Online “hacktivist” group Anonymous claimed Sunday it had stolen a trove of emails and credit card information from US-based security firm Stratfor’s clients, and vowed additional attacks. View full post on anonymous hacker – Yahoo! News Search Results View full post on National Cyber Security
Windows 8 picture security just a toy, claims RSA SecurID inventor
The Windows 8 feature that logs users in if they touch certain points in a photo in the right order might be fun, but it’s not very good security, according to the inventor of RSA’s SecurID token. “I think it’s cute,” says Kenneth Weiss, who now runs a three-factor authentication…
Windows 8 picture security just a toy, claims RSA SecurID inventor
The Windows 8 feature that logs users in if they touch certain points in a photo in the right order might be fun, but it’s not very good security, according to the inventor of RSA’s SecurID token. “I think it’s cute,” says Kenneth Weiss, who now runs a three-factor authentication…
Spy drone GPS spoofing claims doubted by security analysts
Reports that Iranian electronic warfare experts may have succeeded in intercepting and capturing a sophisticated US spy drone has been received with some skepticism by security analysts. While it is certainly possible that the drone was electronically ambushed as reported, more details are needed to know what exactly might have…
Iran Claims to Have Hacked U.S. Drone
The Iranians say they leveraged a known vulnerability in the drone’s GPS system to trick it into landing in the country. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security
Carrier IQ execs complying with probe of cellphone tracking claims
Federal investigators are probing allegations that Carrier IQ software found on about 150 million cellphones tracked user activity and sent the information to the cellphone companies without informing consumers, according to government officials. View full post on cellphone security – Yahoo! News Search Results View full post on National Cyber…
ProtectMyID: True. This type of identity theft still claims the most victims, although you’re also vulnerable online and through company data sources.
ProtectMyID: True. This type of identity theft still claims the most victims, although you’re also vulnerable online and through company data sources. View full post on Twitter / ProtectMyID View full post on National Cyber Security
Android ‘spyware’ storm: Lawsuits loom, handset makers panic as ‘Carrier IQ’ claims software ‘does not’ spy on users
U.S. senator asks company to clarify ‘deeply troubling’ allegations Lawsuit for privacy violation filed in Illinois Nokia, BlackBerry, Apple distance themselves ‘Carrier IQ’ claims it does not ‘record’ information Still unclear if software is used by non-US networks Last updated at 2:46 PM on 7th December 2011 Enlarge The…
Conficker worm connected to Stuxnet, respected US expert claims
The Stuxnet malware was not only built to attack Iran’s nuclear program its assault was aided by the Conficker worm of 2008, a respected US security researcher has claimed. According to a Reuters report, John Bumgarner of the independent US Cyber Consequences Unit (US-CCU) has researched a number of connections…
Leveson Inquiry hears claims of newspaper computer hacking
Were newspaper journalists responsible for not just phone hacking.. but computer hacking too? View full post on Naked Security – Sophos View full post on National Cyber Security Gergory Evans