A defensive posture no longer suffices for the protection of the devices and data that have become ubiquitous in today’s digital world. Rather than simply rushing to install defenses on computers, in networks, and in the cloud, we urgently need to step back and take a broader view of the security landscape, in order to Read more…
Tags: cloud apps, cloud security, cyberthreats, Hackers, McAfee Security Journal, mobile security, mobile threats, online security, online security education, security landscape
Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased a number of flaws and solutions in GSM mobile phone networks. Day 1 Defeating GSM encryption is not new. Nohl and Melette detailed how attackers can use known network control messages to help decrypt SMS Read more…
Tags: Hackers, mobile security, sms
Information technologies have evolved to a level at which the developers, programmers, and security specialists all know what they’re doing, and are able to produce products and services that work and are reasonably secure. Of course, there’s always room for improvement. Despite the amount of criminal hacking that goes on, users who effectively implement the Read more…
Tags: data loss, Hackers, phishing, social engineering
In France, July and August are the holiday season. Like my compatriots, I abandoned my workplace for several weeks in the southern sun. But I have to confess it was not an absolute desertion. From time to time, I had a quick look into French hacktivist activities. To demonstrate that hackers and hacktivists never stop, Read more…
Tags: Anonymous Group, Hackers, Hacktivism, iframe, SpyEye
“McAfee launches a range of pharmaceutical anti-viral medications to thwart the growing problem of Biological computer viral attacks” Sounds far fetched? Maybe not given that researches at Caltech have successfully engineered a biological computer which can calculate square roots using DNA replication. Given that the researchers Lulu Quan and Erik Winfree have successfully demonstrated AND and OR logic gates at the Read more…
Tags: attacks, Biological Computer, Hackers, virus
Recently it was announced (http://abcnews.go.com/Technology/wirestory?id=9780148&page=1) with much fanfare that the now-ubiquitous “TPM” chip found in most modern computers had been hacked. This obviously unnerved a lot of people, especially those hanging the safety of their secrets on free solutions like Microsoft Bitlocker which use the TPM to provide convenience to their users. The attack, invented Read more…
Tags: Hackers, TPM, Trusted Computing Module
Posts tagged under Hackers