Saturday, March 31, 2012

Google Alert - hacking

News10 new results for hacking
 
Chinese Company and Employee Deny Any Involvement in Hacking Attacks
New York Times
It was the result of a nearly yearlong effort to hack into computers and steal information from hundreds of companies and individuals in several countries, the report said. The report never identified a hacker by name. But it linked the attacks to an ...
See all stories on this topic »
Hacking case based in China is given a face
Pittsburgh Post Gazette
The researchers did not link the attacks directly to government-employed hackers. But security experts and other researchers say the techniques and the victims point to a state-sponsored campaign. "The fact they targeted Tibetan activists is a strong ...
See all stories on this topic »
Hackers can retrieve erased credit card info from used Xbox 360s (Updated)
DVICE
Security experts have learned that with some basic hacking, credit card info stored on old Xbox 360 hard drives can be extracted. Sigh. The flaw discovered by Drexel University researchers could be a catastrophic concern for any Xbox 360 owner who's ...
See all stories on this topic »
Chinese Hackers Linked To Cyber-Espionage In Japan, India, Tibet
CRN
By Antone Gonsalves, CRN Chinese hackers have been linked to a cyber-espionage campaign that planted data-gathering malware in a total of 233 computers of Tibetan activists and military and industrial entities in Japan and India.
See all stories on this topic »
Chinese hacker attack Indian websites
IBNLive.com
PTI New York: Indian military research bodies and Tibetan activists have been targeted by hackers based in China, with a former graduate student at a Chinese university emerging as a key figure responsible for the cyber breach, according to a report by ...
See all stories on this topic »

IBNLive.com
US ambassador to Moscow accuses Russian journalists of hacking
Chicago Tribune
Related Money Minute: Another day, another data hacking [video] Money Minute: Another day, another data hacking [video] How to protect personal data on devices you plan to sell How to protect personal data on devices you plan to sell Hacker group ...
See all stories on this topic »
Trend Micro Unearths More Links Between China and Hacker Group
PCWorld (blog)
By Mikael Ricknäs, IDG News Security vendor Trend Micro has been tracking a hacking campaign called Luckycat that has been linked to 90 attacks, including some aimed at Tibetan activists, and has tied it to a group based in China, the company said in a ...
See all stories on this topic »
US ambassador alleges hacking by Russian state media
Denver Post
(Harry Hamburg, Associated Press file) MOSCOW — Ambassador Michael McFaul met with cheers and criticism in Russia after he confronted a camera crew from state-controlled television, suggesting they had accessed his schedule by hacking his e-mail or ...
See all stories on this topic »
Money Minute: Another day, another data hacking [video]
Los Angeles Times
By David Lazarus Those footsteps you hear are the sound of some hacker or identity thief potentially making off with your personal information. MasterCard says it's investigating a possible security breach related to a third-party vendor and has ...
See all stories on this topic »
Daily Report: Hacking Attacks Are Linked to Man at Chinese Firm
New York Times (blog)
The case puts a face on the persistent espionage by Chinese hackers against foreign companies and groups. The attacks were connected to an online alias, according to a report released Friday by Trend Micro, a computer security firm with headquarters in ...
See all stories on this topic »

New York Times (blog)

Blogs5 new results for hacking
 
Mastercard and Visa warn consumers over massive hacking attack ...
By Ben Popper
A hacking attack on Global Payments, a small Atlanta firm, has potentially exposed hundreds of thousands of customers from the major credit card companies to fraud, reports the Wall Street Journal. Global Payments is what's known in the ...
VentureBeat
Hacking In Asia Is Linked To Chinese Ex-Graduate Student
By The Huffington Post News Editors
SAN FRANCISCO — A breach of computers belonging to companies in Japan and India and to Tibetan activists has been linked to a former graduate student at a Chinese university — putting a face on the persistent espionage by Chinese ...
The Huffington Post | Full News Feed
EC-Council Announces TakeDownCon – Hacking Conference to ...
Hacker Conference featuring real world hackers presenting cutting-edge, relevant, technical topics, as well as custom, advanced hacker training will be hosted at the Westin Park Central in Dallas Texas in May of 2012 | Virtual Strategy ...
Virtual-Strategy Magazine - Your...
Case Based in China Puts a Face on Persistent Hacking – Trade ...
By Ellen Croibier
Case Based in China Puts a Face on Persistent Hacking. Nicole Perlroth | March 29, 2012 |The New York Times. SAN FRANCISCO — A breach of computers belonging to companies in Japan and India and to Tibetan activists has been linked ...
Trade Reform
TechFest 2012, IIT Bombay presents National Level Ethical Hacking ...
By Santosh
TechDefence is India's Fastest Growing Ethical Hacking & Information Security Training Company, founded by India's Renowned Ethical Hacker & Cyber Crime Consultant Mr.Sunny Vaghela. TechDefence has helped investigating agencies to ...
Know a Fest - Campus Festivals in India

Web2 new results for hacking
 
Hacking in Asia Is Linked to Chinese Ex-Graduate Student ...
A breach of computers belonging to companies in Japan and India and to Tibetan activists has been linked to a former student at a Chinese university.
www.nytimes.com/.../hacking-in-asia-is-linked-to-chinese-ex-...
Hacking IT systems to become a criminal offence
Possessing or distributing hacking software and tools would also be an offence, and companies would be liable for cyber attacks committed for their benefit.
www.europarl.europa.eu/news/en/.../20120326IPR41843/


Tip: Use a minus sign (-) in front of terms in your query that you want to exclude. Learn more.

Delete this alert.
Create another alert.
Manage your alerts.

No comments:

Post a Comment