Eskenzi PR ad banner Eskenzi PR ad banner

Top 10 Stories

Almost a third of teens (28 per cent) say they regret posting something online.   A survey of 3,999 teenagers between the ages of 11-16 by AVG found 32 per cent have had to ask someone to remove content posted online about them, because they didn’t like it (61 per cent) or it was too personal (28 per cent).   Although 70 per cent have changed their settings on Facebook to make it more difficult...

Read more

J.P. Morgan Chase learned about hackers who stole the bank's contact information for corporate and personal users through a corporate event that it sponsors.   According to reports, the hackers had originally gained access to the bank's network by compromising the computer an employee with special privileges had used both at work and at home and then moved across the bank's network to access contact data.   The Corporate Challenge website was later taken offline...

Read more

At least 12 million websites were exposed due to the patching flaw in the Drupal software.   Drupal stated that automated attacks had taken advantage of the bug, which allows attackers to take complete control of the websites.   The security team also said those who are yet to update the software should do so immediately. The team further said that by simply updating software one may not be able to remove any loopholes that...

Read more

The Joint Cybercrime Action Taskforce (J-CAT) looks set to become permanent after it was set up in September of this year.   Designed to co-ordinate international investigations with partners, targeting key cyber crime threats and top targets, J-CAT is being led by European Cybercrime Centre head Troels Oerting, who said that there are indications that it will be extended for at least another six months, but due to its acquisition of cases it is now seeking...

Read more

A researcher has discovered what is alleged to be a critical breach in Sony’s PlayStation Network.   The SQL Injection flaw was found by Austrian hacker Aria Akhavan, who warned Sony approximately two weeks ago without receiving any response from the company.   Sony has yet to receive a response from Sony, even though the breach appears to be quite important.   VIEW FULL STORY

Read more

The FBI is seeking the power and authority to hack any computer.   The biggest expansion of FBI spying power in its history, the FBI is hoping to grab it without an act of Congress or any public scrutiny or debate to give it the power to distribute malware, hack and trick any computer, anywhere in the world, in the course of investigations.   The amendment inserts a clause that would allow a judge to...

Read more

The US Government must watch the private sector and global companies to meet its cyber security needs.   According to former White House cyber security coordinator Howard Schmidt, as the Government moves at Government speed, while the private sector operates at internet speed.   Schmidt said: “The bottom line is, in order to be able to foster a good business relationship in a global company, businesses will have to put all the resources together, realise that there may...

Read more

Cyber criminals can buy professional-looking software that will automate the sending of stolen card charges to multiple gateway processors. The tool, named Voxis Platform, it will emulate human behaviour and buying patterns, upping the probability that the charges will be authorised. It can target 32 different payment gateways, including Coinbase and PayPal. Card information is loaded into the tool, which is also apparently capable of filling in missing information about the credit card holder by...

Read more

More than 200 organisations from 25 EU member states underwent a virtual cyber attack yesterday as part of the continent’s largest and most complex ever cyber security exercise.   Organised by ENISA, Cyber Europe 2014 targeted security agencies, ministries, telecoms and energy companies, financial institutions and internet service providers. It involved all EU member states (apart from Belgium, Lithuania and Malta) are testing their procedures and capabilities against realistic large-scale cyber-security scenarios.   The event saw...

Read more

Users visiting the Popular Science website have been targeted with a drive-by download attack.   Attackers used the tactic to inject code in the website which would redirect visitors to an online location hosting the Rig exploit kit.   Rather than scanning for vulnerable plug-ins, in this case the kit first checked the target system for the presence of certain anti-virus software and proceeded with the plug-in exploitation if none of the products on its...

Read more
Page 436 of 630 1 435 436 437 630