This is a guest post by Phoenix TS.Consumers share a significant amount of personal information on various social networking sites and as a result are putting themselves at greater risk for identity fraud. So how can you protect yourself? Follow these …
GoDaddy had problems yesterday – but we don’t yet know what they were
“#tangodown http://www.godaddy.com/ by @AnonymousOwn3r” tweeted the hacker known as Anonymous Own3r yesterday. And sure enough, the company that describes itself as a “Worldwide hosting provider and the Web’s largest domain registrar” was having probl…
Al-Jazeera SMS platform hacked by Syrian hacktivists
The war of disinformation surrounding the Syrian unrest and other political hot potatoes is continuing, with the Al-Jazeera news service falling victim in the latest attack.
Active authentication seeks to augment passwords
Passwords and access tokens, we are frequently told, are not enough. They can be broken, stolen or bypassed. DARPA is seeking a new approach – rather than authentication solely on access, it is looking for ways to maintain continuous biometric user aut…
‘Botnet Bandit’ gets 2+ years in prison
The Botnet Bandit, as he’s known, has been brought to justice after infecting thousands of computers and using them for profit. Joshua Schichtel has been sentenced in federal court in the District of Columbia to 30 months in prison and three years of s…
Hackers hold Mitt Romney’s tax returns for ransom
An unidentified hacking group claims to have hacked PricewaterhouseCoopers’s Franklin, Tenn., office to obtain access to Mitt Romney’s tax returns. It’s now attempting to hold the information for ransom, asking for $1 million, deliverable via Bitcoin, …
Cloud, mobile security top of mind for the Feds
The cloud is still just a nascent service environment for the US federal government, for which meeting security compliance requirements is the top concern. Meanwhile, mobile security is the most dynamic area for the government.
The creators of BEAST now present CRIME
From the producers of BEAST, Juliano Rizzo and Thai Duong, comes a brand-new production: CRIME. CRIME will get its first showing at the Ekoparty security conference in Buenos Aires later this month.
The Elderwood project – it started with Aurora, but continues today
The Elderwood project is the name given by Symantec to attacks emanating from the same group implicated in the Aurora hack and Hydraq trojan used against Google two years ago. This group has never ceased being active.
Good Technology targets BYOD security with Copiun acquisition
Enterprise mobility software vendor Good Technology is looking to bolster security for the bring-your-own-device (BYOD) trend with the acquisition of mobile security firm Copiun.