Related topics: website · twitter · cyberattack · cyber attack · security

Chrome OS thwarts attack attempts in Pwnium challenge

(Phys.org) —Hackers at a please-hack-me contest at the CanWest security conference in Vancouver, BC, went home empty-handed. The contest during the Vancouver three-day conference on digital security ended up with enlightened ...

Tit-for-tat hack as Israeli posts Saudi credit cards

An Israeli hacker published details of what he claimed were more than 200 Saudi-owned credit cards online overnight in a revenge attack after a similar move by "Saudi" hackers earlier this month.

No patch for human stupidity: hackers

Hackers at DefCon have long understood that there is no patch for human stupidity. Last week, security researchers uncovered yet another strain of malicious software aimed at smartphones that run Google's popular Android ...

Explainer: What the Uber data breach is all about

When Uber paid a $100,000 ransom so that hackers who broke into its data warehouse would destroy the personal information they stole, it allowed the ride-sharing company to keep a massive breach of 57 million user and driver ...

Web browsers and iPhone hacked at contest

(PhysOrg.com) -- Hackers had a field day on the first day of the Pwn2Own contest, successfully attacking Safari, iPhone, Internet Explorer, and Firefox. The Pwn2Own contest is an annual event that encourages security specialists ...

Japanese defense industry body target of cyberattack

A cyberattack was launched on an organization of Japanese defense contractors in an attempt to steal confidential information on the nation's defense industry, according to sources.

Beware of Hackers Controlling Your Automobile

(PhysOrg.com) -- A team of researchers led by Professor Stefan Savage from the University of California, San Diego and Tadayoshi Kohno from the University of Washington set out to see what it would take to control an automobile’s ...

Hacker thieves targeted Anonymous allies: Symantec

Anonymous on Monday gave mixed reactions to a US computer security firm's report that backers of the notorious hacker group were suckered into downloading software that steals online banking information.

page 6 from 40