Twitter has been a hot topic of the latest hackivism activities in the US. Most recent attacks affected CBS News accounts and the Associated Press. A fake tweet from the AP, claimed an explosion at the White House resulting in a financial snowball effect that lead the Dow Jones to …
After a long tech battle to win a spot at the nation’s first cybersecurity learning center, ten scholarships have been awarded. Earlier this March, hundreds of competitor’s hacked it out to compete, including secondary and college students, veterans and jobseekers. The fierce tech fight used interactive and hands on software to …
Multiple cyberattacks in South Korea has still not been accounted for, investigators say. However in Seoul, the main focus is on North Korea, in which South Korean security professionals claim the North have been training a complex team of computer-savvy “cyber warriors” . Last Wednesday, deadly malware shut down 32,000 …
Newly inaugurated premier of China, Li Keqiang, released a statement Sunday saying, “I think we should not make groundless accusations against each other, and spend more time doing practical things that will contribute to cyber-security.” Lately China has been accussed of a string of cyber security attacks against NY Times, …
President Obama invoked the pageantry of his State of the Union address this evening to announce a long-anticipated executive order on cybersecurity, a move that caps months of discussions with technology companies and could reduce pressure on Congress to move forward with controversial new legislation. The order will “strengthen …
Finally you sit down to enjoy your cafe latte and flip open the lid of your laptop. You pa-rouse facebook, mail and heck decide to look online at the latest deals going on and buy. It’s an all too familiar behaviour, which makes us vulnerable to hacks. Your notebook, tablet or smartphone’s …
At an army base outside Tel Aviv, soldiers sit in front of screens glued to scrolling colored computer code, keyboards at the ready to deflect attacks. They’re Israel’s cyber defense team in training, among the uniformed men and women learning how to stalk hackers and pounce on virtual enemies as …
In the latest report on the “2012 Most Trusted Companies for Privacy” conducted by Ponemon Institute, social medias and the internet made the bottom of the list. Over 6,700 adults participated in the 15 week long survey and were asked to name five companies they believed to be the most trusted for protecting their personal identification data. …
The vast majority of targeted computer attacks now start with a malicious e-mail sent to a company employee. Now evidence suggests that the same technique could be used to attack watersheds, power grids, oil refineries and nuclear plants. Attackers increasingly use so-called spearphishing attacks, in which they send employees targeted …
Sorry. No data so far.
© 2012 Toronto Professional services LTD. All rights reserved