Molerats is the term used for a hacking campaign orchestrated by the Gaza Hackers Team. Until now it had seemed that this group concentrated on using the XtremeRAT trojan. New research now suggests that that the group has also started using the Poison …
NSA Revealed Spying on the UN and EU Embassies
The latest revelations from Edward Snowden published by Der Spiegel and Laura Poitras, the American film maker based in Berlin and visited by David Miranda before his detention at Heathrow, shows extensive and sophisticated NSA surveillance of both the…
Twitter Scanning DMs to Help Profile its Users
A European privacy activist is warning that Twitter monitors users’ Direct Message private tweets, even to the extent of visiting URLs contained and copying the content of the web pages concerned – most likely for behavioral profiling.
Lady Gaga Sees Applause for Single, Despite ‘Hacker’ Leak
Lady Gaga is…displeased. She’s blaming “hackers” for the leak of her new single, “Applause,” ahead of its scheduled release date on August 19.
China Hit with Biggest DDoS Attack in its History
China faced the largest distributed denial-of-service (DDoS) attack in its history over the weekend, leading to a two-to-four hour shutdown of swaths of IP addresses using .cn, China’s country code top-level domain.
The Insecure Pacemaker: FDA Issues Guidance for Wireless Medical Device Security
The concept of a hacker causing a heart attack by remotely compromising a pacemaker or shutting down an insulin pump on a diabetic is unfortunately not in the realm of science fiction, with very real vulnerabilities having been found in connected medic…
DDoS Weapon Found Hidden in Orbit Downloader
Anti-virus companies don’t just block malware – they also give their customers the option to block ‘potentially unwanted apps’ or PUAs. These aren’t strictly malware, but can violate a user’s privacy. Adware can potentially be a PUA.
German Federal Government Warns on the Security Dangers of Windows 8
The problem revolves around the upcoming Trusted Platform Module v 2.0 developed by the US-dominated Trusted Computing Group, which cannot be deactivated by the user. The concern is that this provides a back door for Microsoft, and by extension, for th…
Latest Spy Law May Force Mega to Leave New Zealand
Kim Dotcom warned earlier this month that if a new bill – the Telecommunications (Interception Capability and Security) bill known as TICS – were to become law, he would move Mega’s privacy services out of New Zealand. TICS was passed yesterday in the …
The Counter-productive Effect of the Cost of Cybercrime
The cost of cybercrime is frequently used to justify the cost of security products and the implementation of new – and invariably more stringent – cyber laws. But what if those figures are wrong? Could it mean that industry, and government, gets its en…