Quantcast

Latest Hacking Stories

2014-06-11 23:13:01

IT Security Professional and popular Dr. Chaos blogger, Aamir Lakhani, will shed light on the implications of phishing attacks at EC-Council Foundation’s Hacker Halted IT Security event, October 16-17, 2014. Atlanta, GA (PRWEB) June 11, 2014 Aamir Lakhani is just one of a bevy of notable and industry-leading speakers set to present at Hacker Halted, EC-Council Foundation’s cyber security and hacking conference. Lakhani is a leading security architect and runs the popular security...

2014-06-11 23:10:32

Healthcare breaches are inevitable and the HIPAA Omnibus Rule will impose heftier fines due to its new regulations. Therefore, the Cyber Protector Plan is providing tips for those in the healthcare industry. Tampa, FL (PRWEB) June 11, 2014 Those in the healthcare industry are at great risk for data breaches, according to the 2014 Experian Data Breach Industry Forecast. Those working in the healthcare industry must be careful to adhere to the new privacy and data breach regulations in the...

2014-06-10 23:04:41

Cyber Security Market report provides insights on key market players, future scope, drivers, restraints and challenges of the market. http://www.micromarketmonitor.com/market-report/cyber-security-reports-7651948375.html. (PRWEB) June 10, 2014 The new era of the Internet has witnessed a boom in the usage of e-commerce and other online banking-related applications. This has led to a surge in thefts, online frauds and risks related to online banking. All enterprises are excessively...

Unit Within Chinese People's Liberation Army Linked To Online Spying
2014-06-10 10:50:26

Peter Suciu for redOrbit.com - Your Universe Online Unit 61398, the not-so-secret cyber warfare branch of the Chinese People's Liberation Army (PLA), might not be working entirely alone. On Monday CrowdStrike identified another group that has been dubbed Putter Panda, a cyber-espionage team that conducts operations from Shanghai and reportedly works on behalf of the PLA's 3rd Department 12th Bureau Unit 61486. CrowdStrike, a US security firm, released a detailed report that casts...

2014-06-06 12:26:14

BANGALORE, India, June 6, 2014 /PRNewswire/ -- SecPod Technologies, a leading information security company, has announced Saner Business, a vulnerability management solution for enterprise computers. In today's complicated cyber world, new approaches are required to ensure computers are secure and remain secure. It is no longer sufficient to simply try to detect and stop cyber attacks. Manageable and cost effective solutions must be deployed to proactively ensure...

2014-06-05 08:25:32

AUSTIN, Texas, June 5, 2014 /PRNewswire/ -- Today, the Daily Dot, in collaboration with Vice's Motherboard, published the first in a series of groundbreaking investigative features based on exclusive documents obtained from the prosecution of Jeremy Hammond, revealing the involvement of an FBI informant in the hacking of Strategic Forecasting, Inc., better known as Stratfor. The documents--thousands of unreleased chat logs, surveillance photos, and government documents--trace in...

2014-06-03 12:34:05

iThreat Cyber Group & InsideCounsel Magazine Gauge Corporate Ability to Thwart Adversarial Attacks PRINCETON, N.J., June 3, 2014 /PRNewswire/ -- Two out of three legal counsels representing a cross section of Fortune 1,000 companies acknowledge they are not "very well prepared" to prevent a significant, material attack on their product, brand or intellectual property, according to a new survey by InsideCounsel Magazine commissioned by iThreat Cyber Group. "These results are telling," stated...

2014-06-02 08:35:53

Report Details How Traditional Exploit Techniques Used In Innovative Ways Can Mask Dangerous Threat Activity SANTA CLARA, Calif., June 2, 2014 /PRNewswire/ -- Palo Alto Networks® (NYSE: PANW), the leader in enterprise security, today revealed new research on how attackers exploit commonly-used business applications to bypass security controls -- and provides helpful insight into how business leaders and security practitioners need to reassess and strengthen their security posture. To view...

2014-05-31 23:05:44

As the Iranian cyber espionage attack called Newscaster is exposed, the power of social engineering again steps into the spotlight. Joe Caruso, founder and CEO/CTO of Global Digital Forensics, discusses the lessons US businesses should take from this type of attack, and the necessity to raise social engineering awareness at every level within an organization to improve cyber security posture. New York, NY (PRWEB) May 31, 2014 With over a billion active users monthly from all around the...

2014-05-29 23:11:51

Socrata will participate at nearly 50 events nationally to support a weekend of innovation, fueled by public data. Seattle, Washington (PRWEB) May 29, 2014 Socrata, a Seattle-based cloud software company focused exclusively on democratizing access to government data, today announced its second year as a major sponsor of the National Day of Civic Hacking (NDoCH). This year’s event will take place May 31 - June 1, 2014. Focused on supporting data access and innovation, Socrata will offer...


Word of the Day
tessitura
  • The prevailing range of a vocal or instrumental part, within which most of the tones lie.
This word is Italian in origin and comes from the Latin 'textura,' web, structure.