Blogs | Page 6
China's Cyber-War Software Possibly Leaked in a Documentary
By Fahmida Y. Rashid | Posted: 2011-08-22
A military documentary broadcast in China appears to have some screenshots of what may be software designed for cyber-warfare attacking a server in the United States.
The Epoch
... Read More
... Read More
Internet Users Posting Info that Helps Cyber-Crooks
By Fahmida Y. Rashid | Posted: 2011-08-20
Internet users are overly complacent about posting personal or potentially sensitive data online, providing cyber-criminals with a wealth of information that could be used for
... Read More
... Read More
Facebook: Friend Who You Actually Know
By Fahmida Y. Rashid | Posted: 2011-08-20
Facebook has a simple tip for its users to stay safe online: "Friend" only people you know.
In a 13-page guide titled "Own Your Space," Facebook advised users on how to secure their accounts on the social networking site and provided some general tips on computer security. The tips explain some
Colbert Wants the Feds to Hire Kevin Mitnick, Legendary Hacker
By Fahmida Y. Rashid | Posted: 2011-08-19
Kevin Mitnick, one of the individuals included in eWEEK's Top Hackers slideshow, appeared on Comedy Central's Colbert Report on Aug. 18. Mitnick, on a press tour for his book, "Ghost in the Wires: My Adventures as the World's Most Wanted Hacker," appeared on the show for an interview with the
Google Analyzes Malware Activity for Attackers' Tactics: Report
By Fahmida Y. Rashid | Posted: 2011-08-18
in a report based on four years of Web data, Google researchers found that attackers are deploying highly specialized evasion and obfuscation techniques to stay one step
... Read More
... Read More
Verizon Strikers Accused of Sabotaging Network
By Fahmida Y. Rashid | Posted: 2011-08-17
About 45,000 Verizon landline workers from Massachusetts to Virginia went on strike Aug. 7, fighting management demands for contract givebacks. With the rise in mobile devices,
... Read More
... Read More
Data Analysis of myBART Info Reveals Weak Passwords
By Fahmida Y. Rashid | Posted: 2011-08-16
Identity Finder released a detailed analysis of the data hacktivist collective Anonymous released Aug. 14 after successfully breaching the myBART.org Website. The attack on the
... Read More
... Read More
Hackers Submit Attacks to RankMyHack, Get Rated
By Fahmida Y. Rashid | Posted: 2011-08-15
Following the tradition of Hot or Not and other sites that ask the Internet masses to rank and rate various things, a United Kingdom-based hacker and web developer "s0lar" has launched
... Read More
... Read More
Diabetic Black Hat Researcher Hacks Insulin Pump
By Fahmida Y. Rashid | Posted: 2011-08-05
Cyber-attacks are no longer limited to just computers. At Black Hat, a security researcher discussed how an attacker with a powerful antenna could launch a wireless attack to remotely control an insulin pump and kill the victim for up to half a mile away.
Security researcher Jay Radcliffe set out to
Aerial Drone Sniffs, Attacks Wireless Networks at Black Hat
By Fahmida Y. Rashid | Posted: 2011-08-04
Two security researchers demonstrated how to outfit a radio-controlled model airplane with a computer and 4G connectivity to create a nearly undetectable aerial hacking
... Read More
... Read More
War Texting Remotely Unlocks, Starts Cars at Black Hat
By Fahmida Y. Rashid | Posted: 2011-08-03
Modern automobiles are increasingly becoming more like computers, with features such as the in-car navigation system and multiple sensors tracking the fuel tank and overall
... Read More
... Read More
Facebook Joins Google, Mozilla, Barracuda in Paying Bug Bounties
By Fahmida Y. Rashid | Posted: 2011-08-03
Facebook has joined the handful of companies who pay bug bounties to researchers who discover vulnerabilities.
Most Website flaws, such as cross-site scripting,
... Read More
... Read More
Security Tips to Not Get Hacked at Black Hat
By Fahmida Y. Rashid | Posted: 2011-08-02
Writing about information security, I tend to be very paranoid. This is a good thing as it means I am creating complicated passwords, regularly clearing out my browser history and cookies, and never click on links in my e-mail, even when it's my company's HR department demanding I fill out
Anonymous Member Plans Open Source Malware, Automated Tools
By Fahmida Y. Rashid | Posted: 2011-08-02
Businesses often time big product announcements just before a big technology trade show, so why should hacktivist collective Anonymous be any different?
A few days before
... Read More
... Read More
Iran Rips-and-Replaces Centrifuges Post-Stuxnet
By Fahmida Y. Rashid | Posted: 2011-07-26
A new report suggests Iran's nuclear program has not recovered from the Stuxnet worm as previously believed. It appears Iran is still replacing thousands of expensive centrifuges that
... Read More
... Read More







