Archive | Hack and Hackers RSS feed for this section

UH notifies 7,100 patients of stolen hard drive with personal medical information on it

CLEVELAND, Ohio — More than 7,100 University Hospitals patients received notification by mail this week that their protected personal medical information was potentially exposed after a hard drive containing physician office data was stolen from a third-party vendor helping to upgrade the health system’s computer systems . Someone stole the hard drive from the car […]

Leave a comment Continue Reading →

Ultrasonic more then bugs talking…….or “bab bios” or should it be sound gaps not air gaps

Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps Like a super strain of bacteria, the rootkit plaguing Dragos Ruiu is omnipotent.   Three years ago, security consultant Dragos Ruiu was in his lab when he noticed something highly unusual: his MacBook Air, on which he had just installed a fresh copy of […]

Leave a comment Continue Reading →

Well it’s been a year or so since I last mused about security and it’s still

Driven by the people element. End users still have the the keys to the kingdom and malware and phishing have clearly marked them for targeting.  The Standard number of targeted phishings at my employer is well over 20 a month.  The human element is still opening email from “DEAD cousin NED”  and we apparently all […]

Leave a comment Continue Reading →

Hackers reveal critical vulnerabilities in Huawei routers at Defcon

Over on InfoWorld SECURITY Feed the post “Hackers reveal critical vulnerabilities in Huawei routers at Defcon” contains this text: “ Security researchers disclosed critical vulnerabilities in routers from Chinese networking and telecommunications equipment manufacturer Huawei at the Defcon hackers conference on Sunday. The vulnerabilities — a session hijack, a heap overflow, and a stack overflow […]

Leave a comment Continue Reading →

SQL Injection Attacks Up 69% ? Packet Storm

Over on the post “SQL Injection Attacks Up 69% ? Packet Storm” contains this text: ” SQL Injection Attacks Up 69%Source ZDNetLink | Favorite | Comments (0)Close”

Leave a comment Continue Reading →

Tools boast easy cracking of Microsoft crypto for businesses

Over on CNET News.com – Threats the post “Tools boast easy cracking of Microsoft crypto for businesses” contains this text: “ChapCrack and CloudCracker reveal sensitive corporate communications — including passwords — protected by the popular PPTP encryption protocol, which is based on an algorithm from Microsoft, a researcher says at Defcon.“

Leave a comment Continue Reading →

Flame malware: So big, so overlooked | Security & Privacy – CNET News

Over on the post “Flame malware: So big, so overlooked | Security & Privacy – CNET News” contains this text: “ CNET News HomeReviews News Download CNET TV How To Marketplace Log In | Join CNET News Security & Privacy Flame malware: So big, so overlooked The most ‘complex malware ever found’ — Flame — […]

Leave a comment Continue Reading →

Java Drive-by Generator – F-Secure Weblog : News from the Lab

Over on the post “Java Drive-by Generator – F-Secure Weblog : News from the Lab”    <<< Tuesday, May 8, 2012 >>>   Java Drive-by Generator Posted by Karmina @ 15:27 GMT | Comments Ran across quite an interesting infection today. I visited a site that prompted me with a security warning about a ‘Microsoft’ […]

Leave a comment Continue Reading →

New malware strain locks up computers unless ransom is paid | Security & Privacy – CNET News

Over on the post “New malware strain locks up computers unless ransom is paid | Security & Privacy – CNET News” contains this text: “ CNET News HomeReviews News Download CNET TV How To Marketplace Log In | Join Breaking news Oracle v. Google jury returns partial verdict, favoring OracleShare: CNET News Security & Privacy […]

Leave a comment Continue Reading →

Microsoft detects new malware targeting Apple computers – Computerworld

Over on the post “Microsoft detects new malware targeting Apple computers – Computerworld” contains this text: “Skip the navigation Computerworld White Papers Webcasts Newsletters Solution Centers Events Magazine Twitter Facebook RSS Topics News In Depth Reviews Blogs Opinion Shark Tank IT Jobs More IT Verticals Security App Security|Business Continuity|Cybercrime and Hacking|DRM and Legal Issues|Data Security|Malware […]

Leave a comment Continue Reading →