Welcome to HackSurfer! Share your cyber news with the world.
We're the web’s cybercrime news and info hub built on top of HackSurfer’s social, open source and partner data collection system.

Close

IT

Weather 11
62
Risk
/ 62
Gravity
  • I
    Tue - 07/22
  • I
    Wed - 07/23
  • I
    Thu - 07/24
  • I
    Fri - 07/25
  • I
    Sat - 07/26
  • I
    Sun - 07/27
  • I
    Mon - 07/28

Icon target lg TOP TARGETS

Who is getting hit today in Information Technology?
Target Gravity Momentum
13
7
5
More Info
Hide
  • Featured
Industry Exclusive
0
IG report highlights NOAA cybersecurity deficiencies
by Mike
Hackers compromised a contractors PC that held National Oceanic and Atmospheric Administration (NOAA) satellite data, according to an IG report. The agency could not investigate the breach, however, because the contractor refused to turn over the computer. The report also highlighted deficiences like software vulnerabilities. http://goo.gl/wamhOX
IT

Hackers are using a security vulnerability in the popular open-source search and analytics application Elasticsearch to gain access to Amazon's cloud service. By spreading malicious code throughout the service, hackers have at their disposal an enormous botnet from which to launch...

Read More
Government

The 23-year-old University of Nebraska-Lincoln student who hacked into the university's network seven times in 2012 has been sentenced to six months in prison, in addition to fines exceeding $100,000. The student plead guilty to one charge of fraud in exchange for the dismissal of...

Read More
IT

Is there a qualification that you've been dying to get but lack the funds to pay for the training? Or perhaps there's a job that you're applying for but a requirement is a qualificaion that you don't have. Well, if you subscribe to the IT Governance blog by 24th August - you'll be...

Read More
TOPICS:
Industry Exclusive
Utilities
0
NEMA's recommendations to transform the smart grid
by Eric

The National Electrical Manufacturers Association (NEMA) has submitted 14 recommendations to the Obama administration on transforming the smart gird as part of the Quadrennial Energy Review, including protections against cyber attacks, allocated communication frequencies, and incentives for smart grid construction. http://goo.gl/qpQUYs

Industry Exclusive
Industrials
0
Hackers steal Israeli Iron Dome documents
by Mike

Hackers stole sensitive documents belonging to 3 contractors responsible for building the Israeli Iron Dome missile defense system. The never before disclosed theft occurred between 2011 and 2012. Hackers targeted the Elisra Group, Israel Aerospace Industries, and Rafael Advanced Defense Systems for information. http://goo.gl/u6tCWn

IT

The Daily Roundup Most Notable Info Incapsula describes a Googlebot as “a web crawler that facilitates knowledge exchange between billions of humans, influencing our perceptions, preferences and imaginations in more ways than we can even comprehend.” The company has just release...

Read More
Industry Exclusive
Financials
0
Phishing Scam Targets USAA Customers

A phishing scam recently popping up concerns USAA customers. The culprits send out very convincing links that lead to a webpage that harvested USAA's actual set up during the months of June and July and prompt users to put in personal data. http://linkd.in/WKakPy

Industry Exclusive
Telecom
1
Your New Cell Phone Comes With a Tattoo

A recent development by VivaLnk and Motorola comes by way of wearable technology. The article discusses that more than 50% users do not lock their phone because it takes too long to unlock. They offer a digital sticker that stays on your skin for five days that unlocks devices. http://onforb.es/1kjncH5

Government

In reviewing SurfWatch labs data, I have observed that cyber-attacks steadily increase in areas of international crisis. I have discussed this before, with posts on Iraq and Ukraine. The current
conflict in Gaza has seen an increased amount of hacktivist incidents. AnonGhost
hea...

Read More
Industry Exclusive
IT
0
Hackers using IE flaws for target reconnaissance, security software detection
by Eric

Attackers are using holes in Internet Explorer to size up a target by determining what software it is using. "By knowing what security software is installed, the hackers can determine if their attack is going to work. That way they will only attack a computer they know is vulnerable and avoid alerting security companies." http://goo.gl/RydVoi

Industry Exclusive
Healthcare
0
California Court: data must actually be viewed to sue for data breach damages
by Eric

The California Appeals Court recently issued a decision limiting patients' ability to obtain statutory damages in a data breach case without showing that the medical information was actually viewed by an unauthorized person. This is complicated by the fact that data could be accessed by criminals months or years later. http://goo.gl/9x6ZBH

Get Daily Reports on Possible Threats to Your Business. And Much More.

Recent Posts