Quantcast
Channel: Techworld Australia - Cybercrime & Hacking RSS feed
Browsing latest articles
Browse All 33 View Live

After FBI blames North Korea for Sony attack, now what?

The FBI today named the North Korean government as responsible for the cyber attack against Sony Pictures last month, saying its technical analysis points to the isolated, Communist country.

View Article



Sony hack: Never underestimate the stupidity of criminals

So who was really behind the Sony hack? And does it really matter?

View Article

Intuit stops TurboTax e-filing of state returns after fraudulent filing spikes

Intuit today said it has suspended electronic filing of all state returns from its TurboTax tax preparation software after 19 states' tax authorities reported unusual volumes of fraudulent returns.

View Article

The ‘sophisticated attack' myth

Sometimes I wonder whether any company will ever fall victim to an unsophisticated cyberattack. Because after every attack that comes to light, we hear that same excuse: It was a sophisticated attack.

View Article

Security Manager's Journal: Breaches are everywhere

Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in...

View Article


FBI probes for source of fraudulent TurboTax filing spike

The Federal Bureau of Investigation (FBI) is looking into the cause of a spike in fraudulent tax returns filed using Intuit's TurboTax tax preparation software, according to a report by the Wall Street...

View Article

Google scrubs Pwnium hack contest

Google yesterday said it would shut down its Pwnium hacking contest, which it has held alongside the better-known Pwn2Own challenge each spring since 2012.

View Article

Researchers uncover signs of Superfish-style attacks

Researchers at the Electronic Frontier Foundation (EFF) yesterday said that they had found evidence that implies attackers have exploited a security vulnerability in the Superfish adware and a slew of...

View Article


The Irari rules for declaring a cyberattack ‘sophisticated'

Organizations hit by a cyberattack have reason to call the attack "sophisticated." But calling an attack sophisticated doesn't make it sophisticated. We have put our heads together and come up with...

View Article


House bill slashes research critical to cybersecurity

A U.S. House bill that will set the nation's basic research agenda for the next two years increases funding for computer science, but at the expense of other areas important to cybersecurity.

View Article

Sony hackers targeted employees with fake Apple ID emails

Hackers probably gained access to Sony's network last year after a series of phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs, a...

View Article

MEDJACK: Hackers hijacking medical devices to create backdoors in hospital...

After the Office of Personnel Management breach, medical data was labeled as the "holy grail" for cybercriminals intent on espionage. "Medical information can be worth 10 times as much as a credit card...

View Article

Duqu 2.0 hackers may have cracked Kaspersky to recon research

Eugene Kaspersky, the Russian whose namesake company acknowledged that it had been infected with top-tier malware, struggled during a press conference to come up with reasons why the hackers targeted...

View Article


6 reasons why there will be another OPM-style hack

The hack of the U.S. Office of Personnel Management didn't surprise me. All significant organizations are regularly attacked, and every major federal agency is a big target.

View Article

How should an underage cyberthief be dealt with?

Sometimes, emotions make it difficult to see the most effective way of accomplishing an objective. And emotions can definitely arise when the subject is underage cyberthieves.

View Article

Browsing latest articles
Browse All 33 View Live