Quantcast

Latest Hacking Stories

fcc chief urges more cyber control for companies
2014-06-13 04:53:17

Peter Suciu for redOrbit.com - Your Universe Online On Thursday, Federal Communications Commission (FCC) Chairman Tom Wheeler called upon communications companies to take a lead in bolstering their networks from cyber-attacks and other online threats. In what has been billed as his first major speech devoted fully to the topic of cybersecurity, the FCC chairman urged the private sector to "step up" and assume new responsibility as well as market accountability when it comes to managing...

russian hackers arrested
2014-06-12 10:06:46

Peter Suciu for redOrbit.com - Your Universe Online This week, Russian authorities announced the arrest of two alleged hackers, both residents of Moscow, who were believed to have been behind a recent Apple extortion scheme. The pair allegedly locked users' iCloud access and then demanded payment from the rightful owners to free them up them. An official statement on the Russian Ministry of Internal Affairs website said the duo carried out the "ransomware: attack by creating a...

2014-06-11 23:13:01

IT Security Professional and popular Dr. Chaos blogger, Aamir Lakhani, will shed light on the implications of phishing attacks at EC-Council Foundation’s Hacker Halted IT Security event, October 16-17, 2014. Atlanta, GA (PRWEB) June 11, 2014 Aamir Lakhani is just one of a bevy of notable and industry-leading speakers set to present at Hacker Halted, EC-Council Foundation’s cyber security and hacking conference. Lakhani is a leading security architect and runs the popular security...

2014-06-11 23:10:32

Healthcare breaches are inevitable and the HIPAA Omnibus Rule will impose heftier fines due to its new regulations. Therefore, the Cyber Protector Plan is providing tips for those in the healthcare industry. Tampa, FL (PRWEB) June 11, 2014 Those in the healthcare industry are at great risk for data breaches, according to the 2014 Experian Data Breach Industry Forecast. Those working in the healthcare industry must be careful to adhere to the new privacy and data breach regulations in the...

2014-06-10 23:04:41

Cyber Security Market report provides insights on key market players, future scope, drivers, restraints and challenges of the market. http://www.micromarketmonitor.com/market-report/cyber-security-reports-7651948375.html. (PRWEB) June 10, 2014 The new era of the Internet has witnessed a boom in the usage of e-commerce and other online banking-related applications. This has led to a surge in thefts, online frauds and risks related to online banking. All enterprises are excessively...

Unit Within Chinese People's Liberation Army Linked To Online Spying
2014-06-10 10:50:26

Peter Suciu for redOrbit.com - Your Universe Online Unit 61398, the not-so-secret cyber warfare branch of the Chinese People's Liberation Army (PLA), might not be working entirely alone. On Monday CrowdStrike identified another group that has been dubbed Putter Panda, a cyber-espionage team that conducts operations from Shanghai and reportedly works on behalf of the PLA's 3rd Department 12th Bureau Unit 61486. CrowdStrike, a US security firm, released a detailed report that casts...

2014-06-06 12:26:14

BANGALORE, India, June 6, 2014 /PRNewswire/ -- SecPod Technologies, a leading information security company, has announced Saner Business, a vulnerability management solution for enterprise computers. In today's complicated cyber world, new approaches are required to ensure computers are secure and remain secure. It is no longer sufficient to simply try to detect and stop cyber attacks. Manageable and cost effective solutions must be deployed to proactively ensure...

2014-06-05 08:25:32

AUSTIN, Texas, June 5, 2014 /PRNewswire/ -- Today, the Daily Dot, in collaboration with Vice's Motherboard, published the first in a series of groundbreaking investigative features based on exclusive documents obtained from the prosecution of Jeremy Hammond, revealing the involvement of an FBI informant in the hacking of Strategic Forecasting, Inc., better known as Stratfor. The documents--thousands of unreleased chat logs, surveillance photos, and government documents--trace in...

2014-06-03 12:34:05

iThreat Cyber Group & InsideCounsel Magazine Gauge Corporate Ability to Thwart Adversarial Attacks PRINCETON, N.J., June 3, 2014 /PRNewswire/ -- Two out of three legal counsels representing a cross section of Fortune 1,000 companies acknowledge they are not "very well prepared" to prevent a significant, material attack on their product, brand or intellectual property, according to a new survey by InsideCounsel Magazine commissioned by iThreat Cyber Group. "These results are telling," stated...

2014-06-02 08:35:53

Report Details How Traditional Exploit Techniques Used In Innovative Ways Can Mask Dangerous Threat Activity SANTA CLARA, Calif., June 2, 2014 /PRNewswire/ -- Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today revealed new research on how attackers exploit commonly-used business applications to bypass security controls -- and provides helpful insight into how business leaders and security practitioners need to reassess and strengthen their security posture. To view...


Word of the Day
monteith
  • A large punch-bowl of the eighteenth century, usually of silver and with a movable rim, and decorated with flutings and a scalloped edge. It was also used for cooling and carrying wine-glasses.
  • A kind of cotton handkerchief having white spots on a colored ground, the spots being produced by a chemical which discharges the color.
This word is possibly named after Monteith (Monteigh), 'an eccentric 17th-century Scotsman who wore a cloak scalloped at the hem.'
Related