4 August, 2015

Researcher explores tips and tricks for Web and mobile hacking – CSO Online


CSO Online
Researcher explores tips and tricks for Web and mobile hacking
CSO Online
LAS VEGAS – Bounty programs are becoming quite popular. Since 2014, the number of researchers taking part in a growing number of bounty programs has continued to climb. At the same time, the task at hand isn't easy, and researchers come with different …

Source: hacking – Google News

Filed under Blog by

From Car-Jacking To Car-Hacking: How Vehicles Became Targets For Cybercriminals – Bloomberg


Bloomberg
From Car-Jacking To Car-Hacking: How Vehicles Became Targets For Cybercriminals
Bloomberg
A recent Jeep Cherokee cyber-attack saw hackers remotely take control of a car's steering and brakes while it was on a motorway. That put cybersecurity at the top of carmakers' agendas. It was a controlled experiment carried out by two "white hat

and more »

Source: hacking – Google News

Filed under Blog by

3 August, 2015

Southeastern Minnesota site among Chinese hacking victims – Post-Bulletin


Post-Bulletin
Southeastern Minnesota site among Chinese hacking victims
Post-Bulletin
This secret NSA map of over 600 successful hacking incidents by Chinese hackers was obtained by NBC News. A dot can clearly be seen in the southeast Minnesota region, roughly around where Winona is located. But the map did not come with a list of …

and more »

Source: hacking – Google News

Filed under Blog by

Indiana software company reports 3.9 million people were exposed to hacking – WSLS


WSLS
Indiana software company reports 3.9 million people were exposed to hacking
WSLS
The company said the people affected by the hack includes patients of Texas-based Concentra, which operates more than 300 medical centers in 38 states; Franciscan St. Francis Health Indianapolis; and Rochester Medical Group in the Detroit area.
The Real Deal: New Guidelines to Protect Against Medical HackingWRGB
Data of 4 Million Patients Lost in MIE HackingSoftpedia News

all 89 news articles »

Source: hacking – Google News

Filed under Blog by

Hacking Diversity In Tech By Emphasizing Retention – TechCrunch


TechCrunch
Hacking Diversity In Tech By Emphasizing Retention
TechCrunch
Conversations around diversity in tech often focus on the “pipeline” and getting more people from underrepresented groups through the door. But that's just a first step. The next, most critical step is retention. There's no point in a company using its

Source: hacking – Google News

Filed under Blog by

IT worker gets 10 years for hacking military email – Washington Times


Washington Times
IT worker gets 10 years for hacking military email
Washington Times
A Florida man contracted to perform IT work for the Pentagon has been sentenced to 10 years in prison after pleading guilty to crimes connected to the hacking of a military email account and theft of sensitive files. U.S. District Judge Kenneth Marra

and more »

Source: hacking – Google News

Filed under Blog by

Hacking Team Leaks Confirm What Arab Privacy Advocates Already Knew – EFF


EFF
Hacking Team Leaks Confirm What Arab Privacy Advocates Already Knew
EFF
While the University of Toronto's Citizen Lab had previously unearthed the sale of Hacking Team tools to some countries in the region, the leaks showed that the company's reach is farther than previously imagined: Lebanon, Tunisia, Morocco, Egypt, Oman

and more »

Source: hacking – Google News

Filed under Blog by

Survey exposes consumer fears about car hacking – CNET


CNET
Survey exposes consumer fears about car hacking
CNET
The study's results show that 71 percent of respondents are aware of the Jeep Cherokee hacking revealed last month by Wired, an incident that triggered the recall of over 1.4 million cars and trucks. The study also notes that more than three-quarters

Source: hacking – Google News

Filed under Blog by

Hacking Trump: Can we not label web vandalism as ‘terrorism’, please? – The Register


The Register
Hacking Trump: Can we not label web vandalism as 'terrorism', please?
The Register
Sysadmin Blog American politics are something of a national sport in Canada. No matter who runs for either side, Canadians throw popcorn at the screen and try to pretend our choices are any better. We debate the relative merits of the boob tube's

and more »

