The Twitter account for Fox News was apparently hacked, with six tweets falsely reporting early Monday morning that U.S. President Barack Obama had been shot twice in an Iowa restaurant while campaigning.
Jeremy Kirk |
04 Jul |
Read more
The UK’s Information Commissioner has ordered the National Health Service to tighten its grip on security, fearing that data protection is a “systemic problem” for its organisations.
Five health NHS organisations have signed recent data security undertakings in response to potential privacy breaches this year caused by staff losing patient records, faxing medical reports to the wrong number, and losing laptops.
Liam Tung |
04 Jul |
Read more
The Anonymous hacking group has taken another swipe at police in Arizona, launching online attacks against several police union websites and publishing e-mail messages stolen from law enforcement officers.
Robert McMillan |
02 Jul |
Read more
While IT shops and vendors struggle to apply security practices to virtualized systems, a startup called virtualization to secure all types of devices.
Jon Brodkin |
01 Jul |
Read more
Arizona State Police recently fell victim to a <a href="http://www.pcworld.com/businesscenter/article/231067/lulzsec_said_it_leaked_arizona_police_documents.html">second embarrassing data dump</a> that included information stolen from the personal e-mail accounts of 12 Arizona police officers. The stolen data, according to the hackers, includes names, addresses, phone numbers, passwords, Social Security numbers, online dating account info, voicemails, chat logs, internal police reports, and racist chain e-mails. Hackers also say they nabbed the personal data of Stephen Harrison, a spokesman for the Arizona Department of Public Safety.
Ian Paul |
01 Jul |
Read more
Like CIOs at many organizations, Kenneth Corriveau saw the writing on the wall. The employees in his company wanted to use their own devices for work and were going to keep asking, regardless of what policy might state about using personal technology to <a href="http://www.csoonline.com/article/675735/it-departments-flying-blind-when-it-comes-to-mobile-security">connect to corporate networks</a>.
Joan Goodchild |
01 Jul |
Read more
A popular Twitter-like service in China with <a href="http://www.pcworld.com/businesscenter/article/227714/chinaand8217s_sina_benefits_from_surge_in_microblogging.html">140 million users</a> was hit by a worm earlier this week that resembles past attacks that infected Twitter and MySpace, according to a security analyst.
Michael Kan |
30 Jun |
Read more
The government's roll out of a smart grid energy network needs a more thorough and "coherent" look at security, according to an official report.
Antony Savvas |
30 Jun |
Read more
A group of British hackers today took down Al-Qaeda's communication network and websites, preventing the terrorist organization from posting online messages and videos.
Armando Rodriguez |
30 Jun |
Read more
Time may be running out for the members of LulzSec as police continue to step up their inquiries into the hacking group.
Robert McMillan |
30 Jun |
Read more
Since 1997 identity theft and fraud has affected more than 5.4 million people in the United States. And that number is on the rise with, more than 1.3 million complaints to the <a href="http://www.ftc.gov/sentinel/">Consumer Sentinel Network</a> (CSN) between January and December of 2009 alone. <a href="http://www.ftc.gov/sentinel/reports/sentinel-annual-reports/sentinel-cy2009.pdf">According to the Federal Trade Commission</a> (PDF), of the 721,418 fraud-related complaints to the CSN in 2009, this has cost customers [of various products and services] more than 1.7 billion dollars at a median payout of $399. But what can companies do to prevent fraud and identity theft?
James Mulroy |
30 Jun |
Read more
Linda Goodspeed, vice president of IT at Nissan North America, was attending a global IT meeting at her company's head office in Japan on March 11 and was caught in the magnitude 9.0 earthquake. The quake was among the top seven most powerful ever recorded and the strongest ever to hit the country. "People were diving under desks. Women were crying. We could see fire outside," she says. "Window blinds were moving three feet to the left and to the right. I thought the building would fall apart."
Kim S. Nash |
30 Jun |
Read more
Democratic members of a Senate committee promised Wednesday to push hard for new online privacy protections and for legislation that would require companies to put security monitoring tools on their networks.
Grant Gross |
30 Jun |
Read more
<a href="http://www.pcworld.com/article/231213/anonymous_picks_up_slack_as_lulzsec_calls_it_quits.html">Lulz Security</a> may be officially disbanded after 50 days of online hijinks including raids against the servers of <a href="http://www.pcworld.com/article/231201/lulzsec_says_goodbye_with_new_data_dump.html">NATO</a>, the <a href="http://www.pcworld.com/businesscenter/article/230235/lulzsec_sets_sights_on_us_senate_and_gamemaker_bethesda.html">U.S. Senate</a>, <a href="http://www.pcworld.com/article/228983/hackers_deface_pbs_site_promise_more_lulz.html">PBS</a> and <a href="http://www.pcworld.com/article/231215/lulzsec_a_short_history_of_hacking.html">many others</a>. But law enforcement officials are still actively searching for the rogue hackers. So far, however, it appears the law is coming up empty. FBI agents recently descended on the home of Iowa resident Laurelai Bailey hoping to find out more information about the February hack into security firm <a href="http://www.pcworld.com/businesscenter/article/220209/lessons_learned_thanks_to_hbgary_and_anonymous.html">HBGary Federal</a>, according to <a href="http://gawker.com/5816291">Gawker</a>.
Ian Paul |
30 Jun |
Read more
Over the weekend, Lulz Security (aka LulzSec) unfurled their sails and plotted a course for...well, who knows? They issued a manifesto declaring "50 days ago, we set sail with our humble ship on an uneasy and brutal ocean: the Internet," and said that this had been the plan for their "crew of six" all along.
Stefan Hammond |
29 Jun |
Read more
Email addresses and names of subscribers to DefenseNews, a highly-regarded website that covers national and international military and defense news, were accessed by hackers and presumed stolen, Gannett announced yesterday.
Gregg Keizer |
29 Jun |
Read more
The federal agency that regulates banks today issued new rules for online <a href="http://www.networkworld.com/topics/security.html">security</a> for financial institutions, instructing them to use minimal types of "layered security" and fraud monitoring to better protect against <a href="http://www.networkworld.com/columnists/2011/062311-andreas.html">cybercrime</a>.
Ellen Messmer |
29 Jun |
Read more
Tumblr is dealing with an aggressive phishing campaign. Only recently launched, it aims to steal log-in credentials and employs many of the well-known <a href="http://www.csoonline.com/article/480589/9-dirty-tricks-social-engineers-favorite-pick-up-lines">social engineering tactics</a> that scammers use on social media sites such as <a href="http://www.csoonline.com/article/497076/5-facebook-twitter-scams-to-avoid">Facebook and Twitter</a>.
Joan Goodchild |
29 Jun |
Read more
Sony hacker George Hotz a.k.a Geohot is reportedly <a href="http://www.pcworld.com/article/231202/sony_hacker_said_to_land_facebook_job.html">working at Facebook</a> after spending several years agitating technology giants. The news follows Hotz's antics this year when Sony sued him for distributing digital keys and a set of tools that would let you run <a href="http://www.pcworld.com/businesscenter/article/216541/sony_asks_for_restraining_order_over_ps3_hack.html">illegally copied games</a> on the PlayStation 3. Before his Sony showdown, Hotz was also one of the first people to jailbreak Apple's iPhone with a hardware unlock, although software tools that could do the same job soon replaced this method.
Ian Paul |
29 Jun |
Read more
With the surge in <a href="http://blogs.csoonline.com/hacktivism">hacktivism</a> and nation-state espionage in recent years, not to mention the continuing high levels of cybercrime, companies need better tools to evaluate the quality of any developer's code.
Robert Lemos |
29 Jun |
Read more