An anonymous social network in the making?
Spurred by blocked accounts of Anonymous members and activists on various popular social networks such as Facebook, Twitter, and (recently) Google+, a group apparently loosely …
Verizon takes on issue of stolen credentials
Unauthorized access to corporate networks through stolen user names and passwords topped 45 percent in 2010, making credentials the second most compromised data type, …
Law enforcement supports new U.S. data retention bill
A new proposal for a U.S. federal law that would compel ISPs to retain logs regarding their customers for 18 months is currently being discussed in the House of …
Credit card numbers stolen in Kiplinger breach
Kiplinger Washington Editors – the publisher of well-known business and economic publications such as the The Kiplinger Letter and the Kiplinger’s Personal Finance …
Travelers left 11,000 mobile devices at U.S. airports
Travelers left behind more than 11,000 laptops, tablet PCs, smartphones and USB sticks in airports in the United States during the past year. Credant was able to gather survey …
Why Dropbox’s security changes are going to improve cloud computing
On July 1, Dropbox announced a revision to its terms of service, privacy policy and security overview document. While the intention of the update was to make Dropbox’s …
Anonymous releases 90,000 military emails and passwords
Anonymous persists with its AntiSec campaign and the latest target to fall has been Booz Allen Hamilton, one of the biggest U.S. military contractors. According to the …
140,000 children could be identity fraud victims
For most people, the thought of their children being victims of identity fraud is even more chilling than being a victim themselves. While children are less at risk for …
U.S. to consider a new, secure Internet
While Iran thinks about instituting a national Internet in order to minimize the “poisoning” of Iranian minds with Western ideas and culture, the U.S. is toying …
Security threats: Unwrapping 2011
2011 has been a busy year so far for cyber criminals. No one can say IT security incidents went under reported, they have certainly been prominent in the headlines. HBGary …
45 million U.S. individuals manipulate their identities
When does a little white lie become fraud? An estimated 45 million people in the U.S. have deliberately manipulated their identities in applications for credit, cell phone …
Gannett Government Media user information stolen
The Gannett Government Media family of websites suffered a cyber attack on resulting in unauthorized access to files containing user information. The information in those …
Don't miss
- Preparing financial institutions for the next generation of cyber threats
- SEC and FCA fines: Issues jump
- Europeans targeted with new Tor-using backdoor and infostealers
- Apple zero-day vulnerability exploited to target iPhone users (CVE-2025-24085)
- BloodyAD: Open-source Active Directory privilege escalation framework