Thursday, August 16, 2012

Security News Headlines - Yahoo! News

Security News Headlines - Yahoo! Newshttp://news.yahoo.com/security/ Get the latest security news headlines from Yahoo! News. Find breaking security news, including analysis and opinion on top security stories, photos and more.en-USCopyright (c) 2012 Yahoo! Inc. All rights reservedWed, 15 Aug 2012 16:20:36 -04005Security News Headlines - Yahoo! Newshttp://news.yahoo.com/security/ http://l.yimg.com/a/i/us/nws/th/main_142c.gifFormer Hacker: Today's Hacks Are All About the Money<p><a href="http://news.yahoo.com/former-hacker-todays-hacks-money-202036248.html"><img src="http://l3.yimg.com/bt/api/res/1.2/eXa1qRv4a9_.YBn5IapOaw--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/virus-malware-death-skull-600-275x171.jpg" width="130" height="86" alt="Former Hacker: Today&#039;s Hacks Are All About the Money" align="left" title="Former Hacker: Today&#039;s Hacks Are All About the Money" border="0" /></a>Hackers have changed since the days of The Matrix. While most hackers used to hold iconoclastic ideals, with aspirations to &quot;shock the system&quot; for a perceived common good, today&#039;s hacker/cracker community is more concerned with making a quick buck.</p><br clear="all"/>http://news.yahoo.com/former-hacker-todays-hacks-money-202036248.htmlWed, 15 Aug 2012 16:20:36 -0400Mashableformer-hacker-todays-hacks-money-202036248<p><a href="http://news.yahoo.com/former-hacker-todays-hacks-money-202036248.html"><img src="http://l3.yimg.com/bt/api/res/1.2/eXa1qRv4a9_.YBn5IapOaw--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/virus-malware-death-skull-600-275x171.jpg" width="130" height="86" alt="Former Hacker: Today&#039;s Hacks Are All About the Money" align="left" title="Former Hacker: Today&#039;s Hacks Are All About the Money" border="0" /></a>Hackers have changed since the days of The Matrix. While most hackers used to hold iconoclastic ideals, with aspirations to &quot;shock the system&quot; for a perceived common good, today&#039;s hacker/cracker community is more concerned with making a quick buck.</p><br clear="all"/>Reuters blog platform hacked for 2nd timeThe Reuters news agency says hackers have broken into one of its websites for the second time in two weeks and posted a false story saying Saudi Arabia's foreign minister had died.http://news.yahoo.com/reuters-blog-platform-hacked-2nd-time-141645615--finance.htmlWed, 15 Aug 2012 10:16:45 -0400Associated Pressreuters-blog-platform-hacked-2nd-time-141645615--financeWikiLeaks Resumes Operations After Massive Cyberattack<p><a href="http://news.yahoo.com/wikileaks-resumes-operations-massive-cyberattack-111711962.html"><img src="http://l1.yimg.com/bt/api/res/1.2/D5G9OwqsUUWN3OJti7Hs0g--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/assange600.jpg" width="130" height="86" alt="WikiLeaks Resumes Operations After Massive Cyberattack" align="left" title="WikiLeaks Resumes Operations After Massive Cyberattack" border="0" /></a>WikiLeaks is back online Tuesday morning following more than a week&#039;s worth of massive Distributed Denial of Service (DDoS) attacks on its servers.</p><br clear="all"/>http://news.yahoo.com/wikileaks-resumes-operations-massive-cyberattack-111711962.htmlTue, 14 Aug 2012 07:17:11 -0400Mashablewikileaks-resumes-operations-massive-cyberattack-111711962<p><a href="http://news.yahoo.com/wikileaks-resumes-operations-massive-cyberattack-111711962.html"><img src="http://l1.yimg.com/bt/api/res/1.2/D5G9OwqsUUWN3OJti7Hs0g--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/assange600.jpg" width="130" height="86" alt="WikiLeaks Resumes Operations After Massive Cyberattack" align="left" title="WikiLeaks Resumes Operations After Massive Cyberattack" border="0" /></a>WikiLeaks is back online Tuesday morning following more than a week&#039;s worth of massive Distributed Denial of Service (DDoS) attacks on its servers.