Quantcast
Last updated on April 18, 2014 at 21:21 EDT

Latest Hacking Stories

2013-12-18 16:25:39

BETHESDA, Md., Dec. 18, 2013 /PRNewswire-USNewswire/ -- SANS today announced the upcoming SANS CyberCon Spring 2014 Online Training Event, February 10 - 15. This one-of-a-kind training event brings SANS' top instructors teaching SANS' top courses right to your computer. Key reasons students cite for taking SANS' CyberCon courses include: 1. Greater Flexibility Cyber Security professionals can take the training they need without neglecting family and work obligations. 2. Zero Travel...

2013-12-18 12:30:55

BETHESDA, Md., Dec. 18, 2013 /PRNewswire-USNewswire/ -- SANS today announced its tenth annual free holiday hacking challenge. This annual year-end tradition helps teach in-demand cyber security skills for defending computers and networks in a fun and entertaining fashion using classic holiday themes. This year's challenge focuses on defending critical infrastructure systems, including power grids, water systems, and transportation infrastructures, all based on themes from the classic...

2013-12-18 12:25:53

Could a Hollywood hack come true? Will there be a U.S. Healthcare.gov data breach? Should you expect CryptoLocker clones? SEATTLE, Dec. 18, 2013 /PRNewswire/ -- WatchGuard® Technologies, a leader in integrated security platforms, today revealed its annual security predictions for 2014. Assembled by WatchGuard's security research team, the list includes expected advances in ransomware, hacking of IoT (Internet of Things) devices, critical infrastructure exploits and a data breach of...

2013-12-13 13:26:28

University of Miami physicist and his collaborators discover a mathematical law that explains a wide variety of human confrontations Would you believe that a broad range of human struggles can be understood by using a mathematical formula? From child-parent struggles to cyber-attacks and civil unrest, they can all be explained with a simple mathematical expression called a "power-law." In a sort of unified theory of human conflict, scientists have found a way to mathematically describe...

2013-12-11 23:21:11

Firm helping San Antonio businesses analyze the security of their networks. San Antonio, TX (PRWEB) December 11, 2013 McCann Investigations, a firm in Texas that specializes in private investigations and digital security services, recently announced that it now provides its network security audits to clients in the San Antonio area. Network security audits are used by businesses to analyze the strength of their networks and bolster their defenses where they find vulnerabilities....

Security Firm Claims Chinese Hackers Are Spying On EU Ministries
2013-12-10 13:39:41

Peter Suciu for redOrbit.com - Your Universe Online On Monday, Reuters reported that Chinese hackers likely had eavesdropped on the computers of five European foreign ministries in advance of last September’s G20 summit, which was held in St. Petersburg, Russia. This is according to research that was conducted by California-based computer security firm FireEye Inc. The New York Times on Tuesday reported that the foreign ministries included those of the Czech Republic, Portugal,...

2013-12-09 16:29:19

Leading Global Thinkers Honored in December 2013 Issue of Foreign Policy Magazine for Ability to Translate World-Class Ideas into Action IRVINE, Calif., Dec. 9, 2013 /PRNewswire/ -- CrowdStrike, a global provider of security technologies and services focused on identifying advanced cyber threats and targeted attacks, today announced its Co-Founder and Chief Technology Officer, Dmitri Alperovitch, has been honored as one of Foreign Policy's Leading Global Thinkers for 2013. Foreign...

2013-12-07 23:02:38

Remote Access Trojans can give hackers external access to compromised systems and networks. Joe Caruso, founder and CEO/CTO of Global Digital Forensics, discusses what this type of malware does, the importance of regular vulnerability assessments and penetration testing, and the new Data Breach Response Toolkit from Global Digital Forensics, which gives IT security personnel the power to finally find and eliminate this type of dangerous and stealthy threat like never before. New York, NY...

2013-12-04 08:32:55

Industry Leader to Accelerate Global Sales and Guide Wurldtech's Channel Strategy VANCOUVER, British Columbia, Dec. 4, 2013 /PRNewswire/ -- Wurldtech Security Technologies, the leader in protecting mission-critical connected devices from cyber security threats, today announced the appointment of David Weier as Vice President of Sales, responsible for global sales and partnerships. Weier brings a broad range of sales experience to Wurldtech, as an accomplished sales executive with...

2013-12-03 12:20:33

HUNTSVILLE, Ala., Dec. 3, 2013 /PRNewswire/ -- Using their CENTS®, SLAM-R®, CYNTRS®, RGI®, and HOTSIM® tools, Camber Corporation provides real-time cyber training via scenarios that train and prepare responders to fight cyber-crimes and network attacks resulting in comprehensive network defense. Recently their capability was inserted into the Army Guard Enhanced Network Training Simulators (ARGENTS) operational system to deliver a real-time cyber exercise for a nation-wide...