Hackers steal user data from the European Central Bank website, ask for money

Hackers have stolen user contact information, including email addresses and phone numbers, from the website of the European Central Bank and attempted to extort money from the institution.

By Lucian Constantin | 24 July, 2014 22:38

Tags: Tripwire, security, data breach, data protection, AppRiver, fraud, privacy, European Central Bank launches Sales Reach for real-time selling and marketing is combining its Pardot marketing software, sales automation application and social communities platform into a new product called Sales Reach, which it says can help salespeople nurture leads and make deals in real time.

By Chris Kanaracus | 24 July, 2014 22:01

Tags: services, applications, enterprise resource planning,, Pardot, software, IT management

EBay faces class action suit over data breach

EBay faces a class action suit in a U.S. federal court over a security breach earlier this year.

By John Ribeiro | 24 July, 2014 16:58

Tags: security, legal, ebay

Firm says vulnerability in Tails contained in I2P component

A vulnerability broker published a video demonstrating one of several flaws it has found in the privacy-focused Tails operating system, which is used by those seeking to make their Web browser harder to trace.

By Jeremy Kirk | 24 July, 2014 10:30

Tags: Exodus Intelligence, Tails, security, Exploits / vulnerabilities

Arrests made after international cyber-ring targets StubHub

Six people have been indicted on charges of running an international ring that resold tickets bought through compromised StubHub accounts for some of New York's biggest concerts and sporting events.

By Martyn Williams | 24 July, 2014 05:34

Tags: online safety, security, StubHub, Access control and authentication, legal, ebay, data breach, cybercrime, Criminal

Seagate wireless drive can now stream to Roku set-top box

Seagate announced today Roku set-top boxes will now have a channel to connect to Wireless Plus hard drives for streaming movies, music and photos stored on the drives.

By Lucas Mearian | 24 July, 2014 02:34

Tags: Mobile/Wireless, Data storage, Networking, computerworld, wireless, internet, Roku, mobile, Seagate Technology

Dutch spy agencies can receive NSA data, court rules

Dutch intelligence services can receive bulk data that might have been obtained by the U.S. National Security Agency (NSA) through mass data interception programs, even though collecting data that way is illegal for the Dutch services, the Hague District Court ruled Wednesday.

By Loek Essers | 24 July, 2014 01:01

Tags: security, U.S. National Security Agency, legal, Civil lawsuits, government, legislation, privacy

BlackBerry offers BES10 as a hosted service through partners

Businesses wanting the security of BlackBerry Enterprise Service 10 without the complexity of managing it onsite can now buy it as a hosted service from six BlackBerry partners.

By Peter Sayer | 24 July, 2014 00:25

Tags: BlackBerry OS, consumer electronics, security, Mobile OSes, smartphones, mobile security, software, mobile, Blackberry

File-encrypting Android ransomware 'Simplocker' targets English-speaking users

A ransomware threat that encrypts files stored on the SD memory cards of Android devices has been updated to target English-speaking users with FBI-themed alerts.

By Lucian Constantin | 23 July, 2014 23:46

Tags: mobile applications, Android OS, security, mobile security, eset, mobile, malware

SQL injection flaw in Wall Street Journal database led to breach

A vulnerability in a web-based graphics system led to a breach of The Wall Street Journal's network by a hacker, the newspaper acknowledged late Tuesday.

By Jeremy Kirk | 23 July, 2014 20:34

Tags: dow jones, IntelCrawler, security, data breach, data protection, Exploits / vulnerabilities

In pictures: RSA Asia Pacific & Japan conference

RSA's annual Asia Pacific & Japan conference kicked off in Singapore on Tuesday. RSA executive chairman Arthur W. Coviello called for an end to cyber warfare while Juniper Network's Kevin Kennedy compared the Information Age to the Golden Age of the Roman empire. The conference concludes today.

By Computerworld Australia staff | 23 July, 2014 17:24

Tags: RSA Conference, spying, cyber warfare, security, rsa, juniper networks

Barbarians are at the gates of Information Age: Juniper

If we are not careful in the decisions or actions that we take online today, the Information Age may go the way of the Roman Empire, according to Juniper Networks senior director of product management Kevin Kennedy.

By Hamish Barwick | 23 July, 2014 15:57

Tags: RSA Conference, Information Age, cyber warfare, Roman Empire, juniper networks

Zero-day flaws in Tails aren't for sale, vulnerability broker says

A company that specializes in selling information on software vulnerabilities has reignited a debate over the handling of such information, especially when it pertains to privacy-focused tools.

By Jeremy Kirk | 23 July, 2014 12:27

Tags: Exodus Intelligence, security

Rules of engagement needed for the Internet: RSA

Cyber weapons will never be completely eliminated but bi-lateral agreements between countries about the use of these weapons could establish boundaries, according to RSA executive chairman Arthur W. Coveillo.

By Hamish Barwick | 23 July, 2014 10:56

Tags: RSA Conference, cyber warfare, RSA tokens, cyber weapons, Art Coviello, rsa

Apple "inadvertently admitted" to iOS backdoor: forensics expert

Apple has "inadvertently admitted" to creating a "backdoor" in iOS, according to a new post by a forensics scientist, iOS author and former hacker, who this week created a stir when he posted a presentation laying out his case.

By John Cox | 23 July, 2014 08:17

Tags: Apple, security, ios, nsa, software, operating systems

Juniper jettisons mobile security business

Juniper Networks has divested its mobile security product line, selling the assets to a private equity firm for $250 million.

By Jim Duffy | 23 July, 2014 08:07

Tags: divestiture, quarterly earnings report, security, juniper, mobile security, juniper networks

TOR patch coming

The TOR Project thinks it has figured out how the author of a canceled Black Hat talk cracked its software to mask the source of Internet traffic, and it is working on a patch.

By Tim Greene | 23 July, 2014 08:06

Tags: Carnegie Mellon University, The TOR Project, National Security Agency, black hat, security, The Onion

Small cell device tech set to connect workplace Wi-Fi with 3G and LTE

Cisco says small cell technology is primed for explosive growth as it plans to connect 3G and LTE cellular networks to Wi-Fi access points that are already widely deployed in many enterprise facilities.

By Matt Hamblen | 23 July, 2014 04:47

Tags: Ericsson, Mobile/Wireless, Networking, at&t, qualcomm, Nokia, None, wireless, mobile, wireless networking

Tor Project working to fix weakness that can unmask users

Developers of Tor software believe they've identified a weakness that was scheduled to be revealed at the Black Hat security conference next month that could be used to de-anonymize Tor users.

By Lucian Constantin | 23 July, 2014 01:06

Tags: Carnegie Mellon University, The TOR Project, online safety, security, encryption, Exploits / vulnerabilities, privacy

Cybercrime wave whacks European banks

Banks across Europe are now coping with a wave of cybercrime in which crooks are transferring funds out of customer accounts through a scam involving bypassing some two-factor authentication systems to steal large sums, according to a security firm assisting in the investigation.

By Ellen Messmer | 23 July, 2014 00:34

Tags: consumer electronics, security, trend micro, Android, legal, smartphones, banks, cybercrime, malware

Top Whitepapers

Twitter Feed

Featured Whitepapers