</p><br clear="all"/>WikiLeaks says its site has suffered weeklong denial-of-service attackLONDON - The secret-busting organization WikiLeaks says it's been the victim of a sustained denial-of-service attack which has left its website sluggish or inaccessible for more than a week.http://news.yahoo.com/wikileaks-says-suffered-weeklong-denial-attack-120742016.htmlSun, 12 Aug 2012 08:07:42 -0400Associated Presswikileaks-says-suffered-weeklong-denial-attack-120742016WikiLeaks: Our site's been hit by weeklong attackThe secret-busting organization WikiLeaks says it's been the victim of a sustained denial-of-service attack which has left its website sluggish or inaccessible for more than a week.http://news.yahoo.com/wikileaks-sites-hit-weeklong-attack-114424932--finance.htmlSun, 12 Aug 2012 07:43:52 -0400Associated Presswikileaks-sites-hit-weeklong-attack-114424932--financeOnline accounts for Blizzard video games hackedThe maker of video games such as "Diablo" and "World of Warcraft" is warning players that hackers have gained unauthorized access to some online accounts.http://news.yahoo.com/online-accounts-blizzard-video-games-hacked-151630115--finance.htmlFri, 10 Aug 2012 11:16:30 -0400Associated Pressonline-accounts-blizzard-video-games-hacked-151630115--financeVirus found in Mideast can spy on bank transactions<p><a href="http://news.yahoo.com/virus-found-middle-east-spy-finance-transactions-130122369--sector.html"><img src="http://l3.yimg.com/bt/api/res/1.2/pzmLSq2z.KpaPlG0bTOgCA--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/Reuters/2012-08-09T143157Z_1_CBRE87814DC00_RTROPTP_2_CTECH-US-CYBERSECURITY-GAUSS.JPG" width="130" height="86" alt="File photo of Kaspersky Lab CEO and Co-founder Eugene Kaspersky speaking during the Reuters Global Media and Technology Summit in London" align="left" title="File photo of Kaspersky Lab CEO and Co-founder Eugene Kaspersky speaking during the Reuters Global Media and Technology Summit in London" border="0" /></a>BOSTON (Reuters) - A new cyber surveillance virus has been found in the Middle East that can spy on banking transactions and steal login information for social networking sites, email and instant messaging, according to a leading computer security firm, Kaspersky Lab. Dubbed Gauss, the virus may also be capable of attacking critical infrastructure and was very likely built in the same laboratories as Stuxnet, the computer worm widely believed to have been used by the United States and Israel to attack Iran&#039;s nuclear program, Kaspersky Lab said on Thursday. ...</p><br clear="all"/>http://news.yahoo.com/virus-found-middle-east-spy-finance-transactions-130122369--sector.htmlThu, 09 Aug 2012 16:33:32 -0400Reutersvirus-found-middle-east-spy-finance-transactions-130122369--sector<p><a href="http://news.yahoo.com/virus-found-middle-east-spy-finance-transactions-130122369--sector.html"><img src="http://l3.yimg.com/bt/api/res/1.2/pzmLSq2z.KpaPlG0bTOgCA--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/Reuters/2012-08-09T143157Z_1_CBRE87814DC00_RTROPTP_2_CTECH-US-CYBERSECURITY-GAUSS.JPG" width="130" height="86" alt="File photo of Kaspersky Lab CEO and Co-founder Eugene Kaspersky speaking during the Reuters Global Media and Technology Summit in London" align="left" title="File photo of Kaspersky Lab CEO and Co-founder Eugene Kaspersky speaking during the Reuters Global Media and Technology Summit in London" border="0" /></a>BOSTON (Reuters) - A new cyber surveillance virus has been found in the Middle East that can spy on banking transactions and steal login information for social networking sites, email and instant messaging, according to a leading computer security firm, Kaspersky Lab. Dubbed Gauss, the virus may also be capable of attacking critical infrastructure and was very likely built in the same laboratories as Stuxnet, the computer worm widely believed to have been used by the United States and Israel to attack Iran&#039;s nuclear program, Kaspersky Lab said on Thursday. ...</p><br clear="all"/>News Summary: Firm says computer virus in MideastNEW DISCOVERY: A Russian security firm says a new computer virus tied to some of the most sophisticated cyberweapons thus-far discovered has been found circulating in the Middle East. It says the virus is aimed at stealing financial information from customers of a series of Lebanese banks.http://news.yahoo.com/news-summary-firm-says-computer-virus-mideast-201118334--finance.htmlThu, 09 Aug 2012 16:11:18 -0400Associated Pressnews-summary-firm-says-computer-virus-mideast-201118334--financeSecurity firm: New computer virus prowling MideastA new computer virus tied to some of the most sophisticated cyberweapons thus-far discovered has been found circulating in the Middle East, a Moscow-based computer security company said Thursday. If a link were confirmed, the find would expand the electronic arsenal reportedly deployed by the U.S. and Israel against their rivals in the region.http://news.yahoo.com/security-firm-computer-virus-prowling-mideast-200255653.htmlThu, 09 Aug 2012 16:03:20 -0400Associated Presssecurity-firm-computer-virus-prowling-mideast-200255653Kaspersky: We've found new virus linked to StuxnetComputer security firm Kaspersky says it