Hackers who stole security clearance data on millions of Defense Department and other U.S. government employees got away with about 5.6 million fingerprint records, some 4.5 million more than initially reported, the government said on Wednesday. Reports David Alexander on Reuters
The additional stolen fingerprint records were identified as part of an ongoing analysis of the data breach by the Office of Personnel Management and the Department of Defense, OPM said in a statement. The data breach was discovered this spring and affected security clearance records dating back many years.
The news came just ahead of a state visit to Washington by Chinese President Xi Jinping. U.S. officials have privately blamed the breach on Chinese government hackers, but they have avoided saying so public
Big loopholes lurk in African cybercrime law – where it even exists reports theconversation.com
Since May 2011 the International Telecommunication Union (ITU) – the UN agency that specialises in information and communication technology – has worked with the UN Office on Drugs and Crime (UNODC) to help countries mitigate against the risks posed by cybercrime.
According to the ITU, out of the 52 countries that it looked at in Africa, 44 do not criminalise computer-facilitated offenses. Only two have legislation deemed sufficient to combat online sexual abuse, and 40 do not have any legislation at all addressing online child sexual abuse. Nearly all – 49 countries – do not criminalise the simple possession and distribution of indecent images of children, and 51 of the countr
Windows users across the English-speaking world have been warned to be on the lookout for a new Trojan campaign that borrows imagery from the TV show Breaking Bad as part of a not-so-amusing attempt to extort money from anyone infected by it.
"The malware encrypts images, videos, documents, and more on the compromised computer and demands up to AU$1,000 to decrypt these files," Symantec said.
In truth if it weren't for the TV gimmick noticed by Symantec, the fact that Cryptolocker.S is spreading in Australia would probably have been just another one of the steady stream of ransom Trojans nobody pays much attention to among many threats in an average week.
The hook this time is that the Trojan uses a splash screen ransom demand for between $450 and $1,000 Australian dollars (up to $8...
TORONTO – WhatsApp users may want to keep a watchful eye on their inbox. Many Canadian web users have reported seeing an increase in suspicious emails claiming to be sent from the mobile messaging service. Reports Nicole Bogart of Global News
The messages, usually sent from unknown email addresses, claim the user has a new voicemail message on WhatsApp – but if the emails are linked to a malware scam.
When clicked, a “play” button shown in the email takes users to a malicious website that may trick them into downloading malware to their device, according to previous reports.
The scam is said to target Android phones and iPhone’s that have been “jailbroken” – the term for when users remove the limitations on Apple’s software, or alter them to run unauthorized software.
The emails are
The recent announcement by the National Protection Authority of South Africa (NPA) revealed that 177 cybercrime cases had been finalised in the past year, and has highlighted the need for individuals to make sure that they are adequately protected from hackers.
This is according to Athol Wesselink, Chief Technical Engineer at OpenWeb – a nationwide internet service provider, who says that consumers must take preventative measures to ensure that their protection infrastructure makes hacking into their personal online platforms a laborious task for cyber-criminals.
“While advanced cyber-criminals are usually able to hack into any account or system they set their sights on, individuals can mitigate the risk by ensuring that their systems and accounts are as well protected as possible and
2014 saw the largest Internet network attacks of all time, fundamental network programs cracked like eggs, and user IDs and passwords leaked everywhere. It will only get worse.
An Internet joke that goes back at least to the early 1980s consists entirely of the phrase: “Imminent Death of the Net Predicted!” Every year, even more often than you’d hear “This will be the year of the Linux desktop!” someone would predict that the Internet was going to go to hell in a handbasket — and nothing happened. This year it’s my turn, but I fear I’m going to be proved right. Steven J. Vaughan-Nichols Reports
Take a good look at what happened to the Internet in 2014. In February we saw the biggest distributed denial-of-service (DDoS) attack of all time. It hit a high of 400 gigabits per
Last month, hackers infiltrated the computer network of Sony Pictures Entertainment, a major Hollywood movie studio. The attackers stole a huge number of confidential documents, which are now being downloaded (primarily by journalists) from file-sharing networks. Since then, journalists have been poring through the files looking for interesting revelations.
The hackers are widely believed to be backed by the North Korean government, which is furious at Sony for producing The Interview, a movie that depicts the assassination of North Korean leader Kim Jong Un. On Wednesday, a terrorism threat against theaters showing the film caused Sony to cancel its planned Christmas Day release.
Read on to learn how the hacks happened, who might be responsible, and what we've learned as a result. Read
Lizard Squad allegedly caused an outage of the Sony’s online PlayStation gaming service which prevented users logging in on consolesreports Guardian
The hacking group Lizard Squad is claiming responsibility for an attack on Sony’s PlayStation network, which caused connection issues for gamers over the weekend.
Visitors to the PlayStation Store were met with the message “Page not found! It’s not you. It’s the internet’s fault”. Sony said: “We are aware of the issues some users are experiencing, and are working to address them,” but did not elaborate the cause.
Lizard squad claimed credit for the outage via its Twitter account. Read more
Summary: A leading computer security company says it has discovered one of the most sophisticated pieces of malware ever seen. Symantec says the bug, named Regin, was probably created by a government and has been used for six years against a range of targets around the world.
(Reuters) - An advanced malicious software application has been uncovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries, antivirus software maker Symantec Corp said in a report on Sunday.
The Mountain View, California-based maker of Norton antivirus products said its research showed that a "nation state" was likely the developer of the malware called Regin, or Backdoor.Regin, but Symantec did not identify any countries or victims.
When governments, utilities and corporations need to protect their most sensitive data, they create what's called an air-gap network. It involves storing information on computers that are never connected to the Internet, an extreme method of isolation designed to prevent any chance of data leaking out. Reports Bloomberg
Air-gap networks were once considered the "magic bullet" for securing data, but researchers from Ben-Gurion University in Israel have found a way to compromise those machines. Once a computer is infected with a particular kind of virus, hackers can trick the PC into relaying information that can be wirelessly retrieved from a mobile phone located outside of the room.
The technology won't be used to steal something as innocuous as your Gmail password. This is some Missio...