You Are Here: Home » Posts tagged "cyber-attack"

Linux, OS X Users May Be Vulnerable to Bash Flaw Exploit

A bug discovered in Bash Shell, a command-line interface used by Linux and Unix, could leave web servers, systems and embedded devices such as routers vulnerable to cyber-attacks. Cyber-criminals are getting ready to launch multiple attacks, and Bitdefender warns users and sys admins to be cautious with the vulnerability.  Although code allowing the exploit of Bash-using CGI scripts is already available on ...

Brazil FIFA World Cup Threatened by Massive Cyber-Attack

The Brazil FIFA World Cup is threatened by a massive cyber-attack that could breach websites and lead to data theft, according to the BBC. Brazilian hackers are threatening to disrupt the football event that has already been hut by protests, delays and overspending. Several self-proclaimed Anonymous members told Reuters they will mainly hack websites of official organizations and companies sponsoring the Br...

Snapchat Points Fingers at Gibson Security for Helping Hackers

Snapchat, headed by 23-year old founder Evan Spiegel, is accusing Gibson Security of indirectly helping hackers breach the Snapchat data base. More than 4.6 million usernames and phone numbers were leaked on New Year’s Eve after anonymous hackers dubbed ‘Snapchat DB’ abused the application’s Find Friends service. No other personal details, including messages known as Snaps, were leaked or accessed in the at...

L.A. Gay & Lesbian Center Targeted by Cyber Criminals

The Gay & Lesbian Center Information System in Los Angeles was hacked, leaving clients’ personal and financial information vulnerable to cyber thieves, according to a press release. Some 59,000 English and Spanish speakers had their names, contact information, credit cards details, social security numbers and birthdates exposed to identity thieves during a two-month “sophisticated cyber-attack” in Septe...

Hackers Target Mining Companies to Steal Data, Study Shows

Hackers are increasingly targeting mining companies to steal confidential data and disrupt their operations, according to Ernst & Young. The company ran a study that showed almost half of the mining companies surveyed are exposed to hacking. The explanation behind the rising number of external threats and cyber-attacks is that the metals industry is becoming more dependent on Internet-connected systems ...

Heartbeats Could be Used as Passwords to Secure Medical Devices

Heartbeats could soon be used as passwords to increase the security of medical devices vulnerable to cyber-attack, according to research by the Rice University. The paper shows that implanted medical devices shouldn’t be secured as Wi-Fi routers are, as the system would prevent medical staff from quickly accessing the information. The innovative system dubbed “Heart-to-Heart (H2H)” would rely on an external...

Cyber-Attacks on US Oil and Gas Companies May Impact the American Economy

Attacks on oil and gas industry could have grave repercussions in the real-world markets and people might even feel ripple effects at the pump, a recent Council on Foreign Relations report shows. Considering the cyber incidents against US oil companies including Saudi Aramco, Qatar RasGas, and Chevron, in the past couple of years, a recent Council on Foreign Relations report points out that online attacks o...

Twitter Accounts Hijacked after Mauritania Hacker Leaked Database

Cyber-crooks started to exploit the database recently leaked by a Mauritania hacker and filled with juicy Twitter details. Several HotForSecurity readers saw their accounts compromised and pushing spammy content without knowing it. The Islamist hacker from Mauritania leaked more than 15,000 account details last week on a file-sharing service. Soon after, users complained their Twitter account had been hijac...

US National Security Agency to Defend Against Cyber-Attacks from Military in Friendly Competition

Students from various US military academies will tackle the US National Security Agency in a friendly competition hosted by Lockheed Martin to simulate real-life hacking scenarios that affect government or private networks. The Cyber Defense Exercise (CDX) enables students to train under simulated attack conditions to build experience and prepare for actual scenarios. Saying that practice is vital for train...

Security Researcher Hacks Flight System to Control a Jet

A security researcher managed to “hijack” a flight deck system and change a plane’s course in a hacking skill demonstration, according to the BBC. Hugo Teso, an authorized pilot, gave the aviation computer systems new navigation instructions. He then gained total control of the simulated jet he had built using spare parts bought from eBay. “I expected them to have security issues but I did not expect them t...

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top