has discovered a new batch of malicious software linked to the infrastructure-wrecking Stuxnet virus.http://news.yahoo.com/kaspersky-weve-found-virus-linked-stuxnet-182321072.htmlThu, 09 Aug 2012 14:23:42 -0400Associated Presskaspersky-weve-found-virus-linked-stuxnet-182321072Factbox: Gauss cyber-spying virus infected PCs in Middle East(Reuters) - A new computer virus, dubbed Gauss, has been discovered in the Middle East. Researchers say can it steal banking credentials and hijack login information for social networking sites, email and instant messaging accounts. Cyber security firm Kaspersky Lab said Gauss is the work of the same "factory" or "factories" that built the Stuxnet worm, which attacked Iran's nuclear program. Here are some key facts about Gauss, according to Kaspersky Lab. Q. What is its purpose? A. Gauss is a surveillance tool. ...http://news.yahoo.com/factbox-gauss-cyber-spying-virus-infected-pcs-middle-152333942--sector.htmlThu, 09 Aug 2012 11:23:33 -0400Reutersfactbox-gauss-cyber-spying-virus-infected-pcs-middle-152333942--sectorHackers Force Apple, Amazon to Change Security Policy<p><a href="http://news.yahoo.com/hackers-force-apple-amazon-change-security-policy-080740108.html"><img src="http://l1.yimg.com/bt/api/res/1.2/2URo8ueFP72rqKLLtdAEbw--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/internetsecurity600.jpg" width="130" height="86" alt="Hackers Force Apple, Amazon to Change Security Policy" align="left" title="Hackers Force Apple, Amazon to Change Security Policy" border="0" /></a>Apple and Amazon are changing their security policies after hackers broke into a journalist&#039;s personal accounts. The change comes following a hack into Wired reporter Mat Honan&#039;s iCloud account, in which perpetrators wiped his iPad, Mac and iPhone.</p><br clear="all"/>http://news.yahoo.com/hackers-force-apple-amazon-change-security-policy-080740108.htmlWed, 08 Aug 2012 04:07:40 -0400Mashablehackers-force-apple-amazon-change-security-policy-080740108<p><a href="http://news.yahoo.com/hackers-force-apple-amazon-change-security-policy-080740108.html"><img src="http://l1.yimg.com/bt/api/res/1.2/2URo8ueFP72rqKLLtdAEbw--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/internetsecurity600.jpg" width="130" height="86" alt="Hackers Force Apple, Amazon to Change Security Policy" align="left" title="Hackers Force Apple, Amazon to Change Security Policy" border="0" /></a>Apple and Amazon are changing their security policies after hackers broke into a journalist&#039;s personal accounts. The change comes following a hack into Wired reporter Mat Honan&#039;s iCloud account, in which perpetrators wiped his iPad, Mac and iPhone.</p><br clear="all"/>Smooth-Talking Hacker Remote-Wipes Reporter's iPad, MacBook<p><a href="http://news.yahoo.com/smooth-talking-hacker-remote-wipes-reporters-ipad-macbook-172437732.html"><img src="http://l2.yimg.com/bt/api/res/1.2/kBFGMP8hl3VTPJtxfWZ.Zw--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/iCloud-Image-640-275x161.jpg" width="130" height="86" alt="Smooth-Talking Hacker Remote-Wipes Reporter&#039;s iPad, MacBook" align="left" title="Smooth-Talking Hacker Remote-Wipes Reporter&#039;s iPad, MacBook" border="0" /></a>We&#039;ve heard it before: Make sure to secure your online accounts with a strong, distinct password to avoid being hacked. But what if hackers can simply circumvent the need for your password to gain access to your information?</p><br clear="all"/>http://news.yahoo.com/smooth-talking-hacker-remote-wipes-reporters-ipad-macbook-172437732.htmlSun, 05 Aug 2012 13:24:37 -0400Mashablesmooth-talking-hacker-remote-wipes-reporters-ipad-macbook-172437732<p><a href="http://news.yahoo.com/smooth-talking-hacker-remote-wipes-reporters-ipad-macbook-172437732.html"><img src="http://l2.yimg.com/bt/api/res/1.2/kBFGMP8hl3VTPJtxfWZ.Zw--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/iCloud-Image-640-275x161.jpg" width="130" height="86" alt="Smooth-Talking Hacker Remote-Wipes Reporter&#039;s iPad, MacBook" align="left" title="Smooth-Talking Hacker Remote-Wipes Reporter&#039;s iPad, MacBook" border="0" /></a>We&#039;ve heard it before: Make sure to secure your online accounts with a strong, distinct password to avoid being hacked. But what if hackers can simply circumvent the need for your password to gain access to your information?