Ads 468x60px

Labels

Friday, April 5, 2013

Hackers attacking US banks are well-funded, expert says

The Cyber fighters of Izz Ad-Din Al Qassam hacker group - also known as Qassam Cyber Fighters - are at it again. For the third time in the last half year or so, they have mounted DDoS attacks agai...

View the Original article

US companies in China worried about data theft

The results of a survey conducted by the American Chamber of Commerce in China which polled 325 respondents currently doing business throughout the republic has shown that a quarter of them have exper...

View the Original article

Dataguise enhances DG for Hadoop with selective encryption

Dataguise announced DG for Hadoop 4.3, which provides both masking and selective encryption for sensitive data in major Hadoop distributions. The new version also delivers expanded capabilities, inclu...

View the Original article

Route1 releases MobiKEY for iPad

Route1 released MobiKEY technology for the iPad. MobiKEY is a complete desktop, secure remote access technology that integrates multi-factor authentication and identity management in a mobile computin...

View the Original article

Firefox enhances private browsing

Mozilla released Firefox 20 that fixes several security and stability issues. Included in the update are eleven critical security updates. Firefox includes a new enhancement to private browsing t...

View the Original article

Aggressive Android adware and malware on the rise

With adware gleaning more user data from people devices than they would normally need too and developers bundle more than one adware framework into their apps, user privacy is increasingly taking a ba...

View the Original article

Defending the Internet at scale

A decade ago, engineers tackled the C10K scalability problems that prevented servers from handling more than 10,000 concurrent connections. This problem was solved by fixing OS kernels and moving from...

View the Original article

Fake "PayPal account deleted" emails doing rounds

A new email spam campaign targeting PayPal users is under way. The email subject line says the email contains an unread message from PayPal, but the email address from which it is supposedly sent i...

View the Original article

The security risks of using Wi-Fi on the Tube

The arrival of widespread public Wi-Fi access across London Underground has been broadly welcomed by the general public, particularly those with smartphones and tablets who want to maintain internet a...

View the Original article

The War Z taken offline following forum, database hack

Players of The War Z, a first-person zombie survival game, have been notified of a breach of the developer's (Hammerpoint Interactive) forum and game databases and the theft of user data contained in ...

View the Original article

Blocking zero-day application exploits: A new approach for APT prevention

Cybercriminals continue to develop new methods to bypass security controls in order to install malware on corporate endpoints. The recently discovered advanced persistent threat (APT) malware, Trojan.

View the Original article

Banking Trojan disguised as innocuous Word and WinHelp files

Part of the job of a malware author is to constantly think up new ways of outsmarting researchers and bypassing automatic detection methods used by antivirus and other security software. These techniq...

View the Original article

Thousands of compromised Apache servers direct users to malware

What do the recent compromises of a number of LA Times websites and the blog of hard disk drive manufacturer Seagate have in common? According to several security researchers, all these sites are h...

View the Original article

F-Secure rebuilds free Online Scanner

F-Secure�s free Online Scanner tool has been completely rebuilt to be faster, lighter and more powerful than before, and now even cleans up advanced rootkits, the most difficult-to-remove malware. ...

View the Original article

Tips for avoiding tax scams

As the April 15 deadline for tax filing draws near, the Center for Internet Security (CIS) helps users recognize tax-related scams and better defend against them. Findings show that identity theft ...

View the Original article

DIY: Using trust to secure embedded projects

This talk from Shmoocon 2013 provides a DIY guide to using Trusted Computing on embedded devices. The authors introduce a low-cost schematic using Atmel's CryptoModule (AT97SC3204T) and CryptoAuthe...

View the Original article

Security professionals don't have secure mobile habits

Security professionals have embraced BYOD and they�re taking �anytime, anywhere� access to some pretty interesting locations according a new survey by Ping Identity. Most also admit to employing poor ...

View the Original article

Ciphertex releases 24TB portable, secure NAS server

The new 24TB portable, highly secure NAS server from Ciphertex is meant for backup, disaster recovery and business continuity, file sharing and virtualization. �The Ciphertex CX-6K-AV is a compac...

View the Original article

Malware attacks occur every three minutes

Malware activity has become so pervasive that organizations experience a malicious email file attachment or Web link as well as malware communication that evades legacy defenses up to once every three...

View the Original article

My very own personal privacy training

I remember a time - and it wasn't even that long ago - when the government, companies and organizations weren't this hell-bent on collecting citizen, customer and user data. It's not that they didn't ...

View the Original article

Wide variety of malware lurking in Skype messages

A new malware-spreading campaign is targeting Skype users, warns Dancho Danchev. The attack is mounted via malware-infected users whose compromised Skype account is set to send out messages to thei...

View the Original article

Review: Lookout for iPhone

One of the recent issues of Forbes magazine featured a three-page story on Lookout Inc., the company that, according to the article, has been able to trounce multibillion-dollar security giants like M...

View the Original article

Flashback malware author unmasked?

An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users that didn't have to get their permission to be downloaded, which resulted in a 600K strong ...

View the Original article

Carberp Trojan developers arrested in Ukraine

The mastermind behind the Carberp Trojan and the developers that helped created it have apparently been arrested in Ukraine in a joint action by the Security Service of Ukraine (SBU) and the Russian F...

View the Original article

Two Japanese web portals hacked, user financial info compromised

Personal and financial information belonging to users of two big Japanese web portals has been compromised earlier these week, Computerworld reports. On Tuesday evening, Yahoo Japan (owned by Sof...

View the Original article

Destroy solid state storage and optical media

Data Security unveiled their SSMD-2mm Destruction Device which disintegrates solid state and optical media to particles 2mm in size or smaller. NSA has evaluated the SSMD-2mm Destruction Device and fo...

View the Original article

Tips for securely using free Tube Wi-Fi

GFI Software warned of potential data and device security concerns posed by using London�s public Wi-Fi service, installed across large parts of the London Underground Tube network. Here are key ...

View the Original article

Microsoft to release 9 advisories on Tuesday

April 2013 advance notice is out and it forecasts an interesting patching session for Microsoft administrators. There are 9 advisories affecting 16 distinct platforms in 5 categories of Microsoft pro...

View the Original article

10 best practices for securing data in Hadoop

Dataguise released ten security best practices for organizations considering or implementing Hadoop. By following these procedures to manage privacy risk, data management and security, professionals c...

View the Original article

iMessage encryption stumps US federal agents

A recent investigation conducted by US Drug Enforcement Administration agents has been temporarily derailed after they failed to decrypt messages the targets exchanged via Apple's iMessage system. ...

View the Original article
 

Count

About Me

HatHack flashes on the updated news on hacking the system which ranges from the computer to internet and network hacking. Hacking -- Taking control over any thing and every is hacking of that particular system. Start Hacking !!!!

Visits

Sample Text