It turns out that the recent Steam forum breach is more serious than originally thought. Head of Valve Gabe Newell issued a statement today apologizing for the inconvenience and confirming that, along with the forums, the Steam database had been compromised. View full post on hacking tools – Yahoo! News…
Facebook Adds Security Tools to Protect User Accounts From Hacker Takeovers
Facebook is testing out two new security features to help users protect their accounts from being compromised by malicious third-party apps or hackers. View full post on facebook hacker – Yahoo! News Search Results View full post on National Cyber Security
Double whammy: New Mac Trojan spies on user, uses GPU
A new malware targeting computers running Apple’s Mac OS X system packs a double whammy: it spies on the user, and uses the computer’s graphics processing unit to mine for Bitcoins. Computer security firm Sophos said the malware — aptly dubbed DevilRobber (a.k.a. OSX/Miner-D) — comes with copies of an…
Sony suffers another security scare – 93,000 user accounts broken into
Hackers successfully broke into 93,000 accounts at Sony over the last few days, once again impacting users of the Sony Entertainment Network, PlayStation Network (PSN) and Sony Online Entertainment services. View full post on Naked Security – Sophos View full post on National Cyber Security
Facebook API abuse can expose private user data, say hackers
But Facebook says it is happy with its current protection measures Facebook is ignoring a serious shortcoming in the way it limits application developers’ access to information about Facebook users, according to a pair of hackers. The problem is in the way Facebook’s APIs (application programming interfaces) work, and could…
Mac OS X Lion vulnerability lets attacker change user password
A flaw in one of Mac OS X Lion’s command-line utilities has potentially opened a route for an attacker to change a user’s password without knowing the current password. But how big of a concern is it? The issue in question was first brought to light by Patrick Dunstan, author…
LIGATT: Which one of the following best describes authentication? A. a user claiming an identity to an information system
LIGATT: Which one of the following best describes authentication? A. a user claiming an identity to an information system View full post on Twitter / LIGATT