Source: hacking – Google News

Filed under Blog by

What is Growth Hacking and Why Should You Care? – Business 2 Community

What is Growth Hacking and Why Should You Care?
Business 2 Community
Many marketers are turning to growth hacking. The business world has been buzzing about it since Sean Ellis coined the term in 2010. As he put it, “A Growth Hacker is someone whose true North is Growth.” He presented the concept of getting scrappy and …

Source: hacking – Google News

Filed under Blog by

Millions of Americans Use Medical Devices That May Be Vulnerable to Hacking – KQED

Millions of Americans Use Medical Devices That May Be Vulnerable to Hacking
KQED
These pumps are not the only medical devices vulnerable to hacking. More than 10 million Americans rely on devices like pacemakers and insulin pumps. If you are a fan of the Showtime television series Homeland, you may remember an episode where …

Source: hacking – Google News

Filed under Blog by

Millions of Americans Use Medical Devices That May Be Vulnerable to Hacking – KQED

Millions of Americans Use Medical Devices That May Be Vulnerable to Hacking
KQED
These pumps are not the only medical devices vulnerable to hacking. More than 10 million Americans rely on devices like pacemakers and insulin pumps. If you are a fan of the Showtime television series Homeland, you may remember an episode where …

Source: hacking – Google News

Filed under Blog by

Hacking the Digital and Social System – Hackaday


Hackaday
Hacking the Digital and Social System
Hackaday
When you live in a totalitarian, controlled and “happy” society, and you want to be a hacker, you have to hack the social system first. Being just an engineer doesn't cut it, you have to be a hypocrite, dissident and a smuggler at the same time. That's

Source: hacking – Google News

Filed under Blog by

What Other Cars Are Vulnerable To Hacking? – Jalopnik


Jalopnik
What Other Cars Are Vulnerable To Hacking?
Jalopnik
Expect car hacking to be the next big thing to be scared of in the auto industry. Following the remote seizure of a new Jeep Cherokee by two white hat hackers, Fiat Chrysler ordered a recall of 1.4 million vehicles to fix the vulnerability, which

and more »

Source: hacking – Google News

Filed under Blog by

Tech: Hacking back at China, crunch time for cyber bill – Washington Post


New York Times
Tech: Hacking back at China, crunch time for cyber bill
Washington Post
The Obama administration has decided to retaliate against China for stealing personal information of more than 20 million people from the Office of Personnel Management. “The decision came after the administration concluded that the hacking attack was
US Decides to Retaliate Against China's HackingNew York Times
US exploring ways to strike back against China hacking, says New York TimesThe Verge
US should think twice before retaliating against China over unfounded hacking Xinhua
Techworm -Engadget
all 38 news articles »

Source: hacking – Google News

Filed under Blog by

Car Hacking Risk Could Be More Widespread – Insurance Journal


Independent Online
Car Hacking Risk Could Be More Widespread
Insurance Journal
The potential raises the possibility of more automaker recalls over hacking vulnerabilities, an issue that has grabbed the attention of regulators, lawmakers and the public. On Thursday, a researcher warned that hackers could exploit a security flaw in
Car hacking risk may be broaderIndependent Online
The hacking-related recall at Fiat-Chrysler could spread to other automakersBusiness Insider
NHTSA begins investigation on Fiat Chrysler's recent Jeep recall to block hackingThe Next Digit
Post-Bulletin
all 290 news articles »

Source: hacking – Google News

Filed under Blog by

Citing hacking risk, FDA says Hospira pump shouldn’t be used – CNBC


CNBC
Citing hacking risk, FDA says Hospira pump shouldn't be used
CNBC
The federal government says health care facilities should stop using Hospira's Symbiq medication infusion pump because of its vulnerability to hacking. The Food and Drug Administration said Friday it's the first time it has warned caregivers to stop

and more »

Source: hacking – Google News

Filed under Blog by

Phone-hacking hits pre-tax profits at Trinity Mirror as newspaper ad revenues … – CampaignLive