</p><br clear="all"/>Hackers hit Reuters, post fake blog on Syria<p><a href="http://news.yahoo.com/hackers-hit-reuters-post-fake-blog-syria-203529863.html"><img src="http://l3.yimg.com/bt/api/res/1.2/qKiKVPOr_ZsFJvL1VO5LEA--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1344026076056-1-0.jpg" width="130" height="86" alt="Hackers took over the blogging platform of the Reuters news agency and posted &quot;fabricated&quot; stories on Syria" align="left" title="Hackers took over the blogging platform of the Reuters news agency and posted &quot;fabricated&quot; stories on Syria" border="0" /></a>Hackers took over the blogging platform of the Reuters news agency and posted &quot;fabricated&quot; stories said to include an interview with a Syrian rebel leader, the company said Friday.</p><br clear="all"/>http://news.yahoo.com/hackers-hit-reuters-post-fake-blog-syria-203529863.htmlFri, 03 Aug 2012 16:35:29 -0400AFPhackers-hit-reuters-post-fake-blog-syria-203529863<p><a href="http://news.yahoo.com/hackers-hit-reuters-post-fake-blog-syria-203529863.html"><img src="http://l3.yimg.com/bt/api/res/1.2/qKiKVPOr_ZsFJvL1VO5LEA--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1344026076056-1-0.jpg" width="130" height="86" alt="Hackers took over the blogging platform of the Reuters news agency and posted &quot;fabricated&quot; stories on Syria" align="left" title="Hackers took over the blogging platform of the Reuters news agency and posted &quot;fabricated&quot; stories on Syria" border="0" /></a>Hackers took over the blogging platform of the Reuters news agency and posted &quot;fabricated&quot; stories said to include an interview with a Syrian rebel leader, the company said Friday.</p><br clear="all"/>Congress halts posting of civilian, military officials' assetsWASHINGTON (Reuters) - In a last-minute act before skipping out on a five-week vacation, the Congress on Thursday temporarily spared thousands of top military officers and civilian government officials from having their financial assets publicly posted -- and exposed to hackers and spies. Had both the House and Senate not acted before leaving town, the financial disclosures for the military and executive branch officials from the Pentagon to the State and Treasury departments would have been posted to agency websites by August 31, thanks to Congress' own inadvertent handiwork. ...http://news.yahoo.com/congress-halts-posting-civilian-military-officials-assets-233611934--finance.htmlThu, 02 Aug 2012 19:36:11 -0400Reuterscongress-halts-posting-civilian-military-officials-assets-233611934--financeHackers hit Major League Baseball teams' Facebook sites(Reuters) - Hackers hit Major League Baseball teams' Facebook pages with phony postings on Thursday, including an announcement that New York Yankees star Derek Jeter would undergo sex change surgery, the sports site Deadspin reported. "He promises to come back stronger than ever in 2013 as Minnie Mantlez," said a posting that was quickly removed from the Yankees' page. Hall of Famer Mickey Mantle was a Yankees' slugger in the 1950s and 1960s. The Miami Marlins' page falsely announced a pit bull giveaway. The animal is banned in Miami-Dade County. ...http://news.yahoo.com/hackers-hit-major-league-baseball-teams-facebook-sites-233342268--sector.htmlThu, 02 Aug 2012 19:33:42 -0400Reutershackers-hit-major-league-baseball-teams-facebook-sites-233342268--sectorChina's Huawei responds to US hackers<p><a href="http://news.yahoo.com/chinas-huawei-responds-us-hackers-065924926.html"><img src="http://l2.yimg.com/bt/api/res/1.2/sozcRsBF6v3Qq79O4QY2VA--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/AFP/photo_1343804089439-1-0.jpg" width="130" height="86" alt="Huawei, founded by a former People&#039;s Liberation Army engineer, is battling an image problem" align="left" title="Huawei, founded by a former People&#039;s Liberation Army engineer, is battling an image problem" border="0" /></a>Chinese communications giant Huawei Technologies on Wednesday responded to US hackers&#039; claims that its routers were easily cracked, saying its security strategies were rigorous.</p><br clear="all"/>http://news.yahoo.com/chinas-huawei-responds-us-hackers-065924926.htmlWed, 01 Aug 2012 02:59:24 -0400AFPchinas-huawei-responds-us-hackers-065924926<p><a href="http://news.yahoo.com/chinas-huawei-responds-us-hackers-065924926.html"><img src="http://l2.yimg.com/bt/api/res/1.2/sozcRsBF6v3Qq79O4QY2VA--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/AFP/photo_1343804089439-1-0.jpg" width="130" height="86" alt="Huawei, founded by a former People&#039;s Liberation Army engineer, is battling an image problem" align="left" title="Huawei, founded by a former People&#039;s Liberation Army engineer, is battling an image problem" border="0" /></a>Chinese communications giant Huawei Technologies on Wednesday responded to US hackers&#039; claims that its routers were easily cracked, saying its security strategies were rigorous.