You Are Here: Home » Articles posted by Liviu Arsene

Details on 87 Million Mexican Voters Available Online

The addresses of 87 million Mexican voters were recently accessible online to anyone with an internet connection -- all without authentication or protection by security mechanisms. Texan whistleblower Chris Vickery informed Mexican authorities of his findings, stating that the information could be used by criminals. While the information was available via AWS (Amazon Web Services), the company’s website doe...

57 Months in Prison for US State Department Sextortionist

US District Judge Eleanor Ross sentenced former US State Department official Michael Ford to 57 months in prison after he pleaded guilty to nine counts of cyberstalking, one of wire fraud, and seven of hacking and extortion. The 36 year-old admitted to widespread sextortion and cyberhacking between January 2013 and May 2015, succeeding in hacking 450 email accounts and 200 social media profiles. He operated...

Chinese Businessman Jailed for Stealing U.S. Military Secrets

Chinese businessman Su Bin admitted to stealing U.S. military secrets and exporting them to the communist nation between 2008 and 2014, with the help of two unnamed hackers. The stolen information was mostly about the military F-22s, F-35 and Boeing's C-17 cargo aircraft. It was apparently translated into Chinese by the 50-year-old businessman and delivered to his contacts. Arrested in July 2014 in Canada a...

Cybercriminals used in State-Sponsored Attacks, says U.S. Cyber Command

Hackers are believed to be working with foreign governments to take down U.S. infrastructure or break into U.S. computer systems, according to a Cyber Command statement to the members of Congress. Adm. Michael S. Rogers, head of U.S. Cyber command, believes criminals groups are being used to conduct cybercriminal activities against the United States on behalf of foreign governments, allowing state-sponsors...

Threat Intelligence Sharing Act Kick-Started by US Homeland Security

Following the US Cybersecurity Information Sharing Act of 2015 passed by Congress and signed by President Obama, the Department of Homeland Security started sharing threat intelligence with businesses. While companies can voluntarily adhere to the program and start sharing threat intelligence with the DHS, the program counts on the continuous cooperation of as many companies as possible. So far, six organiz...

FBI Warns of Vehicle Hacking

The US Federal Bureau of Investigation issued a warning about the vulnerability of “smart” cars to hacking attacks, stressing that manufacturers should carefully integrate new on-board systems that could allow attackers to remotely control critical vehicle functions. “Vehicle hacking occurs when someone with a computer seeks to gain unauthorized access to vehicle systems for the purposes of retrieving drive...

Bitdefender Mobile Security Ready for Android 6

With Android 6.0 - known as Marshmallow to die-hard fans - rolling out on devices, Google has pushed some significant new features in terms of user experience and “under the hood” changes. Bitdefender Mobile Security has been updated to reflect the new visual standards – material design – and fall in line with the two new permission groups. However, we’ve also added some new features, such as Bitdefender Ce...

Google Doubles Bounty for Chromebook Bugs

Google doubled the bug bounty program for finding and disclosing Chromebook or Chromebox vulnerabilities to $100,000, from the previous reward of $50,000. The two challenges for researchers who want to claim the prize involve either compromising a Chromebook in guest mode, or bypassing the Download Protection feature from Chrome’s Safe Browsing option. The six-figure sum is said to be available all year rou...

Porn Clicker Malware Nesting in Google Play

It’s not the first time Android’s Google Play has been found harboring a malicious application that both hides its presence and performs activities that generate some form of revenue for the attacker. Last year we not only saw the proliferation of aggressive adware, but also some new CAPTCHA-bypassing threats that subscribed users to a premium-rated number, both hosted in Google Official marketplace. A new...

“Hack the Pentagon” Competition Aims to Boost US DoD Security

Pentagon officials recently announced a “Hack the Pentagon” competition aimed at vetted experts to help the U.S. Defense Department identify vulnerabilities in its websites and boost their security in the process. While such “bug bounty” programs are common for large companies, it’s rare that the Department of Defense asks private sector security experts – white hackers – to come forward in a competition-li...

© 2012 Powered By Bitdefender

Scroll to top