CampaignLive
Phone-hacking hits pre-tax profits at Trinity Mirror as newspaper ad revenues
CampaignLive
According to its half-year financial results for 2015, published this morning, Trinity Mirror made a pre-tax profit of £12.1 million, down 76.0 per cent after it put aside £16.0 million to compensate victims of phone hacking. Trinity Mirror's pre-tax
Trinity Mirror profits slip due to print ad slump and phone-hacking costsThe Guardian

all 19 news articles »

Source: hacking – Google News

Filed under Blog by

Italian software firm offered to sell hacking software to Japanese officials – The Japan Times

Italian software firm offered to sell hacking software to Japanese officials
The Japan Times
South Korea's intelligence agency, after being grilled by opposition lawmakers, acknowledged that it purchased the firm's hacking software in 2012. The agency said the software was intended to be used in preparation for a cyberwar against North Korea

Source: hacking – Google News

Filed under Blog by

Car hacking risk may be broader – Independent Online


Independent Online
Car hacking risk may be broader
Independent Online
In the first action of its kind for the motor industry, Fiat Chrysler last week announced the recall 1.4 million US vehicles to install software to prevent hackers from gaining remote control of the engine, steering and other systems. The announcement
US regulator says hacking risk may be broader than Fiat ChryslerVentureBeat
Government investigating Harman car radios following Fiat Chrysler hacking recallFox Business
NHTSA begins investigation on Fiat Chrysler's recent Jeep recall to block hackingThe Next Digit
Business Insider -Post-Bulletin
all 257 news articles »

Source: hacking – Google News

Filed under Blog by

Trinity Mirror profits slip due to print ad slump and phone-hacking costs – The Guardian


The Guardian
Trinity Mirror profits slip due to print ad slump and phone-hacking costs
The Guardian
Profits at Trinity Mirror fell to £12.1m during the first six months of 2015 as it faced a print advertising slump and the costs of covering payments to victims of phone hacking. Excluding the impact of the phone-hacking costs, which Trinity has put

and more »

Source: hacking – Google News

Filed under Blog by

Investigation – Nigerian Hacking Governors Forum: Amaechi, Akpabio, Uduaghan … – AllAfrica.com

Investigation – Nigerian Hacking Governors Forum: Amaechi, Akpabio, Uduaghan
AllAfrica.com
The governor of Bayelsa state, Seriake Dickson, is not the only politician hacking phones and intercepting communication of political peers and rivals in Nigeria. Almost all recent governors of the South South region of Nigeria intercepted calls and

Source: hacking – Google News

Filed under Blog by

Data of 4 Million Patients Lost in MIE Hacking – Softpedia News


Softpedia News
Data of 4 Million Patients Lost in MIE Hacking
Softpedia News
Indiana Attorney General Greg Zoeller has started an investigation in the hacking of Medical Informatics Engineering (MIE) and its subsidiary NoMoreClipboard, both Indiana-based companies that provide data administration services for hospitals and

and more »

Source: hacking – Google News

Filed under Blog by

DDoS as a service: the monetisation of hacking – Memeburn


Memeburn
DDoS as a service: the monetisation of hacking
Memeburn
Botnets are created when a single hacker uses malware to infect other computers to gain control of them. While a single computer is only capable of sending so many requests at a time, controlling multiple computers exponentially increases the volume of …

Source: hacking – Google News

Filed under Blog by

Smart Gadgets From Guns to Cars Ripe for Hacking – NDTV


NDTV
Smart Gadgets From Guns to Cars Ripe for Hacking
NDTV
This is among the hot topics at a Black Hat computer security conference that kicks off in Las Vegas on Sunday and an infamous Def Con hacker gathering that follows. Early glimpses have been provided of scheduled presentations about how to commandeer …
Chrysler offers hacking fixPhilly.com
Smart gadgets ripe for hackingThe Australian

all 25 news articles »

Source: hacking – Google News

Filed under Blog by