Entries by Matthew

List of Damage under #OpWorldCup and Anonymous’ target List of Sponsors

Source: www.hackernewsbulletin.com   It is already in the news that Anonymous group of hackers mainly from Brazil and also from all over the world going to hit this season’s World Cup Sponsors with Cyber-Attacks. Hackers dubbed this operation “#OpWorldCup,” you can also find many related tweets to the event through searching for the following Hash-tags: […]

Anonymous preparing cyber-attacks for sponsors in Brazil FIFA world cup 2014

Source: http://hackersnewsbulletin.com Just like World Wide Web, here is World Wide Anonymous group (which contains Activists,) and now they are planning to disturb the Fifa World Cup 2014 in Brazil through Cyber-Attacks. Anonymous are going to target sponsors of this Word Cup, and below is the reason WHY? The group is really angry with the Lavish spending […]

Using TrueCrypt is not secure” , End of TrueCrypt Development

Source: www.ehackingnews.com “Using TrueCrypt is not secure” , End of TrueCrypt Development – See more at: http://www.ehackingnews.com/2014/05/using-truecrypt-is-not-secure-end-of.html#sthash.WFGXmKcM.dpuf   Today, security enthusiasts woke up with a shocking news that TrueCrypt has ended its development and warns users that the tool used for encrypting drive is not safe to use. Sponsored Links Users who try to access […]

Apple devices ‘hijacked for ransom’

Source: BBC UK Several users of Apple devices in Australia have reported that their gadgets have been “hijacked” – with a message demanding money. Experts believed the hack had targeted users by exploiting the Find my iPhone feature. A message appeared on some targeted phones asking for “$100 USD/EUR” to be sent to a PayPal […]

New point of sale malware compromises 1500 devices.

Source: www.thehackernews.com In past few months, the malware developers are more focusing on proliferating and upgrading malicious malwares to target Point-of-Sale (POS) machines. Due to the lack of concern and security measures, point-of-sale (POS) systems have become an attractive target for cybercriminals and malware writers. BlackPOS malware caused massive data breaches in various US retailers […]

eBay Hacked, Urges All Members to Change Passwords Immediately

Source: www.yahoo.com   The online auction and sales giant eBay posted a message Wednesday morning saying that it had been hacked, urging all of its members to change their passwords. The company said in a statement that a database containing encrypted passwords had been breached, but that financial data, including credit card information, was stored […]

Symantec revamps small business security suite

Source: www.infoworld.com   Symantec’s latest product, Norton Small Business, is perhaps the most well-rounded and ambitious offering the company has inserted into its product array for small companies. The security company has been working for more than a year to revamp its product line as the company faces an ever-competitive security market. Symantec has at […]

U.S. Charges Five Chinese Military Officers With Spying

Source: Bloomberg The U.S. dramatically escalated its battle to curb China’s technology theft from American companies by accusing five Chinese military officials of stealing trade secrets, casting the hacker attacks as a direct economic threat. The indictment effectively accuses China and its government of a vast effort to mine U.S. technology through cyber-espionage, stealing jobs […]

Microsoft acknowledges more errors, 80070371 and 80071A91, when installing Windows 8.1 Update/KB 2919355

There’s confirmation of two more bugs and a Stop 0x7B ‘Blue Screen’ as Microsoft re-issues the patch, changing metadata but no programs Source: www.infoworld.com The Windows 8.1 Update blowout continues. We now have official recognition of two more error codes, 80070371 and 80071A91, which can occur when you try to install Windows 8.1 Update, KB […]

Critical vulnerabilities in TLS implementation for Java

Source: www.sciencedaily.com In January and April 2014, Oracle has released critical Java software security updates. They resolve, amongst others, three vulnerabilities discovered by researchers from the Horst Görtz Institute for IT Security at the Ruhr-Universität Bochum. These vulnerabilities affect the “Java Secure Socket Extension” (JSSE), a software library implementing the “Transport Layer Security” protocol (TLS). […]