Two girls, aged 12 and 13, were arrested and face charges of third-degree felony after creating a fake Facebook account impersonating a classmate with clear intent of harming her.
The man accused of spoofing Northcliffe Chief Executive Steve Auckland on Twitter hit back with legal action against the micro-blogging platform that plans to reveal his identity, according to Guido Fawkes blog. A pro bono attorney has already agreed to represent the spoofer, who is also accused of fraud, defamation, libel and hacking computers of the media company owned by the Daily Mail.
For many years, biometric authentication has been regarded as the most effective means of securing assets. The king of biometrics, the iris scanner, has just been defeated by a group of scientists at the Universidad Autonoma de Madrid, who presented a replica of the human eye that can bypass iris-scanning security systems.
Australian network provider AAPT confirmed today that servers were attacked and that 12 month-old data was accessed. The announcement came a day after Anonymous Australia announced they’re in the process of revealing 40 GB of data belonging to a major Australian Internet Service Provider.
The U.S. is doing a poor job of monitoring the security and privacy of medical devices, according to a multi-year study by six researchers associated with Harvard Medical School's Beth Israel Deaconess Medical Center and the Department of Computer Science at the University of Massachusetts at Amherst, as reported by computerworld.com.
German company Siemens announced it has patched two vulnerabilities in its industrial control software. These seem to be the same software bugs used by the infamous Stuxnet to sabotage Iran’s nuclear program.
A computer technician was cleared of all charges although he had hacked into his wife’s email account looking for proof of her having a relationship with another man.
The first quarter of 2012 saw a significant increase of phishing websites, even though some major players in the spam-sending industry, such as Kelihos, have been taken down.
Almost 90 per cent of people “creep” on their former lovers’ Facebook page, according to a study by Western University master researcher Veronika Lukacs.
Industrial control systems that can be managed via Internet through a technology called Niagara AX Framework were deemed vulnerable to attack by two security researchers working for the U.S. Department of Homeland Security (DHS).
After its first attempt to fight the in-app freebie exploit by blocking the IP address of the server used for the hack, Apple moved to a takedown appeal to the web-hosting provider.
Master hackers should be hired by the US to win cyber war instead of being arrested, according a top defense expert interviewed by The Guardian. John Arquilla, a professor of defense analysis at the US Naval Postgraduate School in Monterey, California, says the US government should avoid “ridiculous” prosecutions and use attackers' skills to track enemies.
More than one million records of forum users have been stolen after the successful breach of Phandroid's Android Forums web site. According to the note posted online, the breach revealed user data including e-mail addresses, hashed passwords, as well as registration IP addresses and last log-in date.
Some $2.7 million filled the pockets of a cybercrime ring in a massive online loan-fraud operation that started in 2005, according to a networkworld.com report.