Hacking - Infoworld http://www.infoworld.com/t/2106 en Web apps and point-of-sale were leading hacker targets in 2013 http://www.infoworld.com/d/security/web-apps-and-point-of-sale-were-leading-hacker-targets-in-2013-240946?source=rss_hacking <p>Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report on data breach investigations.</p> <p>The leakiest industry by far, in terms of confirmed incidents where data was exposed, was finance with 465 breaches. But the public sector suffered 175 such incidents, retail had 148 and accommodation dealt with 137 breaches.</p> Security Authentication Data Loss Prevention Data Security Hacking Intrusion Detection Phishing Tue, 22 Apr 2014 11:47:48 +0000 admin 240946 at http://www.infoworld.com The sky is falling! Hackers target satellites http://www.infoworld.com/d/security/the-sky-falling-hackers-target-satellites-240934?source=rss_hacking <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/lock_screen.jpg" alt="The sky is falling! Hackers target satellites" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p> Security Cyber Crime Hacking Security Tue, 22 Apr 2014 10:00:00 +0000 Roger A. Grimes 240934 at http://www.infoworld.com German researchers hack Galaxy S5 fingerprint login http://www.infoworld.com/d/security/german-researchers-hack-galaxy-s5-fingerprint-login-240603?source=rss_hacking <p>It took just four days for German researchers to trick the Samsung Galaxy S5's fingerprint scanner into accepting a mold of a fingerprint instead of a real finger.</p> <p>Despite fingerprint authentication being one of the headline features on Samsung's new flagship model, the company's implementation of it "leaves much to be desired," SRLabs said in a video demonstration of the hack <a href="http://www.youtube.com/watch?v=sfhLZZWBn5Q" target="_blank">posted on Youtube.</a></p> Mobile Technology Security Samsung Android Authentication Mobile Security Hacking Identity Management Smartphones Wed, 16 Apr 2014 13:53:02 +0000 admin 240603 at http://www.infoworld.com In Heartbleed's wake, Comodo cranks out fresh SSL certificates http://www.infoworld.com/d/security/in-heartbleeds-wake-comodo-cranks-out-fresh-ssl-certificates-240329?source=rss_hacking <p>Tens of thousands of new digital certificates have been issued by Comodo in the wake of the "Heartbleed" security flaw, which has put Internet users' data at risk.</p> <p>One of New Jersey-based Comodo's main business lines is issuing the digital certificates that encrypt traffic between users and a Web service, a critical shield that protects users from spying by third parties.</p> Security Encryption Hacking Open Source Software Web Security Fri, 11 Apr 2014 11:20:15 +0000 admin 240329 at http://www.infoworld.com 5 no-bull facts you need to know about Heartbleed right now http://www.infoworld.com/t/security/5-no-bull-facts-you-need-know-about-heartbleed-right-now-240269?source=rss_hacking <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/numbers_1_to_5.jpg" alt="5 no-bull facts you need to know about Heartbleed right now" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p></em></div> Open Source Software Security Encryption Hacking Internet Privacy Open Source Software Web Security Security Thu, 10 Apr 2014 18:20:10 +0000 InfoWorld Tech Watch 240269 at http://www.infoworld.com Twitter says it dodged the horrors of Heartbleed http://www.infoworld.com/d/security/twitter-says-it-dodged-the-horrors-of-heartbleed-240220?source=rss_hacking <p>Twitter was not affected by the <a href="http://www.infoworld.com/d/security/heartbleed-bug-in-openssl-puts-encrypted-communications-risk-240054" target="_blank">Heartbleed</a> Internet vulnerability that rocked the Web security world this week, making one less password consumers need to change to protect themselves, but users still need to be careful how they respond to the threat.</p> Security Data Security Encryption Hacking Thu, 10 Apr 2014 10:57:06 +0000 admin 240220 at http://www.infoworld.com World hit by record wave of 'mega' data breaches in 2013 http://www.infoworld.com/d/security/world-hit-record-wave-of-mega-data-breaches-in-2013-240161?source=rss_hacking <p>What do Target, AOL, LivingSocial, Evernote, and Adobe have in common with one another? Answer: they were all victims of huge data breaches during 2013, part of a phenomenon that a new Symantec report calcuates has reached epidemic levels.