young attackers away from a life of crime, NCA will run rehab camp to help them back to...
By BBC Technology  View Source  
Cyber Attack Sweeps Globe Seems WannaCry Linked
A new global computer virus attacked from Tuesday; many Russian and Ukrainian targets, like oil companies and banks, are attacked by a virus similar to the ransomware WannaCry. The virus copied codes from earlier ransomware campaigns known as "Petya" and "GoldenEye." Technically, it's not a new one; but it's more aggressive in spreading and attacking. The good news is update patch for WannaCry may protect some machines from the new virus...
By Jack Stubbs  View Source  
The World Is Not Ready For Cyber Attack
Cyber attack is a high frequent word in information industry as well as in social news. When people talk about it, it seems at least some of us knew the threat and can deal with whatever. The truth isn't so optimistic. The NSA is supposed to run as a info security agency, however, its by-products - cyber weapons or say back doors - are stolen ...
By NICOLE PERLROTH  View Source