Archive
North Korea has tried to hack into email accounts of South Korean railway workers in an attempt to attack the transport system’s control system, South Korea’s spy agency said on Tuesday. South Korea has been on heightened alert against the
Even as the fight against online terrorism is taking on Twitter and Facebook, the online hacktivist group, Anonymous has claimed that Twitter is shutting down their accounts which are finding and reporting ISIS linked accounts. Anonymous claimed that in the
According to a paper, published Friday in the journal Science, Physicists at MIT and the University of Innsbruck in Austria have created a quantum computer out of just five atoms in an ion trap that uses laser pulses to carry
Students of MIT and Britain’s University of Cambridge will spend the weekend hacking one another’s computers, with the blessing of their national leaders. The two schools are competing in a hacking contest that U.S. President Barack Obama and British Prime
RSA 2016 Dell SecureWorks duo Joe Stewart and James Bettke have created a free honeypot loaded with fake domain credentials in a bid to help admins trap and block attackers. The researchers built the Domain Controller Enticing Password Tripwire (DCEPT)
Apple head of software engineering says FBI’s demands compromise the safety of all iOS users
Craig Federighi, Apple’s senior vice president of software engineering (and one of its most popular WWDC presenters) says the FBI’s demands on the company will make all iOS users more vulnerable to malicious attacks in an opinion piece for the
ThreatAnalyzer 6.0 provides advanced discovery and response for malware that evades detection ThreatTrack Security has announced the release of a new version of its malware analysis sandbox,ThreatAnalyzer 6.0, which has been re-engineered to expose advanced malware that is increasingly being
Mobile security company Skycure at the RSA conference in San Francisco earlier this week revealed that a new malware puts more than half a billion Android smartphones at risk of being exposed to hackers. Considered as one of the most
Tesla Motors Inc (NASDAQ:TSLA) has been working on a new Model S P100D, a version that the EV firm is yet to announce, revealed a notorious Model S hacker – Jason Hughes. But, it appears that the EV firm is
Pulse Secure showcases new Cloud Secure solution for hybrid IT environments at RSA Conference 2016
RSA Conference – Pulse Secure, the leader in secure access solutions, recently announced new solutions to allow enterprises to embrace cloud delivered apps and data in order to increase worker productivity without sacrificing security. Pulse Secure is taking a simplified
Encryption is currently a very hot topic in the tech industry, with Apple facing a legal battle with the FBI. The company is being ordered to create a backdoor to infiltrate encryption on an iPhone used by the shooters in
When you’re considering the use of any public Wi-Fi service, two primary concerns are how secure the connection is and what limitations are imposed. In-flight Wi-Fi has the same security concerns as a typical public connection that you’ll find at
SAN FRANCISCO — Amazon Web Services, a globe-spanning cloud computing network that is part of the online retailing giant Amazon, has rapidly become one of the most powerful forces in technology. It has also become a target for poachers. Last
Donald Trump’s voicemails hacked by Anonymous
Donald Trump’s voicemail has allegedly been hacked by members of Anonymous, the loose group of hackers and activists. The 2012 messages appear to show leading figures in the US media showering him with praise, compliments, and thanks for his financial support. Gawker, which
Hackers Target Apple Users With Ransomware
BOSTON (Reuters) – Apple Inc. customers were targeted by hackers over the weekend in the first campaign against Macintosh computers using a pernicious type of software known as ransomware, researchers with Palo Alto Networks Inc. told Reuters on Sunday. Ransomware, one
Could you invent an autonomous hacking system that could find and fix vulnerabilities in computer systems before criminals could exploit them, and without any human being involved? That’s the challenge faced by seven teams competing in Darpa’s Cyber Grand Challenge