Quantcast
Last updated on April 24, 2014 at 11:56 EDT

Latest Cyberwarfare Stories

Russian Teen 17 Hacked Target Systems
2014-01-20 14:25:56

Enid Burns for redOrbit.com - Your Universe Online BlackPOS/Kaptoxa is the name of the malware that infected Target and collected information on 110 million of the retailer's customer' credit cards over the 2013 holiday shopping season. New research reveals that a teen in Russia, who was not yet 17 years old at the time, authored the malware that was able to hack into Target's systems, as well as those of Neiman Marcus and other retailers. On Friday internet security firm IntelCrawler...

2014-01-20 12:25:51

ARLINGTON, Va., Jan. 20, 2014 /PRNewswire/ -- Waylon Krush, CEO of Lunarline, Inc. - one of the nation's leading cyber security firms - appeared before the U.S. House of Representatives' Committee on Science, Space and Technology last week to offer his expert testimony on the security of Healthcare.gov. (Logo: http://photos.prnewswire.com/prnh/20110622/PH24580LOGO) Mr. Krush provided the committee with his analysis of Healthcare.gov's security posture -- stressing that the security...

20 Million Koreans Hit Credit Card Hack
2014-01-20 12:25:22

Peter Suciu for redOrbit.com – Your Universe Online While more than 70 million Americans may have been affected by the recent data breach that rocked Target stores over the holiday season, on Monday it was reported that nearly half of all South Koreans may have had their credit card details compromised in an unrelated cyber theft. This week it was reported that the data was stolen by a computer contractor working for the Korea Credit Bureau (KCB), which produces credit scores for...

2014-01-16 23:29:40

This Master of Professional Studies in Information Sciences program, offered by Penn State’s College of Information Sciences and Technology and delivered online by Penn State World Campus, will prepare adults for careers combating cyber-attacks in government and the private sector. University Park, PA (PRWEB) January 16, 2014 In today’s interconnected society, information systems are vulnerable to a myriad of threats such as unwanted intrusions, illicit insider corruption or...

2014-01-15 23:20:53

Electronic Warfare Market report talks about the leading competitors in the global electronic warfare market and apart from a general overview of the companies. http://www.marketsandmarkets.com/Market-Reports/electronic-warfare-market-1301.html. (PRWEB) January 15, 2014 According to a new market research report, “Electronic Warfare Market Forecast Analysis (2014– 2020) (Electronic Support, Electronic Attack and Electronic Protection)”, the total global electronic warfare market is...

2014-01-15 23:04:02

Trammell Ventures, a business incubator and think tank specializing in information security, announced today the purchase of the remaining interest of ExploitHub from NSS Labs, Inc. Austin, TX (PRWEB) January 15, 2014 Trammell Ventures, a business incubator and think tank specializing in information security, announced today the purchase of the remaining interest of ExploitHub from NSS Labs, Inc. ExploitHub was previously a joint venture between Trammell Ventures and NSS Labs. ExploitHub...

2014-01-15 12:27:30

Built on an open threat-sharing platform, Confer protects servers, laptops and mobile devices from sophisticated cyberattacks WALTHAM, Mass., Jan. 15, 2014 /PRNewswire/ -- Confer, the first company to offer endpoint security via an open, threat-based, collaborative platform, today announced the company and its service offering. Confer has developed the world's first cyberthreat prevention network that secures servers, laptops and mobile devices from cyberattacks. Built on a...

New UMich Formula Predicts Perfect Moment For Hackers To Strike
2014-01-15 09:50:01

[ Watch the Video: New Model For Predicting Cyberattacks ] Brett Smith for redOrbit.com - Your Universe Online The timing of a cyber-attack is crucial to overcoming measures designed to defend or repel the attacks and a new study from researchers at the University of Michigan has revealed a mathematical model that could be used to optimize the timing of would-be hackers. In the study, which was published in the Proceedings of the National Academy of Sciences (PNAS), the research team...

2014-01-14 23:30:26

Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services, today reported that mobile applications are being used in DDoS attacks against enterprise customers. Fort Lauderdale, Florida USA (PRWEB) January 14, 2014 Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services, today reported that mobile applications are being used in DDoS attacks against enterprise customers. This is one of many key findings...

2014-01-14 23:26:31

Employers around the Country Can Protect Themselves from Lawsuits and Greatly Enhance User Experience through the Services and Solutions Offered by DocVerify Irvine, Ca (PRWEB) January 14, 2014 DocVerify presents the new ReadyForm Electronic Signature forms to help Human Resources speed up the on boarding process and to reduce liability. The incredible user experience offered is fast and highly secure, ensuring that HR personnel would never again lose another important document. DocVerify...