</p> Security Cyber Crime Data Security Hacking Wed, 09 Apr 2014 14:36:46 +0000 admin 240161 at http://www.infoworld.com 'Heartbleed' bug in OpenSSL puts encrypted communications at risk http://www.infoworld.com/d/security/heartbleed-bug-in-openssl-puts-encrypted-communications-risk-240054?source=rss_hacking <p>Computer security experts are advising administrators to patch a severe flaw in a software library used by millions of websites to encrypt sensitive communications.</p> <p>The flaw, nicknamed "Heartbleed," is contained in several versions of <a href="http://www.openssl.org/" target="_blank">OpenSSL</a>, a cryptographic library that enables SSL (Secure Sockets Layer) or TLS (Transport Security Layer) encryption. Most websites use either SSL or TLS, which is indicated in browsers with a padlock symbol.</p> Security Data Security Encryption Hacking Tue, 08 Apr 2014 11:10:18 +0000 admin 240054 at http://www.infoworld.com Protect your source code before it's too late http://www.infoworld.com/d/security/protect-your-source-code-its-too-late-239537?source=rss_hacking <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/virus_code_hp.jpg" alt="Protect your source code before it's too late" width="243" height="182" align="right" /></div> <p>It's one of the great computer security lessons.</p> Security Application Security Hacking Insider Threats Security Tue, 01 Apr 2014 10:00:00 +0000 Roger A. Grimes 239537 at http://www.infoworld.com The NSA's spying has in fact hurt U.S. cloud providers http://www.infoworld.com/d/the-industry-standard/the-nsas-spying-has-in-fact-hurt-us-cloud-providers-239168?source=rss_hacking <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/04OPsecadvise_hp_1.jpg" alt="The NSA's spying has in fact hurt U.S.</div> Cloud Computing Security The Industry Standard Edward Snowden Cloud Security Data Security Hacking Government Thu, 27 Mar 2014 10:00:00 +0000 Bill Snyder 239168 at http://www.infoworld.com Researchers discover credential-stealing Unix-based server botnet http://www.infoworld.com/d/security/researchers-discover-credential-stealing-unix-based-server-botnet-238687?source=rss_hacking <p>Cyber criminals are using sophisticated malware in compromising thousands of Unix-based servers to spew spam and redirect a half million Web users to malicious content per day, a security firm reported.</p> <p>Dubbed Operation Windigo, the attack has been ongoing for more than two and a half years and has compromised as many as 25,000 servers at one time, anti-virus vendor ESET said Tuesday. Systems infected with the backdoor Trojan are used in stealing credentials, redirecting Web traffic to malicious content and sending as many as 35 million spam messages a day.</p> Open Source Software Security Linux Cyber Crime Hacking Thu, 20 Mar 2014 11:59:37 +0000 admin 238687 at http://www.infoworld.com Hackers gonna hack -- but you're more secure than you think http://www.infoworld.com/t/security/hackers-gonna-hack-youre-more-secure-you-think-238660?source=rss_hacking <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/IFW_Hacking.jpg" alt="Hackers gonna hack -- but you're more secure than you think" width="243" height="182" align="right" /></div><p>We're awash in stories about catastrophic breaches and mysterious security threats that endanger computing as we know it. But is it really that bad? Security Hacking Security Wed, 19 Mar 2014 10:00:00 +0000 InfoWorld Tech Watch 238660 at http://www.infoworld.com The bad guys have your credit card info -- so what? http://www.infoworld.com/d/security/the-bad-guys-have-your-credit-card-info-so-what-238558?source=rss_hacking <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/IFW_Hacking3.jpg" alt="The bad guys have your credit card info -- so what?" width="243" height="182" align="right" /></div> <p>I'm constantly perplexed by the sensational headlines claiming this or that breach resulted in millions of credit cards being stolen.</p> Security Cyber Crime Data Security Hacking Identity Management Tue, 18 Mar 2014 10:00:00 +0000 Roger A. Grimes 238558 at http://www.infoworld.com Researchers pocket record $400K at Pwn2Own hacking contest's first day http://www.infoworld.com/d/security/researchers-pocket-record-400k-pwn2own-hacking-contests-first-day-238315?source=rss_hacking <p>Researchers on Wednesday cracked Microsoft's IE11 (Internet Explorer 11), Mozilla's Firefox, and Adobe's Flash and Reader at the Pwn2Own hacking contest, earning $400,000 in prizes, a one-day record for the challenge.</p> <p>Pwn2Own continues today, when other teams and individual researchers will take their turns trying to break Apple's Safari and Google's Chrome.