Bitcoinica, a Bitcoin exchange started by a 17-year old teenager Zhou Tong, has been shut down for security investigations. It’s believed that at least 18,000 BTC ($90,000 or 68,000 EUR) have been stolen. News of the hack was posted this morning by Bitcoinica’s founder, Zhou Tong: “Today, we have discovered a suspicious Bitcoin transaction that […]
Anonymous: We Have Access to Every Secret Government Database
Anonymous has been meek and quiet since the great Sabu treachery, failing to even threaten much of anything. But in a new interview, one of the group’s last remaining leaders says Anon has a nuclear card up its sleeve.Christopher “Commander X” Doyon, whose name is public because he’s been busted for hacking a California government
Anonymous: We Have Access to Every Secret Government Database Read More »
What is your password worth?
Would you be tempted to sell off company passwords for a fee? If not, seems like you’re in the minority, acccording to research. By Davey Winder, 11 May 2012 at 17:17 COMMENT:Almost half of employees would happily sell their corporate passwords for, wait for it, less than a fiver, according to recent research by One
What is your password worth? Read More »
The Password Protection Act of 2012 penalizes employers for demanding online passwords
by Jeremy Hill New legislation presented by Senators Richard Blumenthal, Charles Schumer, Ron Wyden, Jeanne Shaheen, and Amy Klobuchar is aiming to prevent employers from ever demanding access to the password-protected online accounts of current or perspective employees. It’s called the Password Protection Act of 2012, and it carriers monetary penalties if violated. Senator Schumer explained his
The Password Protection Act of 2012 penalizes employers for demanding online passwords Read More »
How to Securely Share a Password with Someone Using LastPass
PASSWORDS Occasionally, you need to share a password with someone. Maybe it’s a shared office-wide password, your family’s Amazon login, or maybe you just want to share a Netflix account with your roommate. Rather than sharing it over email, you can more seamlessly and securely share passwords in just a few clicks with LastPass—and even
How to Securely Share a Password with Someone Using LastPass Read More »
IT security pros failing on risk strategies
Just 14 percent are confident they have a complete picture of their security and risk state By Antony Savvas, Computerworld UKMay 10, 2012 09:00 AM ET IT security professionals in Europe have “significant gaps” in their enterprise risk strategies, according to research from HP. The most mortifying moments in IT security history HP questioned 500
IT security pros failing on risk strategies Read More »
US-CERT Technical Cyber Security Alert – Microsoft Updates for Multiple Vulnerabilities (TA12-129A)
National Cyber Alert System Technical Cyber Security Alert TA12-129AMicrosoft Updates for Multiple Vulnerabilities Original release date: May 08, 2012 Last revised: — Source: US-CERTSystems Affected * Microsoft Windows * Microsoft .NET Framework * Microsoft Office * Microsoft SilverlightOverview Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.Description The Microsoft
London Hacked Its Own Traffic Lights to Make Sure It Got the Olympics
London fought tooth and nail for the 2012 Summer Olympics. How bad did it want them? Bad enough, apparently, for the city to hack its own traffic lights to ensure the IOC evaluation committee didn’t get stuck in London gridlock back in 2005: Bid-committee officials knew that London’s transportation system was a weak spot on the city’s
London Hacked Its Own Traffic Lights to Make Sure It Got the Olympics Read More »
Blackberry 10 OS Will have Multi-layered Security Model
RIM’s upcoming BlackBerry 10 operating system is intended to be as secure, if not more so, than the OS running on RIM’s current crop of BlackBerry devices. Mobile security could become a major selling point for the new platform, for enterprises, carriers and end users alike. By John Cox Network World — RIM’s upcoming BlackBerry 10 operating
Blackberry 10 OS Will have Multi-layered Security Model Read More »
Protect Yourself From DNSChanger
f the DNSChanger rootkit has infected your PC, you’ll lose access to the Internet when the FBI shuts down DNSChanger’s surrogate DNS servers. Here’s how to determine whether you’re infected, and what to do if you are. By Alex Wawro, PCWorld In July the Internet Systems Consortium will permanently shut down DNS servers deployed to serve as
Protect Yourself From DNSChanger Read More »