Security News Headlines

In this Feb. 20, 2014 photo, a man walks through a hall at Secret Service offices in Washington. Secret Service investigators say it could take years to identify the hackers who breached Target’s computer systems in December _and even longer to bring them to justice. (AP Photo/Carolyn Kaster)

Secret Service: Identifying Target hackers could take years, arrests could take longer

WASHINGTON - Secret Service investigators say they are close to gaining a full understanding of the methods hackers used to breach Target's computer systems last December. But the agency says it could take years to identify the criminals who stole some 40 million debit and credit card numbers of Target shoppers and other personal information from as many as 70 million people in the pre-Christmas …

  • OTTAWA - The fallout from the Heartbleed bug could go far beyond just 900 social insurance numbers compromised at the Canada Revenue agency.

  • The Heartbleed software bug is not only one of the most serious online security breaches in recent memory, it has demonstrated how difficult it is for websites to tell their customers whether they’re at risk or not.

  • SAN FRANCISCO - A confounding computer bug called "Heartbleed" is causing major security headaches across the Internet as websites scramble to fix the problem and Web surfers wonder whether they should change their passwords to prevent theft of their email accounts, credit card numbers and other sensitive information.  …

  • A sign marks the entrance to RAS's facility in Bedford

    By Joseph Menn SAN FRANCISCO (Reuters) - Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency's ability to eavesdrop on some Internet communications, according to a team of academic researchers. Reuters reported in …

  • Google to Iran: Change your password

    It’s yet another reminder about how careful you need to be when signing into those web pages we use every day. A phishing scam, which is when you receive an invitation to click a fraudulent link that masquerades as a … Continue reading →

  • Illustration file picture shows a man typing on a computer keyboard in Warsaw

    By Adrian Croft and Peter Apps BRUSSELS/LONDON (Reuters) - Hackers brought down several public NATO websites, the alliance said on Sunday, in what appeared to be the latest escalation in cyberspace over growing tensions over Crimea. The Western military alliance's spokeswoman, Oana Lungescu, said on social networking …

  • Some of Bitcoin enthusiast Mike Caldwell's coins in this photo illustration at his office in Sandy, Utah

    Mizuho Bank, one of Japan's largest lenders, has became ensnared in North American legal fallout from Mt. Gox, once the world's biggest bitcoin exchange, which collapsed last month after losing nearly half a billion dollars worth of customers' digital currency. Lawsuits in the United States and Canada represent a new legal …

  • This undated image provided by Target Corp shows Chief Information Officer Beth Jacob. Jacob is resigning effective Wednesday, March 5, 2014, as the retailer overhauls its information security and compliance division in the wake of a massive pre-Christmas data breach. (AP Photo/Target, Mark.Williams)

    NEW YORK, N.Y. - Hackers are putting top technology executives under severe pressure. And this week's sudden departure of Target's chief information officer in the wake of the company's massive pre-Christmas data breach has only ratcheted up the stress.

  • Burges holds a placard to protest against Mt. Gox in Tokyo

    By Jeremy Wagstaff SINGAPORE (Reuters) - Some of those who have lost bitcoins in the collapse of Mt. Gox have turned to internet sleuthing to find out where their money has gone - but they're unlikely to have much luck. Forum websites like Reddit and internet relay chatrooms have attracted hordes of users as the Mt. Gox …

  • Some computer consultants say the global malware threat has gotten so bad that conventional security measures, such as anti-virus software, are no longer adequate to fight them.

  • While the many scams in the digital age involve the Internet, mail fraud still makes Vancouver Police Department's Top Ten Scams for 2014.

    The Vancouver Police Department has released a list of this year's top ten scams and how people can avoid being victimized.

  • U.S.-based encryption firm Silent Circle is hoping that heightened paranoia about government snooping will compel consumers to buy the Blackphone, a pro-privacy smartphone the company is launching Monday at the Mobile World Congress in Barcelona.

  • Fears over NSA spying have prompted people around the world to think about security differently, whether it be petitioning for companies to better secure their data or changing the information they share online. In particular, security around smartphones has been … Continue reading →

  • The Yahoo logo is shown at the company's headquarters in Sunnyvale

    (Reuters) - Some advertisements on Yahoo Inc's European websites last week spread malicious software, Yahoo said on Sunday, potentially infecting thousands of users. In statement on Sunday, a Yahoo spokesman, said: "On Friday, January 3 on our European sites, we served some advertisements that did not meet our editorial …

  • The public shaming of Snapchat by an anonymous hacking group – in the form of a leak of millions of its users’ details – illustrates the troubling vulnerabilities not only of the smartphone app but also of its users, security experts say.

  • FireEye Inc. Chairman of the Board, DeWalt and Founder Aziz pose with Nasdaq CEO Greifeld outside the Nasdaq Market site in Times Square

    By Jim Finkle BOSTON (Reuters) - Cybersecurity company FireEye Inc has acquired Mandiant Corp, the computer forensics specialist best known for unveiling a secretive Chinese military unit believed to be behind a series of hacking attacks on U.S. companies. FirEye shares jumped more than 20 percent after Thursday's announcement …

  • A German hacker will collect a bounty worth more than $7,000 and a few bitcoins after creating a fake finger from a photo of a fingerprint that was able to foil the Touch ID fingerprint sensor on Apple’s new iPhone 5s and unlock the device.

  • University of Calgary computer security expert Tom Keenan is presenting at the annual hacker conference.

    Tom Keenan has the latest hacks to watch out for from the Def Con hacker convention in Las Vegas.

  • Crystal Zorn is the head of information security for the province.

    The province says its computer network withstood millions of cyberattacks last year.

More Latest News »
 
Search