</p> Security Hacking Thu, 13 Mar 2014 13:48:45 +0000 admin 238315 at http://www.infoworld.com Android exploit eats up WhatsApp chat databases http://www.infoworld.com/t/encryption/android-exploit-eats-whatsapp-chat-databases-238265?source=rss_hacking <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/android_security.jpg" alt="Android exploit eats up WhatsApp chat databases" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p> Security Android Mobile Apps Encryption Hacking Malware Thu, 13 Mar 2014 10:00:00 +0000 InfoWorld Tech Watch 238265 at http://www.infoworld.com Hackers allegedly hit Mt. Gox CEO's blog, post balance of remaining bitcoins http://www.infoworld.com/d/security/hackers-allegedly-hit-mt-gox-ceos-blog-post-balance-of-remaining-bitcoins-238033?source=rss_hacking <p>Hackers attacked the personal blog of Mt. Gox CEO Mark Karpeles on Sunday and posted what they claim is a ledger showing a balance of some 950,000 bitcoins based on records they obtained from the defunct exchange for the virtual currency.</p> <p>They said the sum contradicts Mt. Gox's claim in a Japanese bankruptcy protection filing Feb. 28 that it had lost about 850,000 bitcoins.</p> Security Cyber Crime Hacking Security Mon, 10 Mar 2014 11:28:44 +0000 admin 238033 at http://www.infoworld.com Bitcoin bank Flexcoin shuts down after massive theft http://www.infoworld.com/t/hacking/bitcoin-bank-flexcoin-shuts-down-after-massive-theft-237646?source=rss_hacking <p>Flexcoin, a site that described itself as the "world's first bitcoin bank," has closed after it got hacked and all of the bitcoins it had placed in online storage were stolen, the site recently announced.</p> <p>Flexcoin was attacked and robbed March 2 of all coins in its "hot wallet" -- a term that refers to bitcoin online storage -- the site said in an announcement posted to its <a href="http://www.flexcoin.com/" target="_blank">home page</a>. The attacker made off with 896 bitcoins, which at current prices across several exchanges would amount to roughly $600,000.</p> Security E-commerce Hacking Tue, 04 Mar 2014 19:08:01 +0000 admin 237646 at http://www.infoworld.com Sears says it finds no evidence of data breach -- yet http://www.infoworld.com/d/security/sears-says-it-finds-no-evidence-of-data-breach-yet-237471?source=rss_hacking <p>Sears Holdings said a review of its systems does not show evidence yet of a data breach as retailers continue to stay on guard in the light of payment card terminal hacking at <a href="http://www.infoworld.com/d/security/target-says-40-million-cards-likely-skimmed-in-security-breach-232946">Target </a>and Neiman Marcus.</p> <p>The department store chain, with 2,500 stores in the U.S. and Canada, is the latest company to say it is investigating a possible breach, following the hotel management company White Lodging Services and the arts and crafts chain Michaels.</p> Security Cyber Crime Data Loss Prevention Data Security Hacking Mon, 03 Mar 2014 15:13:05 +0000 admin 237471 at http://www.infoworld.com Stop DNS-based DDoS attacks, once and for all http://www.infoworld.com/d/security/stop-dns-based-ddos-attacks-once-and-all-236387?source=rss_hacking <p>There's no disputing that DNS is a critical component of computer networking. However, if they fall into the wrong hands, these network tools can be abused to generate a DDoS attack -- one of the most destructive weapons on the Internet. These seemingly simple barrages have taken down big names across the Internet, and you don't want to be one of the victims.</p> Data Center Networking Security Internet Cyber Crime Endpoint Protection Hacking Data Center IDG Insider Mon, 03 Mar 2014 11:00:00 +0000 uphan 236387 at http://www.infoworld.com China ramps up cyber security, strives to become 'Internet power' http://www.infoworld.com/d/security/china-ramps-cyber-security-strives-become-internet-power-237372?source=rss_hacking <p>China is bolstering its efforts on cyber security with a new high-level committee that aims to turn the nation into an "Internet power," the country's official state media said Thursday.</p> <p>Chinese President Xi Jinping is leading the new government body, which held its first meeting on Thursday. Xi was quoted as stating that cyber security and information technology had become a matter of national security.</p> Networking Security Internet Federal Regulations Hacking Web Security Security Fri, 28 Feb 2014 12:04:05 +0000 admin 237372 at http://www.infoworld.com