</p><br clear="all"/>Def Con hackers go mainstream but still love to partyLAS VEGAS (Reuters) - When Jeff Moss founded the Def Con hackers convention in 1993, he never imagined that two decades on, one of the key speakers at the annual Las Vegas event would be four-star General Keith Alexander, head of the U.S. National Security Agency. Once known as an excuse for computer geeks and social misfits to drink cheap beer, create mischief and party all night Sin City-style, Def Con has transformed itself into a venue where elite and amateur hackers alike debate serious security issues with experts from the public and private sectors. ...http://news.yahoo.com/def-con-hackers-mainstream-still-love-party-151527503--sector.htmlTue, 31 Jul 2012 11:15:27 -0400Reutersdef-con-hackers-mainstream-still-love-party-151527503--sectorHackers topple Huawei routers<p><a href="http://news.yahoo.com/hackers-topple-huawei-routers-031809159.html"><img src="http://l.yimg.com/bt/api/res/1.2/USqyqmFLbspbA7tPwJb3Ow--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1343617847280-1-0.jpg" width="130" height="86" alt="Huawei routers, equipment that connects networks to the Internet, are widely used in Asia, Africa and the Middle East" align="left" title="Huawei routers, equipment that connects networks to the Internet, are widely used in Asia, Africa and the Middle East" border="0" /></a>Hackers at an infamous Def Con gathering were shown how to easily slip into computer networks through some routers made by Chinese electronics colossus Huawei Technologies.</p><br clear="all"/>http://news.yahoo.com/hackers-topple-huawei-routers-031809159.htmlSun, 29 Jul 2012 23:44:47 -0400AFPhackers-topple-huawei-routers-031809159<p><a href="http://news.yahoo.com/hackers-topple-huawei-routers-031809159.html"><img src="http://l.yimg.com/bt/api/res/1.2/USqyqmFLbspbA7tPwJb3Ow--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1343617847280-1-0.jpg" width="130" height="86" alt="Huawei routers, equipment that connects networks to the Internet, are widely used in Asia, Africa and the Middle East" align="left" title="Huawei routers, equipment that connects networks to the Internet, are widely used in Asia, Africa and the Middle East" border="0" /></a>Hackers at an infamous Def Con gathering were shown how to easily slip into computer networks through some routers made by Chinese electronics colossus Huawei Technologies.</p><br clear="all"/>8.7 million mobile customers hacked in S.Korea<p><a href="http://news.yahoo.com/8-7-million-mobile-customers-hacked-korea-062535102.html"><img src="http://l2.yimg.com/bt/api/res/1.2/BKshS_w7QPpd5G46zRHTcw--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/AFP/photo_1343543064528-1-0.jpg" width="130" height="86" alt="Hacking attacks on companies aimed to gain access to personal data of customers is a frequent occurence in S.Korea" align="left" title="Hacking attacks on companies aimed to gain access to personal data of customers is a frequent occurence in S.Korea" border="0" /></a>South Korean police have arrested two hackers who stole personal data of 8.7 million customers of the nation&#039;s second-biggest mobile operator, the company said.</p><br clear="all"/>http://news.yahoo.com/8-7-million-mobile-customers-hacked-korea-062535102.htmlSun, 29 Jul 2012 02:25:35 -0400AFP8-7-million-mobile-customers-hacked-korea-062535102<p><a href="http://news.yahoo.com/8-7-million-mobile-customers-hacked-korea-062535102.html"><img src="http://l2.yimg.com/bt/api/res/1.2/BKshS_w7QPpd5G46zRHTcw--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/AFP/photo_1343543064528-1-0.jpg" width="130" height="86" alt="Hacking attacks on companies aimed to gain access to personal data of customers is a frequent occurence in S.Korea" align="left" title="Hacking attacks on companies aimed to gain access to personal data of customers is a frequent occurence in S.Korea" border="0" /></a>South Korean police have arrested two hackers who stole personal data of 8.7 million customers of the nation&#039;s second-biggest mobile operator, the company said.