Elise Ackerman Forbes What To Do When Your Phone Gets Hacked … My friend Mike’s Android phone had been acting strangely for awhile. In the middle of the night, the phone would come alive. It would meander down various menu paths, send texts that were gibberish and start playing …
Read More »Millionaire Manhunt: John McAfee Person of Interest in Belize Homicide
Chris Dougherty VirtualThreat Contributing Writer Caribbean officials in Belize have questioned 3 people with regard to the murder of Gregory Viant Faull, an American citizen living in a town north of San Pedro, on the island of Ambergris Caye. Belize authorities say John McAfee, the 67 year old founder of …
Read More »US to Scan Facebook and Twitter for Evidence of Bioterrorism
Liat Clark Wired Magazine – UK The US department of Homeland Security has commissioned a one-year contract to investigate the efficacy of using social networks to identify instances of bioterrorism, pandemics and other health and security risks. It is paying Accenture Federal Services $3 million (£1.8 million) to scan the …
Read More »CIA Mistress’ Email May Have Been Hacked By Anonymous
Zeke Miller Buzzfeed Paula Broadwell’s personal email appears on a list of compromised accounts, hacked by Anonymous, stolen from the commercial intelligence firm Stratfor. A Yahoo email account belonging to former CIA Director David Petraeus’ mistress may have been compromised by the group Anonymous. The personal email account, which other …
Read More »Benefits of Training and Awareness for Disaster Recovery Planning
Oscar Atkinson VirtualThreat Guest Writer Data centers are vital components for many of today’s companies, especially when it comes to disaster recovery planning. Within these data centers, companies can deploy sensitive equipment, such as servers and large-scale storage devices. These facilities also offer data backup features that can be …
Read More »US Fighting Global Cyber Warfare
Michael Kling Money News The Pentagon is striving to improve the military’s global cyber warfare capabilities — both offensive and defensive abilities — in an effort to prevent an electronic Pearl Harbor. The Army is interested in leading the cyber war effort through its new Army Cyber Command, according …
Read More »5 Tips for Protecting Your Identity
Mark Walker VirtualThreat Guest Writer Protecting your identity is important. Once your identity is stolen, it can be difficult to restore. After theft, you may find that you have multiple credit cards and loans under your name, property that you do not own or other financial obligations that …
Read More »NICT Daedalus Gives Startling Function and Beauty to Cyber Security
Meg Jones VirtualThreat Guest Writer NICT Daedalus. It’s an unfortunate fact that many people fail to realize, but advancements in technology also lead to advancements in criminal activity. Yes, even the technologies that are intended for our safekeeping, security, and protection. In short, the bad guys can nearly always …
Read More »Hacked Android Apps Trick You into Revealing Personal Data
BBC Millions of people are using hacked Android apps that can be tricked into revealing personal data, research indicates. Scientists tested 13,500 Android apps and found almost 8% failed to protect bank account and social media logins. These apps failed to implement standard scrambling systems, allowing “man-in-the-middle” attacks to reveal …
Read More »Chinese Hackers Target Sony Playstation 3 Firmware
Ellyne Phneah ZDNet A Chinese hacking group says it has released a custom Sony PlayStation 3 firmware which can circumvent the firmware on the game console. BlueDiskCFW released the custom firmware CFW which contains the LVO encryption keys to enable users to bypass the current PlayStation Network (PSN) passphrase …
Read More »