Archive

The story of the February cyberattack on the Bank of Bangladesh that sought $1 billion — and achieved $81 million — keeps looking more and more like a Hollywood caper movie. The first account of the attack said it was

Security researchers at McAfee Labs have come across a new malware family that is abusing a secret Easter Egg in Microsoft Windows called “GodMode.” GodMode consists of a piece of code that Microsoft left inside Windows since Vista that allows

Conficker, Ramnit malware found in Gundremmingen ‘harmless’ since the affected systems were not connected to the Internet. A German nuclear power plant near Munich reportedly was found infected with malware. RWE, the German utility that runs the facility, has confirmed

IBM malware murderer Limor Kessem says Android VXers are using legitimate screen overlay features to hose handsets. Screen overlays do what it says on the can: applications with appropriate permission can monitor other apps and then overlay to allow entry

The American Dental Association (ADA) says it may have inadvertently mailed malware-laced USB thumb drives to thousands of dental offices nationwide. The problem first came to light in a post on the DSL Reports Security Forum. DSLR member “Mike” from Pittsburgh

Waze has a vulnerability that could allow a ghost vehicle to track the movements of other vehicles on the network, according to researchers at the University of California, Santa Barbara. The researchers, mostly chaps called Wang, published their findings in

In 2013, security organization Security Explorations discovered a security vulnerability in Java 7u25 by which an attacker could completely escape the Java sandbox. Oracle released a patch in update 7u40, but as Security Explorations announced earlier this year, the patch only addressed the proof

Last Sunday night, in the darkest corners of the internet — where no one knows your name or what you look like — 250 people from across the globe fired up their anonymous Tor browsers, connected to the dark web and logged into an

When the FBI bought a hacking tool to break into an iPhone, it wasn’t sure what exactly it got for its $1.3m. On Wednesday, the FBI confirmed it wouldn’t tell Apple about the security flaw it exploited to break inside

The Supreme Court approved hotly contested amendments to federal criminal procedure today that, if accepted by Congress, will expand the FBI’s ability to hack into computer networks. The rule at the heart of the debate is Criminal Rule 41, which limits

The US government doesn’t want terrorists to use encryption, but its military sure wants to have it. The US Air Force is looking to partner with tech companies to build a secure messaging device, with apps, for its flight crews.

Computer hackers are constantly exploiting security flaws and accessing private information. For the participants at a new annual competition, though, it’s not a crime – it’s a sport. Blood-curdling cries were punctuated by the sound of bamboo swords thwacking against

PITTSBURGH— U.S. Steel Corp. is alleging that Chinese government hackers stole proprietary methods for making lightweight steel on behalf of Chinese steel producers seeking to supply a bigger share of the U.S. auto-making market. Pittsburgh-based U.S. Steel, in a complaint filed on

Yesterday, Anonymous In Kenya, a division of the Anonymous hacker collective, leaked a trove of data from the Kenyan Ministry of Foreign Affairs. The files were uploaded online on the Dark Web on a server that also hosts data dumps

Goldcorp Inc. has fallen victim to a data breach by anonymous hackers who posted reams of the miner’s private information online. The breach includes 14.8 gigabytes of data, according to the Daily Dot website. The leaked data includes payroll information,

AUGUSTA, Ga. (WRDW/WAGT) — Cyber security is one of the biggest threats we face this day and age. We hear about people getting our personal information by hacking into stores, but it can also happen closer to home by you