Please turn on your JavaScript for this page to function normally.
Nearly 5 million military health care files stolen

Sensitive data about nearly 5 million patients has been compromised following the theft of backup tapes from an electronic healthcare app used in the military health system, …

25% of tested Google Chrome extensions allow data theft

27 of a 100 tested Google Chrome extensions have been found vulnerable to data (passwords, history, etc.) extraction attacks though specially crafted malicious websites or by …

Alureon extracts backup C&C locations embedded in images

An Alureon Trojan variant designed to extract the location of backup C&C centers from images disseminated across the Web has been discovered by a Microsoft researcher. …

Suspected LulzSec and Anonymous arrested and charged

Three more alleged LulzSec and Anonymous members have been arrested by the FBI and/or indicted for their misdeeds, reports CNet. 23-year-old Cody Andrew Kretsinger (aka …

Researchers crack SSL encryption

Two security researchers have found a way of breaking the SSL/TLS encryption that allows the information that passes from browser/user to server and back be reliable and, …

DigiNotar files for bankruptcy

After having its SSL and EVSSL certificates deemed untrustworthy by the most popular browsers, VASCO announced that DigiNotar, filed a voluntary bankruptcy petition and was …

Japanese defense contractor breached

Mitsubishi Heavy Industries has revealed that its networks have been breached in what is considered the first cyber attack to hit Japan’s defense industry. According to …

Data mapping and masking requirements

A new study of 3,765 publicly disclosed breach incidents shows they resulted in financial losses of more than $156 billion. Published by the Digital Forensics Association, the …

Vending machine company breach results in massive credit card data theft

Credit and debit card data of some 40,000 people who visited the Wilderness Resorts water parks in Wisconsin and Tennessee from December 12, 2008 to May 25, 2011 has been …

Facebook tool automates syphoning of user data

A group of security researchers has developed a proof-of-concept Java-based tool that could allow malicious individuals to automatize the syphoning of information from a …

Bogus “last words” Facebook app offer leads to malware

Humans have many impulses and fears, and cyber crooks can be counted on exploiting each and every one of them for achieving their purposes. The latest example of this has been …

Akamai insider pleads guilty to foreign economic espionage

A former Akamai employee has been accused of and has pleaded guilty to having passed on confidential information regarding the company to a man he believed was a Israeli …

Don't miss

Cybersecurity news