27 May 2013

BBC Mobile apps defaced by Syrian Electronic Army hackers

“Several of Sky’s Android apps have been removed from the Google Play store after they were targeted by the Syrian Electronic Army hacking collective. It follows an attack which saw the logos of six of the UK broadcaster’s apps replaced by that of the SEA.” Source:BBC News – Sky apps

Read More
24 May 2013

How the U.S. Government Hacks the World

“The men and women who hack for the NSA belong to a secretive unit known as Tailored Access Operations. It gathers vast amounts of intelligence on terrorist financial networks, international money-laundering and drug operations, the readiness of foreign militaries, even the internal political squabbles of potential adversaries, according to two

Read More
23 May 2013

Twitter tightens security after recent hacking spate

“Micro-blogging site Twitter says it is bringing in an optional two-step login for users to beef up security following recent high-profile breaches.” Source: BBC News – Twitter tightens security after recent hacking spate

Read More
22 May 2013

NSA Deputy Warns Against Cyber Vigilantes

“The private sector — and the government — must ‘exhaust’ the use of traditional responses such as public shaming, criminal charges, diplomatic demarches, and sanctions ‘before we contemplate the dangerous possibility we might encourage vigilantism,’ the powerful deputy director of the National Security Agency says.” Source: NSA Deputy Warns Against Cyber

Read More
20 May 2013

Chinese hackers who breached Google gained access to sensitive data, U.S. officials say

“Chinese hackers who breached Google’s servers several years ago gained access to a sensitive database with years’ worth of information about U.S. surveillance targets, according to current and former government officials. The breach appears to have been aimed at unearthing the identities of Chinese intelligence operatives in the United States

Read More
20 May 2013

Large cyber espionage emanating from India

“orman Shark uncovered a large and sophisticated cyber-attack infrastructure that appears to have originated from India. The attacks, conducted by private threat actors over a period of three years and still ongoing, showed no evidence of state-sponsorship but the primary purpose of the global command-and-control network appears to be intelligence

Read More
20 May 2013

Millions hit by Yahoo Japan hack attack

“Up to 22 million login names may have been stolen during a hack attack on Yahoo Japan. A file of ID details for about one tenth of its 200 million members was stolen during the attack, it said.” Source:BBC News – Millions hit by Yahoo Japan hack attack

Read More
20 May 2013

Chinese Hackers Resume Attacks on U.S. Targets

“Three months after hackers working for a cyberunit of China’s People’s Liberation Army went silent amid evidence that they had stolen data from scores of American companies and government agencies, they appear to have resumed their attacks  using different techniques, according to computer industry security experts and American officials.” Source:

Read More
15 May 2013

U.S. to protect private sector from secret software attacks

“The U.S. government will use classified information about software vulnerabilities for the first time to protect companies outside of the military industrial complex, top officials told Reuters this week. Secretary of Homeland Security Janet Napolitano said that a system being developed to scan Internet traffic headed toward critical businesses would

Read More
14 May 2013

Is Microsoft reading your Skype instant messages?

“A group of security researchers in Germany found some suspicious traffic on their web servers after a Skype instant messaging session. After a single experiment, they concluded that Microsoft is snooping on its customers. But a closer look at the facts suggests that this is a well-documented security feature at

Read More