The U.S. is vulnerable to cyberattacks that could shut down financial services or destroy information that companies need for daily operations, the chairman of the House Intelligence Committee said Sunday. Rep. Mike Rogers says 95 percent of private sector networks are vulnerable and most have already been hit.
Research involved 20 computer servers that were used to send out more than 100,000 "phishing" emails. About 2,200 of the 3,000 responses the scam artists received came from smartphones. Doug Johnson, vice president of risk management for the American Bankers Association, said he expects those numbers to get worse.
The Washington state Administrative Office of the Courts was hacked sometime between last fall and February, and up to 160,000 Social Security numbers and 1 million driver's license numbers may have been accessed during the data breach of its public website, officials said. The broader information "just happened to be on a server in an area that was accessed," said Veronica Diseth, director of the courts' information services division.
The sophistication of a network of thieves who drained cash machines around the globe of an astonishing $45 million in mere hours sent ripples through the security world, not merely for the size of the operation and ease with which it was carried out, but also for the threat that more such thefts may be in store. Seven people were arrested in the U.S., accused of operating the New York cell.
In a new report on the Chinese military, the Defense Department goes a small step further than it has gone in the past, when it said that cyberattacks originated in China and may be linked to Beijing's use of civilian experts in clandestine attacks against American companies.
Black Lotus, a leader in availability security and provider of distributed denial of service (DDoS) protection, has announced its partnership with Steadfast, a Chicago based IT Infrastructure Data Services provider. Under the terms of the partnership, Steadfast will offer Black Lotus enterprise-grade DDoS protection to its customers.
The Guardian newspaper said Monday that its Twitter accounts have been hacked, and it cited a claim of responsibility from the group calling itself the Syrian Electronic Army. The British paper reported on its website that several of its feeds on the social media site were broken into over the weekend.
The top U.S. military officer said Wednesday that he has called on China to be more transparent about cyberattacks and boost collaboration with the U.S. to tackle a common threat to their economies. Gen. Martin Dempsey said tackling cyber intrusions featured in his talks with his Chinese counterpart and other Chinese leaders during his three-day visit to China.
The U.S. service academies are ramping up efforts to groom a new breed of cyberspace warriors to confront increasing threats to the nation's military and civilian computer networks that control everything from electrical power grids to the banking system.
Google's mail and application services were unavailable to some users Wednesday morning. The company said it was investigating the problems, but didn't know their cause. It didn't say how many people were affected. The disruptions started affecting people worldwide around 8 a.m. Eastern time (noon GMT) but appeared to be resolved by midday.
Pro-business legislation aimed at helping companies fend off sophisticated foreign hackers sailed through the House on Thursday despite a White House veto threat and an outcry from privacy advocates and civil liberties groups that say it leaves Americans vulnerable to spying by the military.
If a purse with $900 is stolen, the victim probably would call the police. If a computerhacker steals $900 from that same person's bank account, what then? Call the police? Could they even help? As it is now, local police don't have widespread know-how to investigate cybercrimes. They rely heavily on the expertise of the federal government, which focuses on large, often international cybercrimes.
Every week, a group of teenagers and 20-somethings dressed in hoodies gets together in a tiny room on a college campus and plug in their laptops. They turn up pulsing electronic funk music, order pizza and begin furiously hacking into computer networks. But they're not shadowy criminals: They're students training to become "white-hat" hackers.
Some may wonder whether Caldwell's coins will one day be among the few physical reminders of an expensive fad that evaporated into the electronic ether — perhaps the result of a breakdown in its electronic architecture, or maybe after a crackdown by government regulators. "Movie pirates always win the long game against Hollywood," he said. "Bitcoin works the same way."
Book stores. Banks. Even data security companies. They've all become recent targets of increasingly sophisticated, determined — some say talented — hacker gangs. The "Friendliest Stores in Town" appear to be among their latest. Last month, Schnuck Markets Inc. confirmed it had been hacked.
North Korea was responsible for a cyberattack that shut down tens of thousands of computers and servers at South Korean broadcasters and banks last month, officials in Seoul said Wednesday, noting that an initial investigation pointed to a military-run spy agency as the culprit.
Cybersecurity experts from the Carnegie Mellon University Software Engineering Institute (SEI) will present on April 30 a free, virtual event on current research and development aimed at securing an organization's cyber future.
Dutch banks say a cyberattack has affected their online services, but did not breach the security of customers' accounts. The Netherlands Association of Banks says Dutch and some foreign banks were hit by a denial-of-service attack.
Hackers apparently broke into at least two of North Korea's government-run online sites, as tensions rose on the Korean Peninsula. The North's Uriminzokkiri Twitter and Flickr accounts stopped sending out content typical of that posted by the regime in Pyongyang, such as photos ofNorth's leader Kim Jong Un meeting with military officials.
Silver Peak Systems has introduced a new family of downloadable software products that are purpose-built for storage professionals to accelerate offsite data replication workloads. The new Silver Peak VRX-2, VRX-4 and VRX-8 software products combine data acceleration technology with flexible pricing.
The U.S. has taken its first real swipe at China following accusations that the Beijing government is behind a widespread and systemic hacking campaign targeting U.S. businesses. A new provision effectively bars much of the U.S. government from buying information technology made by companies linked to the Chinese government.
It's a good bet that in the not-so-distant future, aerial drones will be part of everyday life in the U.S. Far from the killing machines whose missiles incinerate terrorists overseas, these generally small, unmanned aircraft will help police departments find missing people.
A record-breaking cyberattack targeting an anti-spam watchdog group has sent ripples of disruption coursing across the Web. Spamhaus, a site responsible for keeping ads for bogus weight-loss pills out of the world's inboxes, said it had been buffeted by the monster denial-of-service attack since mid-March.
Six months after a hacker stole the personal data of millions of South Carolina taxpayers, legislators are moving past finger-pointing hearings on who to blame and focusing on how to prevent another massive breach. Meanwhile, the cost to taxpayers continues to climb.
Investigators have yet to pinpoint the culprit behind a synchronized cyberattack in South Korea last week. But in Seoul, the focus is fixed on North Korea, which South Korean security experts say has been training a team of computer-savvy "cyber warriors" as cyberspace becomes a fertile battleground in the nations' rivalry.
Bored with classes? Carnegie Mellon University and one of the government's top spy agencies want to interest high school students in a game of computer hacking. Their goal with "Toaster Wars" is to cultivate the nation's next generation of cyber warriors in offensive and defensive strategies.