Quantcast

Latest Hacking Stories

2014-08-23 23:02:12

The diplomatic tension with China over cyber attacks may have just gotten another infusion of fire to deal with after it was reported earlier this week that one of the biggest hospital groups in the US was the victim of a data breach which yielded 4.5 million records containing Personally Identifiable Information. The founder of Global Digital Forensics discusses why healthcare organizations are prime targets for hackers, and why regularly testing for vulnerabilities and advanced malware...

2014-08-16 23:02:41

The scales of time and money can seem hard to balance for many businesses when it comes to emergency cyber response plans, but the recent results from a survey conducted by the SANS Institute showing that only 9% of the businesses surveyed rate their cyber response plans as “very effective” is a real problem which could have far reaching consequences for those trusting luck to keep their sensitive ESI (Electronically Stored Information) and other digital assets safe. With time and...

2014-08-16 23:01:13

ReportsnReports.com adds "Security Testing Market by Network Security Testing, Application Security Testing, SAST, DAST, Security Testing Tools, Penetration Testing Tools, Automated Testing Tools, Code Review Tools - Global Advancements, Forecasts & Analysis (2014 - 2019)" global research report to its store. Dallas, TX (PRWEB) August 16, 2014 According to this global security testing market report, North America is the largest market for security testing services....

2014-08-14 08:34:04

Thycotic Black Hat 2014 Hacker Survey also finds 88% of hackers fear theft from other hackers WASHINGTON, Aug. 14, 2014 /PRNewswire/ -- Thycotic, a provider of smart and effective privileged account management solutions for global organizations, today announced the results of a survey of 127 self-identified hackers at Black Hat USA 2014. The survey, which was conducted live between August 6(th) and 7(th) at the conference venue in Las Vegas, found that an overwhelming majority (86%) of...

2014-08-12 08:37:36

Heartbleed, Windows XP and Adobe Flash expose systemic shortcomings OTTAWA, Aug. 12, 2014 /CNW/ - Cyber threats, data breaches and high-risk vulnerabilities have continued to dominate the first half of 2014 as seen in Trend Micro Incorporated's (TYO: 4704; TSE: 4704) second quarter security roundup report, "Turning the Tables on Cybercrime: Responding to Evolving Cybercrime Tactics." The severity of these attacks intensified against financial and banking institutions as well as retail...

2014-08-10 23:00:40

The Latin America Cyber Security report defines and segments the cyber security solutions and services market in Latin America with analysis and forecast of revenue. http://www.micromarketmonitor.com/market/latin-america-cyber-security-2019134744.html (PRWEB) August 10, 2014 The Latin America Cyber Security report defines and segments the cyber security solutions and services market in Latin America with analysis and forecast of revenue. This market is estimated to grow from around $5.29...

2014-08-08 23:02:11

The Cyber Security Solutions and Services report defines and segments the market in North America with analysis and forecast of revenue. http://www.micromarketmonitor.com/market/north-america-cyber-security-6364811086.html (PRWEB) August 08, 2014 The Cyber Security Solutions and Services report defines and segments the market in North America with analysis and forecast of revenue. The cyber security solutions and services market in North America is estimated to grow from $41.19...

hacking a plane
2014-08-06 06:33:24

redOrbit Staff & Wire Reports - Your Universe Online The satellite communications equipment of passenger jets can be hacked through their wireless internet and inflight entertainment systems, claims one prominent cybersecurity researcher who has promised to reveal the details of his work Thursday at the annual Black Hat hacking conference in Las Vegas, Nevada. According to Reuters reporter Jim Finkle, IOActive consultant Ruben Santamarta plans to discuss vulnerabilities he has...

2014-08-04 23:06:06

On August 5, The Peggy Smedley Show will welcome newly appointed Deputy Commander of U.S. Cyber Command at Fort Meade, Maryland, Lieutenant General James McLaughlin, and other cyber security experts, including Ed Scheidt, former chairman of the CIA Cryptographic Center. Carol Stream, IL (PRWEB) August 04, 2014 Protecting and securing the nation’s infrastructure from cybercrime is what the newly appointed Deputy Commander of U.S. Cyber Command at Fort Meade, Maryland, Lieutenant General...

2014-08-02 23:01:50

Black Hat has become the go-to convention where black hats and white hats collide, with hackers showing off their ingenuity and prowess by openly defeating popular security measures, and security professionals demonstrating all of their latest tools and methods in their never-ending battle to keep up. The founder of Global Digital Forensics discusses how covering cybersecurity basics and getting the right emergency incident response plans in place can keep organizations on point for...


Word of the Day
caparison
  • A cloth or covering, more or less ornamented, laid over the saddle or furniture of a horse, especially of a sumpter-horse or horse of state.
  • Clothing, especially sumptuous clothing; equipment; outfit.
  • To cover with a caparison, as a horse.
  • To dress sumptuously; adorn with rich dress.
This word ultimately comes from the Medieval Latin 'cappa,' cloak.
Related