</p><br clear="all"/>Microsoft pays big to strengthen software defense<p><a href="http://news.yahoo.com/microsoft-pays-big-strengthen-software-defense-202650189.html"><img src="http://l3.yimg.com/bt/api/res/1.2/RSs7.qCbhX2cHj3r.Ii2JA--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1343507166847-1-0.jpg" width="130" height="86" alt="A woman works on her computer at a coffee shop" align="left" title="A woman works on her computer at a coffee shop" border="0" /></a>As hackers from around the world converged on Las Vegas, Microsoft doled out a quarter million dollars in prize money to researchers who found ways to thwart attacks on its software.</p><br clear="all"/>http://news.yahoo.com/microsoft-pays-big-strengthen-software-defense-202650189.htmlSat, 28 Jul 2012 16:26:50 -0400AFPmicrosoft-pays-big-strengthen-software-defense-202650189<p><a href="http://news.yahoo.com/microsoft-pays-big-strengthen-software-defense-202650189.html"><img src="http://l3.yimg.com/bt/api/res/1.2/RSs7.qCbhX2cHj3r.Ii2JA--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1343507166847-1-0.jpg" width="130" height="86" alt="A woman works on her computer at a coffee shop" align="left" title="A woman works on her computer at a coffee shop" border="0" /></a>As hackers from around the world converged on Las Vegas, Microsoft doled out a quarter million dollars in prize money to researchers who found ways to thwart attacks on its software.</p><br clear="all"/>US spy master courts top hackers at Def Con<p><a href="http://news.yahoo.com/us-spy-master-courts-top-hackers-def-con-233520469.html"><img src="http://l1.yimg.com/bt/api/res/1.2/qj802nx3QgQxusyoES4bfA--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1343432025980-1-0.jpg" width="130" height="86" alt="National Security Agency Director Keith Alexander" align="left" title="National Security Agency Director Keith Alexander" border="0" /></a>US spy master Keith Alexander courted hackers at an infamous Def Con gathering rife with software tricksters wary of police and ferociously protective of privacy.</p><br clear="all"/>http://news.yahoo.com/us-spy-master-courts-top-hackers-def-con-233520469.htmlFri, 27 Jul 2012 21:41:31 -0400AFPus-spy-master-courts-top-hackers-def-con-233520469<p><a href="http://news.yahoo.com/us-spy-master-courts-top-hackers-def-con-233520469.html"><img src="http://l1.yimg.com/bt/api/res/1.2/qj802nx3QgQxusyoES4bfA--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1343432025980-1-0.jpg" width="130" height="86" alt="National Security Agency Director Keith Alexander" align="left" title="National Security Agency Director Keith Alexander" border="0" /></a>US spy master Keith Alexander courted hackers at an infamous Def Con gathering rife with software tricksters wary of police and ferociously protective of privacy.</p><br clear="all"/>Spy chief asks hackers to help government secure InternetLAS VEGAS (Reuters) - The head of the government's secretive National Security Agency took the unprecedented step on Friday of asking a convention of unruly hackers to join him in an effort to make the Internet more secure. In a speech to the 20th annual Def Con gathering in Las Vegas, four-star General Keith Alexander stressed common ground between U.S. officials and hackers, telling them privacy must be preserved and that they could help by developing new tools. "You're going to have to come in and help us," Alexander told thousands of attendees. ...http://news.yahoo.com/spy-chief-asks-hackers-help-government-secure-internet-223700809.htmlFri, 27 Jul 2012 18:37:00 -0400Reutersspy-chief-asks-hackers-help-government-secure-internet-223700809Hackers could haunt global air traffic control: researcher<p><a href="http://news.yahoo.com/hackers-could-haunt-global-air-traffic-control-researcher-184607530.html"><img src="http://l3.yimg.com/bt/api/res/1.2/5Vc_yEQhJ9Pc8bUg5uQFrw--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1343414690254-1-0.jpg" width="130" height="86" alt="An air traffic controller monitors flights" align="left" title="An air traffic controller monitors flights" border="0" /></a>Air traffic control software used around the world could be exploited by hackers to unleash squadrons of ghost planes to befuddle those entrusted to keep the skies safe, a security researcher said Thursday.</p><br clear="all"/>http://news.yahoo.com/hackers-could-haunt-global-air-traffic-control-researcher-184607530.htmlFri, 27 Jul 2012 14:46:07 -0400AFPhackers-could-haunt-global-air-traffic-control-researcher-184607530<p><a href="http://news.yahoo.com/hackers-could-haunt-global-air-traffic-control-researcher-184607530.html"><img src="http://l3.yimg.com/bt/api/res/1.2/5Vc_yEQhJ9Pc8bUg5uQFrw--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1343414690254-1-0.jpg" width="130" height="86" alt="An air traffic controller monitors flights" align="left" title="An air traffic controller monitors flights" border="0" /></a>Air traffic control software used around the world could be exploited by hackers to unleash squadrons of ghost planes to befuddle those entrusted to keep the skies safe, a security researcher said Thursday.