Category Archives: Hackers
The Chinese cyberattack group Deep Panda has compromised national security think tanks using sophisticated techniques designed to steal confidential data concerning US foreign policy, according to security researchers at CrowdStrike.
What happens when a computer is infected with the malicious software, and what should you do to protect your files? Cryptolocker is back in the headlines, thanks to a coordinated effort to take down the computers and criminals that run … Continue reading
In a rare move, US Computer Emergency Readiness Team says to stop using Internet Explorer until Microsoft can plug a critical security hole.
It looks like hackers have hit Basecamp with a distributed denial-of-service (DDoS) attack and are demanding that the company pay a ransom.
Computer scientists have developed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when infected machines have no network connection.
Over the past several weeks, a handful of frantic Microsoft Windows users have written in to ask what they might do to recover from PC infections from “CryptoLocker,” the generic name for an increasingly prevalent and nasty strain of malicious … Continue reading
Adobe has worked with Apple to sandbox Flash Player under Safari in Mac OS X, restricting the ability of attackers to exploit any vulnerabilities they might find in the browser plug-in.
US and UK intelligence have reportedly cracked the encryption codes protecting the emails, banking and medical records of hundreds of millions of people.
The website for a hacker group calling itself the “Syrian Electronic Army” was taken offline by an Internet body following claims that the hackers had disrupted several major news websites, including the New York Times’ website, the Huffington Post, and … Continue reading
Security researchers tonight are poring over a piece of malicious software that takes advantage of a Firefox security vulnerability to identify some users of the privacy-protecting Tor anonymity network.