Archive for the ‘Security’ Category

Snowden Leaks Reveal NSA’s Encryption-Bypassing Efforts

Snowden Leaks Reveal NSA’s Encryption-Bypassing Efforts

The revelations made through the documents leaked by Edward Snowden continue. A fresh batch of documents now shows that NSA has been working with IT companies, security research firms and other stakeholders in order to bypass and and all forms of encryption that are popularly used on the web.

By On September 7, 2013 Respond
Add To Bookmark Add To Readlist  
Pentagon Was Improving Domain Security When SEA Struck Marines Site

Pentagon Was Improving Domain Security When SEA Struck Marines Site

Recently, Syrian Electronic Army made headlines yet again when it targeted the U.S. marines site and redirected its visitors to a web page of its own. It has now transpired that Pentagon was in the process of improving the security of its domains when this took place.

By On September 4, 2013 1 Response
Add To Bookmark Add To Readlist  
Syrian Electronic Army Hacks Site Of US Marines

Syrian Electronic Army Hacks Site Of US Marines

In the past, a number of successful cyber attacks have been blamed on Syrian Electronic Army (SEA), a group of pro-Assad hackers. With the US at the advent of entering the Syrian war, SEA has now hacked and defaced the site of US Marines, calling on the marines to disobey their orders if they are asked to attack Syria.

By On September 3, 2013 1 Response
Add To Bookmark Add To Readlist  
Pinterest Becomes Inaccessible For Many Users

Pinterest Becomes Inaccessible For Many Users

Pinterest is one of the fastest-growing social networks which has a deep emphasis on visual presentation of content and is actively used by most brands. The social network recently became unavailable for many users, apparently due to a technical glitch.

By On September 2, 2013 Respond
Add To Bookmark Add To Readlist  
Facebook Vulnerability Allowed Hacker To Delete Any Photo

Facebook Vulnerability Allowed Hacker To Delete Any Photo

Facebook vulnerabilities are nothing new but they are always significant all the same. This time, an Indian security researcher has unearthed a critical vulnerability in the social network. By exploiting the vulnerability, any hacker could easily delete any Facebook image.

By On September 2, 2013 Respond
Add To Bookmark Add To Readlist  
Lockbox Ventures To Create An NSA-Proof Cloud Storage Service

Lockbox Ventures To Create An NSA-Proof Cloud Storage Service

Lockbox is a tech startup that was launched back in 2008. Since then, the company has been working on creating a highly secure cloud service of its own. With the recent $2.5 million seed funding it has received, the startup is all set to create a cloud service which will essentially be NSA-proof.

By On September 2, 2013 Respond
Add To Bookmark Add To Readlist  
Edward Snowden Leaked: NSA Spied On Al Jazeera To Gather Intelligence

Edward Snowden Leaked: NSA Spied On Al Jazeera To Gather Intelligence

Although the most explosive phase of Snowden leaks has passed, they continue to offer insight in many, varied operations of NSA. German paper, Der Spiegel, has now reported that according to another document obtained by Edward Snowden, NSA spied on the communications of Al Jazeera.

By On September 1, 2013 Respond
Add To Bookmark Add To Readlist  
Cisco Patches Critical Vulnerability That Could Compromise Windows Systems

Cisco Patches Critical Vulnerability That Could Compromise Windows Systems

Cisco, being one of the major players in the networking hardware arena, has to be very focused on the security of its devices. The company has recently patched a critical vulnerability which, if left unattended, allowed a hacker to gain control of a machine running Windows.

By On September 1, 2013 Respond
Add To Bookmark Add To Readlist  
Details Of Cyber Offensives Launched By U.S. Security Agencies Revealed

Details Of Cyber Offensives Launched By U.S. Security Agencies Revealed

In the past, it has been frequently hinted that the U.S. was behind some of the most sophisticated cyber warfare tools such as Stuxnet and Flame. Whereas U.S. has officially denied it, Washington Post has now published a report, citing Snowden as a source, which claims that U.S. security agencies launch a large number of cyber offensives each year.

By On September 1, 2013 Respond
Add To Bookmark Add To Readlist  
U.S. Intelligence Spends 1/5th Of Its Budget On Cryptanalysis

U.S. Intelligence Spends 1/5th Of Its Budget On Cryptanalysis

Cryptography is a very important security tool in the modern-day digital world. In fact, it is the bedrock of secure communications today. Not surprisingly, leaked budget details now suggest that the U.S. intelligence community spends 1/5th of its budget on ‘groundbreaking’ cryptanalysis.

By On August 31, 2013 Respond
Add To Bookmark Add To Readlist  
Hacker Redirects Syrian Telecom Site To AT&T, T-Mobile

Hacker Redirects Syrian Telecom Site To AT&T, T-Mobile

We have recently seen many instances where hackers were successfully able to redirect users visiting popular sites to other pages. Syrian Electronic Army has deployed this tactic towards New York Times in recent days. On Wednesday, a hacker was able to redirect the site of a Syrian telecom provider to that of AT&T and then T-Mobile.

By On August 29, 2013 Respond
Add To Bookmark Add To Readlist  
Syrian Electronic Army Allegedly Takes Down New York Times For 20 Hours

Syrian Electronic Army Allegedly Takes Down New York Times For 20 Hours

The website of New York Times has run into a number of problems in recent times. Many groups of hackers have tried to take down the site or hack it for other nefarious purposes. The site was recently taken down, yet again, on Tuesday and the outage continued well into Wednesday.

By On August 29, 2013 Respond
Add To Bookmark Add To Readlist  
Cyberattack On NYT Was Launched Through A Melbourne IT Account

Cyberattack On NYT Was Launched Through A Melbourne IT Account

Hackers recently made yet another attempt at New York Times site. This time, they undertook the elaborate method of going to NYT’s domain registrar, the Melbourne IT, and somehow getting access to one of its accounts. This account was then used to launch a cyberattack at the NYT site.

By On August 28, 2013 Respond
Add To Bookmark Add To Readlist  
Hackers Deface Google Palestine Site

Hackers Deface Google Palestine Site

Since Google’s localized versions normally garner the highest amounts of traffic, they are the primary targets of different hackers. The localized Palestinian site of Google was recently defaced by hackers who were apparently ‘trying’ to put out a political message.

By On August 27, 2013 Respond
Add To Bookmark Add To Readlist  
70 Million User Accounts Exposed Due To Pinterest Exploit

70 Million User Accounts Exposed Due To Pinterest Exploit

In the recent past, we have seen that many social networks have been struggling with hacks and leaks which allow access to information about user accounts. It now seems that Pinterest has finally made the list. Dan Melamed found a critical vulnerability in the social network which would allow a potential hacker to view the emails of millions of users.

By On August 26, 2013 Respond
Add To Bookmark Add To Readlist  
Topic List
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook