Quantcast

Latest Hackers: Heroes of the Computer Revolution Stories

Ship Identification System Vulnarable To Cyberattack
2013-10-21 03:52:07

redOrbit Staff & Wire Reports - Your Universe Online A system used to track hundreds of thousands of shipping vessels across the globe is extremely vulnerable to hackers, researchers from the computer security company Trend Micro has cautioned. The problem lies with technology known as the Automatic Identification System (AIS), which is used by an estimated 400,000 ships worldwide, according to Tom Simonite of MIT Technology Review. Vessels that use the system transmit radio signals...

2013-10-18 23:03:26

Millions of customer data and credit card information decrypted in massive security breach, according to IT New York. New York, NY (PRWEB) October 18, 2013 As reported by the New York Times on October 3, 2013 (“Adobe Announces Security Breach”, http://www.nytimes.com/2013/10/04/technology/adobe-announces-security-breach.html?_r=0) Software giant Adobe announced that nearly 3 million of their user database stored with sensitive customer information was compromised as a result of a...

2013-09-23 23:32:25

Telx Computers, one of the industry leaders in Computer IT support in Miami, announces new solutions for businesses wanting to ensure that their electronic files have the best protection possible. Miami, FL (PRWEB) September 23, 2013 It seems as though every day there is yet another story that hits the headlines about hackers breaking into computer systems and accessing highly sensitive material. Not even government files or the most tightly guarded military files seem to be safe from the...

Countries Pay Hackers Big Money To Find Rival Flaws
2013-07-15 09:09:30

Michael Harper for redOrbit.com - Your Universe Online Countries around the world are hiring hackers to find weaknesses in the computer networks of their adversaries, according to the New York Times. The Times report adds to the looming concern of the dangers and very real possibility of widespread cyberwarfare. The hackers in question are looking for vulnerabilities in software like Microsoft's Windows, which could act as a gateway for warring cyber soldiers to gain access to larger...

Nintendo Fan Site Hacked
2013-07-08 09:55:18

Michael Harper for redOrbit.com - Your Universe Online The hackers are at it once again, this time targeting gamers and their online accounts. According to the Japan Times, a Nintendo fan site has been hit with an attack that has exposed the private information of nearly 24,000 users. The site had apparently been under attack for nearly a month as hackers attempted more than 15 million logins with false information. Of these millions of attempts, some 23,926 were successful, revealing the...

Cyber Security Top Priority For Obama Xi Meeting
2013-06-03 10:02:09

Peter Suciu for redOrbit.com — Your Universe Online When President Barack Obama meets with newly installed Chinese President Xi Jinping this Friday in South California in what is being described as a relatively informal retreat, the very serious issue of cyber hacking will be on the agenda. The meeting of the world´s two top economic powers is being described as a “shirt-sleeve” affair, and is aimed at allowing the two to meet outside the spotlight of Washington....

Attack On Google Netted Chinese Hackers With Counter Intelligence
2013-05-21 10:01:40

Michael Harper for redOrbit.com — Your Universe Online In 2010, Google became one of the first companies to openly admit they had been attacked by Chinese hackers. This admission sparked an ongoing battle between the Chinese government and the American-owned search giant. At the time, Google said they had been hit with a sophisticated attack which resulted in some stolen intellectual property. On the heels of news about a reenacted Chinese hacking group yesterday, the Washington...

Chinese Hackers At It Again
2013-05-20 13:28:31

Michael Harper for redOrbit.com — Your Universe Online Earlier this year, security firm Mandiant released a report which found a rash of cyber attacks against companies from the US and other English-speaking countries. These attacks were all believed to be launched from China, specifically a branch of the People´s Liberation Army (PLA) called Unit 61398, located in one 12-story building on the edge of Shanghai. In the weeks following this report´s release, cyber activity...


Word of the Day
glogg
  • Scandinavian punch made of claret and aquavit with spices and raisins and orange peel and sugar.
This word comes from the Swedish 'glogg,' which is an alteration of 'glodgat,' mulled (wine).
Related