Hackers had broken the database of the German Lufthansa airline customers, Der Spiegel newspaper, quoted by Agerpres. Lufthansa said it had taken prompt action, but admitted “that failed to prevent illegal access to records of customers’. According to Der Spiegel, unidentified hackers have accessed data site users, compromising their
A group of russian hackers managed to break the White House computer system, gaining access to private information which contain the program of US President Barack Obama, writes CNN. According to available information, the attack, behind which they may be Russian hackers, as stated by the authorities, was
81% of large businesses have suffered malicious data breaches shows in a cybersecurity survey, made by UK Government’s in 2014. That indicate almost one in five didn’t. “In this context, it’s impractical to prove a negative,” said Lenny Zeltser, a senior faculty member at the SANS Institute, who
Law firms are the perfect targets for hackers according security experts. “It is almost a daily occurrence that we read about cyber attacks in the news. Unfortunately, on or around January 25, 2015, our firm was the victim of a single cyber attack, by a relatively new variant
Driverless cars could be vulnerable to hackers who could bring cities to a chaos, steal cars remotely or even commit deadly terror attacks, and many other problems, is a known fact. The report from the Institution of Engineering and Technology (IET) suggests that autonomous vehicles could be on the roads in
The UK’s National Crime Agency has arrested this week 56 suspected hackers as part of a “strike week” against cybercrime. In total, 25 separate operations were carried out across The United Kingdom. Those arrested are suspected of being involved in a wide variety of cybercrimes including data theft,
Called Freak, Factoring attack on RSA-EXPORT Keys, the security breach exists on high-profile websites. It is supossed that seven hours is all it takes to crack the encryption that is in place on some supposedly secure websites. Browsers can be hijacked and tricked into accessing websites using legacy encryption. There was
Security experts from G Data SecurityLabs analyzed Superfish adware. In this process, analysts have encountered in program, a technology component, called SSL digestion. It uses a root certificate which is poorly secured and has extensive rights on the computer. SSL Digestor intercept safe HTTPS connections which can be decrypted.
The Federal Communications Commission on Thursday voted to approve new rules on how the internet should be governed. New rules will prohibit internet service providers from discriminating against content producers. “Who determines how you use the internet? Who decides what content you can view and when? Should there
We all know that a phone uses more power the further away it is from a cell tower as it tries to connect. So, an Android phone can be tracked by studying their power use over time, without using their GPS or wi-fi/data usage. Extra power is used by