Reuters has seen one of its Twitter accounts compromised just 48 hours after it discovered that Syrian cybercriminals had allegedly hacked its blogging platform. The culprits, presumably the same group in both instances, are President Bashar al-Assad loyalists and have been using Reuters’ credibility to get anti-rebel messages out. According… Read more »
It’s hard to believe that a USB stick the size of a thumb can hold as much information as a computer the size of a car could thirty years ago. However, whilst convenient, that little USB is also a lot easier to lose, making it far more likely that private… Read more »
Last week, LinkedIn became the latest social media company to endure a major security breach after more than six million of its users’ passwords were stolen and posted by hackers on a Russian web forum, inviting other hackers to help decrypt them. All of the 6.5 million leaked passwords were… Read more »
315,000 patient files have disappeared from Emory Healthcare, an Atlanta-based healthcare company. The files contained 17 years worth of private data on all patients who had a surgical procedure done at Emory University Hospital, Emory University Hospital Midtown, and The Emory Clinic Ambulatory Surgery Center between 1990 and 2007. Besides… Read more »
Aviva has had to apologise after it’s HR department unintentionally sent 1,300 employees in its asset management arm an exit email that was intended for just one person. The Telegraph reports that the email instructed the workers to hand over all company property, security passes, and electronic passwords on their… Read more »
As the usage of Macs is on the incline, so are the number of viruses out to infect them. A recent report conducted by Russian antivirus company Dr. Web has found that over half a million Macs are infected with the Flashback trojan, which poses as a Flash Player installer… Read more »
While there has been growth in public awareness about cloud computing, there remains some confusion about what it actually is. Put simply, cloud computing is pooled hardware and software made accessible via the internet. It means IT users can access their applications and data online. The applications and data are… Read more »
Already having to pay out for last year’s huge PlayStation Network breach, Sony is in the spotlight again after the entirety of Michael Jackson’s back catalogue was stolen from the company by hackers. The cyber attack saw the illegal download of around 50,000 music files belonging to the singer, including… Read more »
Since 2004, the California Online Privacy Protection Act (COPPA) has required online services that collect certain types of data from Californian users to post a privacy policy which describes how the information will be used. If they collect this data, Apps fall under this category, but a recent report has… Read more »
Antivirus firm Symantec has recently been the victim of a hack attack in which the hacker released the source code for its pcAnywhere utility. Fears have arisen that hackers could analyze the code to find security holes and then attempt to take over customers’ computers. The release of the source… Read more »