Quantcast

Latest Hacker Stories

2014-04-22 23:09:31

Albert E. Whale of IT Security, Inc. discusses the advantages of being proactive with corporate Internet security. Waiting until a computer system has been compromised can ruin a company’s reputation as well as reveal private information including client credit records, private corporate and sensitive government data. Pittsburgh, PA (PRWEB) April 22, 2014 Computer security breaches are unseen. It can’t be touched, felt or tasted, but when it rears its ugly head it can destroy a...

2014-03-13 23:21:24

The experts have completed their 2014 reviews and have announced the best DIY security systems exclusively at SecuritySystemReviews.com. The reviews are designed to give consumers a comprehensive understanding of what DIY security systems have to offer and which companies to avoid when buying one. Cincinnati, OH (PRWEB) March 13, 2014 With the New Year, new threats and challenges face homeowners who want to protect their property. The first step in finding the right service provider for...

Mt. Gox Rumored To Have Pocketed Bitcoins Reported As Stolen
2014-03-10 14:03:20

Enid Burns for redOrbit.com - Your Universe Online Bitcoin exchange Mt. Gox continues to suffer damages, but the most recent accusations after the company claimed $400 million worth of the currency was lost last month may this time be self-inflicted. Hackers claim to have accessed the company's records and say Mt. Gox may have actually pocketed the cash and show other evidence of fraud. Mt. Gox described last month's activity as a massive hacker attack, blaming the hackers for the theft...

2014-03-06 12:31:15

NEW YORK, March 6, 2014 /PRNewswire/ -- A man was sentenced to probation after being convicted for Distributed Denial of Service (DDoS) attacks as a result of Group-IB and the The Ministry of the Interior (MVD) collaboration work. Group-IB assisted in the investigation, collection, preservation and identification of digital evidence. The criminal business owner turned out to be a 26-year-old resident of the Sayansk-city, Irkutsk region. The reason for the investigation was an attack...

WiFi Networks Could Be Used To Transmit Computer Viruses
2014-02-25 14:24:11

[ Watch the Video: Computer Viruses Go Airborne ] Lee Rannals for redOrbit.com - Your Universe Online University of Liverpool researchers have demonstrated how computer viruses could go airborne over WiFi networks. The team has shown for the first time how WiFi networks could be used to make a computer virus contagious through the air, moving through densely populated areas as effectively as the common cold. The researchers designed a virus known as “Chameleon” and simulated...

2014-02-20 23:29:23

Experts warn that serious cybercrime will continue to escalate in 2014 as hackers are becoming increasingly more skilled. Businesses need to protect their infrastructure and the National Center for Systems Security and Information Assurance (CSSIA) can help. Palos Hills, IL (PRWEB) February 20, 2014 Don’t be fooled… if it can happen to Target & Niemen Marcus, it could happen to any business. Experts warn that serious cybercrime will continue to escalate in 2014 as hackers are...

Hackers Steal Wealth Of User Data In Crowdfunding Website Attack
2014-02-17 11:13:00

Lee Rannals for redOrbit.com - Your Universe Online The crowd funding website Kickstarter said this weekend that hackers had broken into the company’s website. According to the crowdfunding site's blog, law enforcement officials alerted Kickstarter of the Web intrusion first, saying hackers gained unauthorized access to customer data. “Upon learning this, we immediately closed the security breach and began strengthening security measures throughout the Kickstarter system,” the...

2014-02-16 23:03:15

Houston digital security agency discovers perpetrators through network analysis Houston, TX (PRWEB) February 16, 2014 McCann Investigations, a Texas-based private investigations and digital security firm operating throughout the state, now assists clients in the Houston area that have been affected by networking hackings. Network forensics is a branch of computer forensics that involves the proper gathering of data related to computer network traffic. McCann's Houston investigators...

Hackers Flood, Crash Smartphones Using New Snapchat Security Flaw
2014-02-10 12:37:58

Brett Smith for redOrbit.com - Your Universe Online A security vulnerability in the popular Snapchat messaging app allows hackers to disable or slow smartphones by flooding a user with incoming messages, according to a new report from Spanish cyber-security researcher Jamie Sanchez. Snapchat is a messaging service that allows users to pass photo and video messages back and forth. These images or videos are typically set to disappear a few seconds after they are opened by their...

Twitter Hack Implicates GoDaddy and PayPal
2014-01-30 13:02:01

Peter Suciu for redOrbit.com – Your Universe Online To paraphrase Shakespeare, what’s in a Twitter handle? A tweet will still be 140 characters, but for N Methods CEO Naoki Hiroshima his tweets won’t come through his once coveted Twitter handle @N. According to online reports, he had been offered as much as $50,000 for it, but apparently “traded” the username to an unidentified hacker. Moreover, Hiroshima puts some of the blame on GoDaddy, which hosts both his domain name and...


Word of the Day
malpais
  • The ragged surface of a lava-flow.
'Malpais' translates from Spanish as 'bad land.'