What To Do When Your Phone Gets Hacked

What To Do When Your Phone Gets Hacked

Elise Ackerman Forbes   What To Do When Your Phone Gets Hacked … My friend Mike’s Android phone had been acting strangely for awhile. In the middle of the night, the phone would come alive. It would meander down various menu paths, send texts that were gibberish and start playing …

Read More »

US to Scan Facebook and Twitter for Evidence of Bioterrorism

US to Scan Facebook and Twitter for Evidence of Bioterrorism

Liat Clark Wired Magazine – UK     The US department of Homeland Security has commissioned a one-year contract to investigate the efficacy of using social networks to identify instances of bioterrorism, pandemics and other health and security risks. It is paying Accenture Federal Services $3 million (£1.8 million) to scan the …

Read More »

CIA Mistress’ Email May Have Been Hacked By Anonymous

CIA Mistress' Email May Have Been Hacked By Anonymous

Zeke Miller Buzzfeed   Paula Broadwell’s personal email appears on a list of compromised accounts, hacked by Anonymous, stolen from the commercial intelligence firm Stratfor. A Yahoo email account belonging to former CIA Director David Petraeus’ mistress may have been compromised by the group Anonymous. The personal email account, which other …

Read More »

Benefits of Training and Awareness for Disaster Recovery Planning

Benefits of Training and Awareness for Disaster Recovery Planning

Oscar Atkinson VirtualThreat Guest Writer   Data centers are vital components for many of today’s companies, especially when it comes to disaster recovery planning. Within these data centers, companies can deploy sensitive equipment, such as servers and large-scale storage devices. These facilities also offer data backup features that can be …

Read More »

US Fighting Global Cyber Warfare

US Fighting Global Cyber Warfare

Michael Kling Money News   The Pentagon is striving to improve the military’s global cyber warfare capabilities — both offensive and defensive abilities — in an effort to prevent an electronic Pearl Harbor. The Army is interested in leading the cyber war effort through its new Army Cyber Command, according …

Read More »

5 Tips for Protecting Your Identity

5 Tips for Protecting Your Identity

  Mark Walker VirtualThreat Guest Writer   Protecting your identity is important. Once your identity is stolen, it can be difficult to restore. After theft, you may find that you have multiple credit cards and loans under your name, property that you do not own or other financial obligations that …

Read More »

Hacked Android Apps Trick You into Revealing Personal Data

Hacked Android Apps Trick You into Revealing Personal Data

  BBC   Millions of people are using hacked Android apps that can be tricked into revealing personal data, research indicates. Scientists tested 13,500 Android apps and found almost 8% failed to protect bank account and social media logins. These apps failed to implement standard scrambling systems, allowing “man-in-the-middle” attacks to reveal …

Read More »

Chinese Hackers Target Sony Playstation 3 Firmware

Chinese Hackers Target Sony Playstation 3 Firmware

Ellyne Phneah ZDNet     A Chinese hacking group says it has released a custom Sony PlayStation 3 firmware which can circumvent the firmware on the game console. BlueDiskCFW released the custom firmware CFW which contains the LVO encryption keys to enable users to bypass the current PlayStation Network (PSN) passphrase …

Read More »