computer security

Web host Hostinger says data breach may affect 14 million customers

Web host Hostinger says data breach may affect 14 million customers

Hostinger said it has reset user passwords as a “precautionary measure” after it detected unauthorized access to a database containing information on millions of its customers. The breach is said to

VMware Announces 2 Deals to Bulk Up Its Cloud Offerings

VMware bought Pivotal Software in a $2.7 billion deal and Carbon Black for about $2 billion in cash.
When Ransomware Cripples a City, Who’s to Blame? This I.T. Chief Is Fighting Back

When Ransomware Cripples a City, Who’s to Blame? This I.T. Chief Is Fighting Back

The former information technology director of a northern Florida city forced to pay $460,000 after a ransomware attack was fired. Now he’s suing.
5 Indicted in Identity Theft Scheme That Bilked Millions From Veterans

5 Indicted in Identity Theft Scheme That Bilked Millions From Veterans

The defendants obtained Social Security numbers and bank account information from a technician who worked for the military, the Justice Department said.
Ransomware Attacks Are Testing Resolve of Cities Across America

Ransomware Attacks Are Testing Resolve of Cities Across America

As hackers lock up networks that power police forces and utilities, municipalities must operate with hobbled computer systems, and decide whether to pay ransoms.
Ransomware Attacks Are Testing Resolve of Cities Across America

Ransomware Attacks Are Testing Resolve of Cities Across America

As hackers lock up networks that power police forces and utilities, municipalities must operate with hobbled computer systems, and decide whether to pay ransoms.
5 Indicted in Identity Theft Scheme That Bilked Millions From Veterans

5 Indicted in Identity Theft Scheme That Bilked Millions From Veterans

The defendants obtained Social Security numbers and bank account information from a technician who worked for the military, the Justice Department said.

Yubico launches its dual USB-C and Lightning two-factor security key

Almost two months after it was first announced, Yubico has launched the YubiKey 5Ci, a security key with dual support for both iPhones, Macs and other USB-C compatible devices. Yubico’s latest Yubikey
Ransomware Attack Hits 22 Texas Towns, Authorities Say

Ransomware Attack Hits 22 Texas Towns, Authorities Say

The state declined to say which towns were affected by the coordinated cyberattack. But one expert said it could signal more such attacks in the future.
Ransomware Attack Hits 22 Texas Towns, Authorities Say

Ransomware Attack Hits 22 Texas Towns, Authorities Say

The state declined to say which towns were affected by the coordinated cyberattack. But one expert said it could signal more such attacks in the future.
Ransomware Attack Hits 22 Texas Towns, Authorities Say

Ransomware Attack Hits 22 Texas Towns, Authorities Say

The state declined to say which towns were affected by the coordinated cyberattack. But one expert said it could signal more such attacks in the future.
Ransomware Attack Hits 22 Texas Towns, Authorities Say

Ransomware Attack Hits 22 Texas Towns, Authorities Say

The state declined to say which towns were affected by the coordinated cyberattack. But one expert said it could signal more such attacks in the future.

Privacy researchers devise a noise-exploitation attack that defeats dynamic anonymity

Privacy researchers in Europe believe they have the first proof that a long-theorised vulnerability in systems designed to protect privacy by aggregating and adding noise to data to mask individual

The Week in Tech: Are Lawmakers Too Eager to Weaken Big Tech’s Legal Shield?

Revising Section 230 could change the internet as we know it. How about policy decisions based on sound evidence?

US Cyber Command has publicly posted malware linked to a North Korea hacking group

U.S. Cyber Command, the sister division of the National Security Agency focused on offensive hacking and security operations, has released a set of new samples of malware linked to North Korean

What security pros need to know from Black Hat & Def Con 2019

Black Hat and Def Con came and went as quickly as it ever does. The week-long pair of back-to-back conferences, referred to as “hacker summer camp,” draws in the security crowd from across the world
I Shared My Phone Number. I Learned I Shouldn’t Have.

I Shared My Phone Number. I Learned I Shouldn’t Have.

Our personal tech columnist asked security researchers what they could find out about him from just his cellphone number. Quite a lot, it turns out.
I Shared My Phone Number. I Learned I Shouldn’t Have.

I Shared My Phone Number. I Learned I Shouldn’t Have.

Our personal tech columnist asked security researchers what they could find out about him from just his cellphone number. Quite a lot, it turns out.
I Shared My Phone Number. I Learned I Shouldn’t Have.

I Shared My Phone Number. I Learned I Shouldn’t Have.

Our personal tech columnist asked security researchers what they could find out about him from just his cellphone number. Quite a lot, it turns out.

Capital One Hacking Suspect Had Data From Other Targets, Officials Say

Prosecutors said they found the stolen material from 30 organizations on servers in the bedroom of the accused hacker.