A hitherto unknown hacking group claimed responsibility for a hacking attack on a county school system in Tennessee that may have exposed the names, Social Security Numbers and other personal data belonging to about 110,000 people
many businesses see security as “an expensive add-on” and end up not paying sufficient attention to it. “So they’ll dual-hat their IT director and say he’s also doing IT security. And in some organizations–I call it the pile-on–they also pile the chief privacy officer (CPO) responsibilities onto the CIO or CISO role
Tinba is a small data stealing trojan-banker. It hooks into browsers and steals login data and sniffs on network traffic. As several sophisticated banker-trojan it also uses Man in The Browser (MiTB) tricks and webinjects in order to change the look and feel of certain webpages with the purpose of circumventing Two factor Authentification (2FA) or tricking the infected user to give away additional sensitive data such as credit card data or TANs
It maintains information about people who share the same phone number or address, “non-obvious” relationships between individuals, loans for dental work, magazine subscriptions, rental history, real estate assets, investment wealth, retail purchasing, the type of federal tax return someone files, marital status, employment, utility payments, cable TV accounts, criminal records, debt-to-income ratios, changes of address, motor vehicle files, post office boxes, inferences about someone’s capacity to pay bills, predictions about someone’s propensity to pay, links to past and potential fraud crimes–and more
In retaliation against Internet Service Providers (ISPs) blocking some video-sharing and torrent websites like The Pirate Bay under Indian court orders, Anonymous, the “hacktivist” organization, today took down the websites of the ruling Congress Party and the Supreme Court of India.
Several healthcare associations are questioning another provision that would require hospitals and physician groups to conduct a security risk analysis that includes “addressing the encryption/security of data at rest.”
There is now an ongoing and massive cyberattack targeting the American gas-pipeline industry, aimed at giving the attacker a way to gather sensitive information by compromising business systems and possibly even subverting industrial control systems
The hacker who stole Facebook’s source code has gone public with a deeper explanation of how he penetrated the world’s most popular social network.
Microsoft has detected a new piece of malware targeting Apple OS X computers that exploits a vulnerability in the Office productivity suite patched nearly three years ago.
The government’s effort to prosecute corporate espionage was dealt a setback today when a federal appeals court ruled that downloaded code did not qualify as stolen under a federal theft statute