</p><br clear="all"/>Apple pitches gadget security to hacker crowd<p><a href="http://news.yahoo.com/apple-pitches-gadget-security-hacker-crowd-201737273.html"><img src="http://l1.yimg.com/bt/api/res/1.2/rscEdclx78CIPdWMM_eq.w--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1343333772307-2-0.jpg" width="130" height="86" alt="Apple provided insights into security features built into the iOS operating system for iPhones" align="left" title="Apple provided insights into security features built into the iOS operating system for iPhones" border="0" /></a>Apple pitched security measures in its mobile gadgets during its first presentation at a premier gathering of hackers and those intent on thwarting cyber attacks.</p><br clear="all"/>http://news.yahoo.com/apple-pitches-gadget-security-hacker-crowd-201737273.htmlFri, 27 Jul 2012 05:16:14 -0400AFPapple-pitches-gadget-security-hacker-crowd-201737273<p><a href="http://news.yahoo.com/apple-pitches-gadget-security-hacker-crowd-201737273.html"><img src="http://l1.yimg.com/bt/api/res/1.2/rscEdclx78CIPdWMM_eq.w--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1343333772307-2-0.jpg" width="130" height="86" alt="Apple provided insights into security features built into the iOS operating system for iPhones" align="left" title="Apple provided insights into security features built into the iOS operating system for iPhones" border="0" /></a>Apple pitched security measures in its mobile gadgets during its first presentation at a premier gathering of hackers and those intent on thwarting cyber attacks.</p><br clear="all"/>Cyber commander accuses countries of targeting infrastructureWASHINGTON (Reuters) - Unspecified nations played a role in a 17-fold jump in cyber attacks on U.S. infrastructure since 2009, but this does not appear to reflect payback for a reported U.S. role in malicious code known as Stuxnet, the head of the Pentagon's National Security Agency said on Thursday. "I don't see the correlation there at all," Army General Keith Alexander told a security forum in Aspen, Colorado. "I don't see anything that goes to Stuxnet or anything like that." Stuxnet was the first discovered malware designed to subvert industrial systems. ...http://news.yahoo.com/cyber-commander-accuses-countries-targeting-infrastructure-220701880.htmlThu, 26 Jul 2012 18:07:01 -0400Reuterscyber-commander-accuses-countries-targeting-infrastructure-220701880Cyber defenders urged to go on the offense<p><a href="http://news.yahoo.com/cyber-defenders-urged-offense-140023880.html"><img src="http://l3.yimg.com/bt/api/res/1.2/AeDN1P4IPXOatwuTC.UagA--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1343310194958-1-0.jpg" width="130" height="86" alt="Former FBI cyber crime unit chief Shawn Henry was the keynote speaker at the Black Hat computer security gathering" align="left" title="Former FBI cyber crime unit chief Shawn Henry was the keynote speaker at the Black Hat computer security gathering" border="0" /></a>Computer security champions on Wednesday were urged to hunt down and eliminate hackers, spies, terrorists and other online evildoers to prevent devastating Internet Age attacks.</p><br clear="all"/>http://news.yahoo.com/cyber-defenders-urged-offense-140023880.htmlThu, 26 Jul 2012 10:00:23 -0400AFPcyber-defenders-urged-offense-140023880<p><a href="http://news.yahoo.com/cyber-defenders-urged-offense-140023880.html"><img src="http://l3.yimg.com/bt/api/res/1.2/AeDN1P4IPXOatwuTC.UagA--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/afp.com/photo_1343310194958-1-0.jpg" width="130" height="86" alt="Former FBI cyber crime unit chief Shawn Henry was the keynote speaker at the Black Hat computer security gathering" align="left" title="Former FBI cyber crime unit chief Shawn Henry was the keynote speaker at the Black Hat computer security gathering" border="0" /></a>Computer security champions on Wednesday were urged to hunt down and eliminate hackers, spies, terrorists and other online evildoers to prevent devastating Internet Age attacks.