31 May 2013

Hack in the USSR: cybercriminals find haven in .su domain space

“The Soviet Union disappeared from the map more than two decades ago, but online an ‘evil empire’ is thriving. Security experts say the .su internet suffix assigned to the USSR in 1990 has turned into a haven for hackers who’ve flocked to the domain space to send spam and steal

Read More
31 May 2013

Cyber threats pose ‘stealthy, insidious’ danger: defense chief

“Defense Secretary Chuck Hagel said on Friday that cyber threats posed a ‘quiet, stealthy, insidious’ danger to the United States and other nations, and called for ‘rules of the road’ to guide behavior and avoid conflict on global computer networks.” Source: Cyber threats pose ‘stealthy, insidious’ danger: defense chief |

Read More
30 May 2013

Despite opposition, Google will make critical security exploits public after seven days

“Google’s security researchers are well known for uncovering vulnerabilities in other people’s products. Standard operating procedure is to give the affected company sixty days before publishing the problem, keeping things under wraps until a fix can be shipped out. But when it comes to critical vulnerabilities that are actively being

Read More
29 May 2013

China War Games: Army To Conduct Its First Digital Technology Military Exercise

“China will next week conduct its first ‘digital’ technology military exercise, state media said on Wednesday, against growing concern in Washington and elsewhere about Chinese hacking attacks. A brief report by the official Xinhua news agency said the exercise, in north China’s remote Inner Mongolia region, will ‘test new types

Read More
28 May 2013

Cyberattacks devastated my business

“From a small startup that was hacked by Anonymous to a cleaning firm that fell prey to a Nigerian scam, these five small businesses explain how cyberattacks hurt their firms.” Source:Cyberattacks devastated my business! – Hacked by Anonymous (1) – CNNMoney

Read More
28 May 2013

Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies

“Designs for many of the nation’s most sensitive advanced weapons systems have been compromised by Chinese hackers, according to a report prepared for the Pentagon and to officials from government and the defense industry. Among more than two dozen major weapons systems whose designs were breached were programs critical to

Read More
27 May 2013

Chinese hackers steal Australia Security Intelligence Organization building plans

“Chinese hackers stole the blueprints of the $630 million building that will house the Australia Security Intelligence Organisation, according to an ABC . The report also alleges Australian government and business networks are under much heavier cyber attacks than the government has admitted. Separately, spy agencies expressed concern budget savings could

Read More
27 May 2013

BBC Mobile apps defaced by Syrian Electronic Army hackers

“Several of Sky’s Android apps have been removed from the Google Play store after they were targeted by the Syrian Electronic Army hacking collective. It follows an attack which saw the logos of six of the UK broadcaster’s apps replaced by that of the SEA.” Source:BBC News – Sky apps

Read More
24 May 2013

How the U.S. Government Hacks the World

“The men and women who hack for the NSA belong to a secretive unit known as Tailored Access Operations. It gathers vast amounts of intelligence on terrorist financial networks, international money-laundering and drug operations, the readiness of foreign militaries, even the internal political squabbles of potential adversaries, according to two

Read More
23 May 2013

Twitter tightens security after recent hacking spate

“Micro-blogging site Twitter says it is bringing in an optional two-step login for users to beef up security following recent high-profile breaches.” Source: BBC News – Twitter tightens security after recent hacking spate

Read More