Blog

UK gears up for cyberwarfare offensives

Britain’s government will follow in the footsteps of the US and create a military unit

dedicated to launching counter-attacks against hackers..

The UK government is planning to recruit hundreds of computer specialists to defend core infrastructure against cyberthreats, Conservative Defence Secretary Philip Hammond said Sunday.

Speaking at the annual Conservative party conference, Hammond said the United Kingdom was dedicating additional resources and funds to building a strong cyber intelligence and surveillance network, according to ...

Continue Reading →
0

Britain’s GCHQ Hacked Belgian Telecoms Firm

REUTERS

A cyber attack on Belgacom raised considerable attention last week. Documents leaked by Edward Snowden and seen by SPIEGEL indicate that Britain’s GCHQ intelligence agency was responsible for the attack.

Photo Gallery: 'Operation Socialist' Cyber Attack on Belgacom
Documents from the archive of whistleblower Edward Snowden indicate that Britain’s GCHQ intelligence service was ...
Continue Reading →
0

HHS defends security of ObamaCare ‘data hub’

When people apply for insurance through their states’ exchanges, the exchanges will communicate with the federal data hub to verify their identity and citizenship status.

The data hub will also identify whether people are eligible for tax credits to help cover the cost of their premiums, which requires it to verify income as well as whether applicants have access to health insurance through their employers.

Republicans have raised questions about the risks of processing so much information in one place, but CMS ...

Continue Reading →
0

N.S.A. Able to Foil Basic Safeguards of Privacy on Web

 The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, ...

Continue Reading →
0

China Hit by ‘Largest Ever’ Hack Attack

Service Restored to .cn Domain After Large DDoS Attack

by Michael Mimos  August 26, 2013 , 1:37 pm

Long fingered as the source of denial-of-service attacks and other hacks against foreign interests, China’s .cn domain was targeted on Sunday and approximately one-third of the sites registered to that domain were kept offline for a period of time. A statement ...

Continue Reading →
0

Microsoft Warns About Dangers of Not Migrating From XP

 

Microsoft yesterday warned Windows XP customers that they face never-patched, never-dead “zero-day” vulnerabilities if they don’t dump the 12-year-old operating system before its April 2014 retirement deadline.

Call them the “walking dead” of vulnerabilities. Call it XP Z – “Z” for zombies.

The warning – just the latest in a two-year campaign to denigrate XP and convince users to leave it behind – was similar to one given earlier this week by a long-time SANS security trainer, who predicted that hackers would save ...

Continue Reading →
0

Washington Post, CNN and Time websites hit by pro-Assad hackers

Websites belonging to the Washington Post, CNN, and Time magazine have been attacked by supporters of Syrian President Bashar al-Assad.

glowing-keyboard-hacker-security

Some links on the sites redirected readers to the website of the Syrian Electronic Army (SEA).

The breach was the result of a security failure at a firm which provides a link recommendation service that all three sites used.

Outbrain said its staff had fallen victim to a spoof email.

The SEA ...

Continue Reading →
2

Chinese Hacking Team Caught Taking Over Decoy Water Plant

A hacking group accused of being operated by the Chinese army

now seems to be going after industrial control systems.

A Chinese hacking group accused this February of being tied to the Chinese army was caught last December infiltrating a decoy water control system for a U.S. municipality, a researcher revealed on Wednesday.

The group, known as APT1, was caught by a research project that provides the most significant proof yet that people are actively trying to exploit ...

Continue Reading →
0

IPv6 is latest tool for stealing credit card numbers and passwords

 

Security threats - password theft

 

A gap in the adoption of the IPv6 protocol could be leaving users prone to attack, researchers have warned.

Security firm Neohapsis is warning that the protocol, which has been undergoing a rollout over the last several years, could be subject to a unique attack that redirects users to unwanted potentially malicious pages.

Dubbed an SLAAC attack, the operation takes advantage of the client-side rollout ...

Continue Reading →
0

MI5 and GCHQ urge FTSE 350 to step up cyber defences

Government cyber security experts are offering to assess the IT systems of Britain’s biggest companies

Cyber attacks against British companies are already causing significant reputational damage
Cyber attacks against British companies are already causing significant reputational damage

Government spy agencies MI5 and GCHQ have sent a letter to the chairs of all the FTSE 350 companies in Britain, offering to conduct an assessment of their cyber defences.

The letter – which is signed by MI5 director ...

Continue Reading →
0
Page 2 of 11 12345...»