</p><br clear="all"/>Olympic Attendees: Here's How You Stay Safe From Hackers<p><a href="http://news.yahoo.com/olympic-attendees-heres-stay-safe-hackers-123001737.html"><img src="http://l2.yimg.com/bt/api/res/1.2/14N_RCm.3e9MIGYqlPfbGQ--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/hacker600-275x171.jpg" width="130" height="86" alt="Olympic Attendees: Here&#039;s How You Stay Safe From Hackers" align="left" title="Olympic Attendees: Here&#039;s How You Stay Safe From Hackers" border="0" /></a>The networks broadcasting and live streaming the 2012 Olympic Games are reportedly well-prepared to deflect cyberattacks and hackers, but what about the average Olympic attendee who is connected to public WiFi?</p><br clear="all"/>http://news.yahoo.com/olympic-attendees-heres-stay-safe-hackers-123001737.htmlWed, 25 Jul 2012 08:30:01 -0400Mashableolympic-attendees-heres-stay-safe-hackers-123001737<p><a href="http://news.yahoo.com/olympic-attendees-heres-stay-safe-hackers-123001737.html"><img src="http://l2.yimg.com/bt/api/res/1.2/14N_RCm.3e9MIGYqlPfbGQ--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/hacker600-275x171.jpg" width="130" height="86" alt="Olympic Attendees: Here&#039;s How You Stay Safe From Hackers" align="left" title="Olympic Attendees: Here&#039;s How You Stay Safe From Hackers" border="0" /></a>The networks broadcasting and live streaming the 2012 Olympic Games are reportedly well-prepared to deflect cyberattacks and hackers, but what about the average Olympic attendee who is connected to public WiFi?</p><br clear="all"/>Mac Malware Alert Surfaces as Mountain Lion Goes Live [REPORT]<p><a href="http://news.yahoo.com/mac-malware-alert-surfaces-mountain-lion-goes-live-100751413.html"><img src="http://l1.yimg.com/bt/api/res/1.2/1f.uWB.AgF_oZMQUohbUkw--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/webenhancer-warning-5001.png" width="130" height="86" alt="Mac Malware Alert Surfaces as Mountain Lion Goes Live [REPORT]" align="left" title="Mac Malware Alert Surfaces as Mountain Lion Goes Live [REPORT]" border="0" /></a>Just as Mac OS X Mountain Lion is going live, security firm Sophos has identified a nasty piece of Mac malware.</p><br clear="all"/>http://news.yahoo.com/mac-malware-alert-surfaces-mountain-lion-goes-live-100751413.htmlWed, 25 Jul 2012 06:07:51 -0400Mashablemac-malware-alert-surfaces-mountain-lion-goes-live-100751413<p><a href="http://news.yahoo.com/mac-malware-alert-surfaces-mountain-lion-goes-live-100751413.html"><img src="http://l1.yimg.com/bt/api/res/1.2/1f.uWB.AgF_oZMQUohbUkw--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/webenhancer-warning-5001.png" width="130" height="86" alt="Mac Malware Alert Surfaces as Mountain Lion Goes Live [REPORT]" align="left" title="Mac Malware Alert Surfaces as Mountain Lion Goes Live [REPORT]" border="0" /></a>Just as Mac OS X Mountain Lion is going live, security firm Sophos has identified a nasty piece of Mac malware.</p><br clear="all"/>After Malware Scare, Apple Makes First Appearance at Black Hat Conference<p><a href="http://news.yahoo.com/malware-scare-apple-makes-first-appearance-black-hat-203147110.html"><img src="http://l3.yimg.com/bt/api/res/1.2/.YNfEDs9WtJwttICBgb0yQ--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/apple600-275x171.jpg" width="130" height="86" alt="After Malware Scare, Apple Makes First Appearance at Black Hat Conference" align="left" title="After Malware Scare, Apple Makes First Appearance at Black Hat Conference" border="0" /></a>Apple will make its first appearance at computer security conference Black Hat on Thursday when Dallas De Atley, Manager of the Platform Security team at the company, takes the stage to talk about key security technologies in iOS.</p><br clear="all"/>http://news.yahoo.com/malware-scare-apple-makes-first-appearance-black-hat-203147110.htmlTue, 24 Jul 2012 16:31:47 -0400Mashablemalware-scare-apple-makes-first-appearance-black-hat-203147110<p><a href="http://news.yahoo.com/malware-scare-apple-makes-first-appearance-black-hat-203147110.html"><img src="http://l3.yimg.com/bt/api/res/1.2/.YNfEDs9WtJwttICBgb0yQ--/YXBwaWQ9eW5ld3M7Zmk9ZmlsbDtoPTg2O3E9ODU7dz0xMzA-/http://media.zenfs.com/en_us/News/mashable/apple600-275x171.jpg" width="130" height="86" alt="After Malware Scare, Apple Makes First Appearance at Black Hat Conference" align="left" title="After Malware Scare, Apple Makes First Appearance at Black Hat Conference" border="0" /></a>Apple will make its first appearance at computer security conference Black Hat on Thursday when Dallas De Atley, Manager of the Platform Security team at the company, takes the stage to talk about key security technologies in iOS.</p><br clear="all"/>

Source: http://rss.news.yahoo.com/rss/security

andy roddick rob dyrdek oberon donald driver donald driver robin thicke mariana trench

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.